Search Options

Results per page
Sort
Preferred Languages
Labels
Advance

Results 1 - 10 of 686 for host:kubernetes.io (0.12 sec)

  1. Using ABAC Authorization | Kubernetes

    Attribute-based access control (ABAC) defines an access control paradigm whereby access rights are granted to users through the use of policies which combine attributes together. Policy File Format To enable ABAC mode, specify --authorization-policy-file=SOME_FILENAME and --authorization-mode=ABAC on startup. The file format is one JSON object per line. There should be no enclosing list or map, only one map per line. Each line is a "policy object", where each such object is a map with the following properties:
    kubernetes.io/docs/reference/access-authn-authz/abac/
    Registered: Mon May 26 06:06:00 UTC 2025
    - 459K bytes
    - Viewed (0)
  2. Using kubectl to Create a Deployment | Kubernetes

    Objectives Learn about application Deployments. Deploy your first app on Kubernetes with kubectl. Kubernetes Deployments A Deployment is responsible for creating and updating instances of your application. Note:This tutorial uses a container that requires the AMD64 architecture. If you are using minikube on a computer with a different CPU architecture, you could try using minikube with a driver that can emulate AMD64. For example, the Docker Desktop driver can do this.
    kubernetes.io/docs/tutorials/kubernetes-basics/deploy-app/deploy-intro/
    Registered: Mon May 26 06:06:44 UTC 2025
    - 458.8K bytes
    - Viewed (0)
  3. Expose Your App Publicly | Kubernetes

    Production-Grade Container Orchestration
    kubernetes.io/docs/tutorials/kubernetes-basics/expose/
    Registered: Mon May 26 06:07:42 UTC 2025
    - 446.1K bytes
    - Viewed (0)
  4. Restrict a Container's Syscalls with seccomp | ...

    FEATURE STATE: Kubernetes v1.19 [stable] Seccomp stands for secure computing mode and has been a feature of the Linux kernel since version 2.6.12. It can be used to sandbox the privileges of a process, restricting the calls it is able to make from userspace into the kernel. Kubernetes lets you automatically apply seccomp profiles loaded onto a node to your Pods and containers. Identifying the privileges required for your workloads can be difficult.
    kubernetes.io/docs/tutorials/security/seccomp/
    Registered: Mon May 26 06:08:12 UTC 2025
    - 508.4K bytes
    - Viewed (0)
  5. Automatic Cleanup for Finished Jobs | Kubernetes

    A time-to-live mechanism to clean up old Jobs that have finished execution.
    kubernetes.io/docs/concepts/workloads/controllers/ttlafterfinished/
    Registered: Mon May 26 05:37:21 UTC 2025
    - 450K bytes
    - Viewed (0)
  6. Security | Kubernetes

    Concepts for keeping your cloud-native workload secure.
    kubernetes.io/docs/concepts/security/
    Registered: Mon May 26 05:37:33 UTC 2025
    - 455.1K bytes
    - Viewed (0)
  7. Pod Lifecycle | Kubernetes

    This page describes the lifecycle of a Pod. Pods follow a defined lifecycle, starting in the Pending phase, moving through Running if at least one of its primary containers starts OK, and then through either the Succeeded or Failed phases depending on whether any container in the Pod terminated in failure. Like individual application containers, Pods are considered to be relatively ephemeral (rather than durable) entities. Pods are created, assigned a unique ID (UID), and scheduled to run on nodes where they remain until termination (according to restart policy) or deletion.
    kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/
    Registered: Mon May 26 05:37:46 UTC 2025
    - 506.4K bytes
    - Viewed (0)
  8. Versions in CustomResourceDefinitions | Kubernetes

    This page explains how to add versioning information to CustomResourceDefinitions, to indicate the stability level of your CustomResourceDefinitions or advance your API to a new version with conversion between API representations. It also describes how to upgrade an object from one version to another. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts.
    kubernetes.io/docs/tasks/extend-kubernetes/custom-resources/custom-resource-definition-versioning/
    Registered: Mon May 26 05:57:26 UTC 2025
    - 594K bytes
    - Viewed (0)
  9. Monitor Node Health | Kubernetes

    Node Problem Detector is a daemon for monitoring and reporting about a node's health. You can run Node Problem Detector as a DaemonSet or as a standalone daemon. Node Problem Detector collects information about node problems from various daemons and reports these conditions to the API server as Node Conditions or as Events. To learn how to install and use Node Problem Detector, see Node Problem Detector project documentation.
    kubernetes.io/docs/tasks/debug/debug-cluster/monitor-node-health/
    Registered: Mon May 26 05:55:49 UTC 2025
    - 476.9K bytes
    - Viewed (0)
  10. Generating Reference Documentation for the Kube...

    This page shows how to update the Kubernetes API reference documentation. The Kubernetes API reference documentation is built from the Kubernetes OpenAPI spec using the kubernetes-sigs/reference-docs generation code. If you find bugs in the generated documentation, you need to fix them upstream. If you need only to regenerate the reference documentation from the OpenAPI spec, continue reading this page. Before you begin Requirements: You need a machine that is running Linux or macOS.
    kubernetes.io/docs/contribute/generate-ref-docs/kubernetes-api/
    Registered: Mon May 26 06:33:26 UTC 2025
    - 459.7K bytes
    - Viewed (0)
Back to top