- Sort Score
- Result 10 results
- Languages All
- Labels All
Results 1 - 10 of 86 for content_length:[500000 TO 999999] (0.04 sec)
-
Troubleshooting kubeadm | Kubernetes
As with any program, you might run into an error installing or running kubeadm. This page lists some common failure scenarios and have provided steps that can help you understand and fix the problem. If your problem is not listed below, please follow the following steps: If you think your problem is a bug with kubeadm: Go to github.com/kubernetes/kubeadm and search for existing issues. If no issue exists, please open one and follow the issue template.kubernetes.io/docs/setup/production-environment/tools/kubeadm/troubleshooting-kubeadm/Registered: Fri Jun 27 06:29:26 UTC 2025 - 492.7K bytes - Viewed (0) -
Assigning Pods to Nodes | Kubernetes
You can constrain a Pod so that it is restricted to run on particular node(s), or to prefer to run on particular nodes. There are several ways to do this and the recommended approaches all use label selectors to facilitate the selection. Often, you do not need to set any such constraints; the scheduler will automatically do a reasonable placement (for example, spreading your Pods across nodes so as not place Pods on a node with insufficient free resources).kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/Registered: Fri Jun 27 06:38:56 UTC 2025 - 525.5K bytes - Viewed (0) -
Configure a Security Context for a Pod or Conta...
A security context defines privilege and access control settings for a Pod or Container. Security context settings include, but are not limited to: Discretionary Access Control: Permission to access an object, like a file, is based on user ID (UID) and group ID (GID). Security Enhanced Linux (SELinux): Objects are assigned security labels. Running as privileged or unprivileged. Linux Capabilities: Give a process some privileges, but not all the privileges of the root user.kubernetes.io/docs/tasks/configure-pod-container/security-context/Registered: Fri Jun 27 06:56:54 UTC 2025 - 527.6K bytes - Viewed (0) -
Configure a Pod to Use a PersistentVolume for S...
This page shows you how to configure a Pod to use a PersistentVolumeClaim for storage. Here is a summary of the process: You, as cluster administrator, create a PersistentVolume backed by physical storage. You do not associate the volume with any Pod. You, now taking the role of a developer / cluster user, create a PersistentVolumeClaim that is automatically bound to a suitable PersistentVolume. You create a Pod that uses the above PersistentVolumeClaim for storage.kubernetes.io/docs/tasks/configure-pod-container/configure-persistent-volume-storage/Registered: Fri Jun 27 06:53:45 UTC 2025 - 490.5K bytes - Viewed (0) -
Glossary | Kubernetes
Glossary This glossary is intended to be a comprehensive, standardized list of Kubernetes terminology. It includes te...kubernetes.io/docs/reference/glossary/ Similar Results (1)Registered: Fri Jun 27 07:10:46 UTC 2025 - 634.9K bytes - Viewed (0) -
Authenticating | Kubernetes
This page provides an overview of authentication. Users in Kubernetes All Kubernetes clusters have two categories of users: service accounts managed by Kubernetes, and normal users. It is assumed that a cluster-independent service manages normal users in the following ways: an administrator distributing private keys a user store like Keystone or Google Accounts a file with a list of usernames and passwords In this regard, Kubernetes does not have objects which represent normal user accounts.kubernetes.io/docs/reference/access-authn-authz/authentication/Registered: Fri Jun 27 07:10:02 UTC 2025 - 663.7K bytes - Viewed (0) -
Example: Deploying PHP Guestbook application wi...
This tutorial shows you how to build and deploy a simple (not production ready), multi-tier web application using Kubernetes and Docker. This example consists of the following components: A single-instance Redis to store guestbook entries Multiple web frontend instances Objectives Start up a Redis leader. Start up two Redis followers. Start up the guestbook frontend. Expose and view the Frontend Service. Clean up. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster.kubernetes.io/docs/tutorials/stateless-application/guestbook/Registered: Fri Jun 27 07:10:21 UTC 2025 - 499K bytes - Viewed (0) -
Command line tool (kubectl) | Kubernetes
Production-Grade Container Orchestrationkubernetes.io/docs/reference/kubectl/Registered: Fri Jun 27 07:17:26 UTC 2025 - 494.7K bytes - Viewed (0) -
Managing Service Accounts | Kubernetes
A ServiceAccount provides an identity for processes that run in a Pod. A process inside a Pod can use the identity of its associated service account to authenticate to the cluster's API server. For an introduction to service accounts, read configure service accounts. This task guide explains some of the concepts behind ServiceAccounts. The guide also explains how to obtain or revoke tokens that represent ServiceAccounts, and how to (optionally) bind a ServiceAccount's validity to the lifetime of an API object.kubernetes.io/docs/reference/access-authn-authz/service-accounts-admin/Registered: Fri Jun 27 07:13:39 UTC 2025 - 504.9K bytes - Viewed (0) -
Migrate Kubernetes Objects Using Storage Versio...
FEATURE STATE: Kubernetes v1.30 [alpha] (enabled by default: false) Kubernetes relies on API data being actively re-written, to support some maintenance activities related to at rest storage. Two prominent examples are the versioned schema of stored resources (that is, the preferred storage schema changing from v1 to v2 for a given resource) and encryption at rest (that is, rewriting stale data based on a change in how the data should be encrypted).kubernetes.io/docs/tasks/manage-kubernetes-objects/storage-version-migration/Registered: Fri Jun 27 06:58:24 UTC 2025 - 491.5K bytes - Viewed (0)