Search Options

Results per page
Sort
Preferred Languages
Labels
Advance

Results 1 - 10 of 681 for timestamp:[now/d-7d TO *] (0.04 sec)

  1. PKI certificates and requirements | Kubernetes

    Kubernetes requires PKI certificates for authentication over TLS. If you install Kubernetes with kubeadm, the certificates that your cluster requires are automatically generated. You can also generate your own certificates -- for example, to keep your private keys more secure by not storing them on the API server. This page explains the certificates that your cluster requires. How certificates are used by your cluster Kubernetes requires PKI for the following operations:
    kubernetes.io/docs/setup/best-practices/certificates/
    Registered: Wed Apr 16 05:51:41 UTC 2025
    - 449.8K bytes
    - Viewed (0)
  2. Turnkey Cloud Solutions | Kubernetes

    This page provides a list of Kubernetes certified solution providers. From each provider page, you can learn how to install and setup production ready clusters.
    kubernetes.io/docs/setup/production-environment/turnkey-solutions/
    Registered: Wed Apr 16 05:51:25 UTC 2025
    - 433.7K bytes
    - Viewed (0)
  3. Object Names and IDs | Kubernetes

    Each object in your cluster has a Name that is unique for that type of resource. Every Kubernetes object also has a UID that is unique across your whole cluster. For example, you can only have one Pod named myapp-1234 within the same namespace, but you can have one Pod and one Deployment that are each named myapp-1234. For non-unique user-provided attributes, Kubernetes provides labels and annotations. Names A client-provided string that refers to an object in a resource URL, such as /api/v1/pods/some-name.
    kubernetes.io/docs/concepts/overview/working-with-objects/names/
    Registered: Wed Apr 16 05:52:20 UTC 2025
    - 441.4K bytes
    - Viewed (0)
  4. Pod Lifecycle | Kubernetes

    This page describes the lifecycle of a Pod. Pods follow a defined lifecycle, starting in the Pending phase, moving through Running if at least one of its primary containers starts OK, and then through either the Succeeded or Failed phases depending on whether any container in the Pod terminated in failure. Like individual application containers, Pods are considered to be relatively ephemeral (rather than durable) entities. Pods are created, assigned a unique ID (UID), and scheduled to run on nodes where they remain until termination (according to restart policy) or deletion.
    kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/
    Registered: Wed Apr 16 05:52:24 UTC 2025
    - 487.8K bytes
    - Viewed (0)
  5. Enforcing Pod Security Standards | Kubernetes

    This page provides an overview of best practices when it comes to enforcing Pod Security Standards. Using the built-in Pod Security Admission Controller FEATURE STATE: Kubernetes v1.25 [stable] The Pod Security Admission Controller intends to replace the deprecated PodSecurityPolicies. Configure all cluster namespaces Namespaces that lack any configuration at all should be considered significant gaps in your cluster security model. We recommend taking the time to analyze the types of workloads occurring in each namespace, and by referencing the Pod Security Standards, decide on an appropriate level for each of them.
    kubernetes.io/docs/setup/best-practices/enforcing-pod-security-standards/
    Registered: Wed Apr 16 05:51:59 UTC 2025
    - 439.2K bytes
    - Viewed (0)
  6. Production environment | Kubernetes

    Create a production-quality Kubernetes cluster
    kubernetes.io/docs/setup/production-environment/
    Registered: Wed Apr 16 05:52:40 UTC 2025
    - 451.6K bytes
    - Viewed (0)
  7. The Kubernetes API | Kubernetes

    The Kubernetes API lets you query and manipulate the state of objects in Kubernetes. The core of Kubernetes' control plane is the API server and the HTTP API that it exposes. Users, the different parts of your cluster, and external components all communicate with one another through the API server.
    kubernetes.io/docs/concepts/overview/kubernetes-api/
    Registered: Wed Apr 16 05:52:45 UTC 2025
    - 452.1K bytes
    - Viewed (0)
  8. Pod Security Admission | Kubernetes

    An overview of the Pod Security Admission Controller, which can enforce the Pod Security Standards.
    kubernetes.io/docs/concepts/security/pod-security-admission/
    Registered: Wed Apr 16 05:57:22 UTC 2025
    - 443.6K bytes
    - Viewed (0)
  9. Dynamic Resource Allocation | Kubernetes

    FEATURE STATE: Kubernetes v1.32 [beta] (enabled by default: false) Dynamic resource allocation is an API for requesting and sharing resources between pods and containers inside a pod. It is a generalization of the persistent volumes API for generic resources. Typically those resources are devices like GPUs. Third-party resource drivers are responsible for tracking and preparing resources, with allocation of resources handled by Kubernetes via structured parameters (introduced in Kubernetes 1.
    kubernetes.io/docs/concepts/scheduling-eviction/dynamic-resource-allocation/
    Registered: Wed Apr 16 05:57:47 UTC 2025
    - 471.9K bytes
    - Viewed (0)
  10. Automatic Cleanup for Finished Jobs | Kubernetes

    A time-to-live mechanism to clean up old Jobs that have finished execution.
    kubernetes.io/docs/concepts/workloads/controllers/ttlafterfinished/
    Registered: Wed Apr 16 05:56:51 UTC 2025
    - 436.6K bytes
    - Viewed (0)
Back to top