Search Options

Results per page
Sort
Preferred Languages
Labels
Advance

Popular Words: ใƒ†ใ‚นใƒˆ test

Results 1 - 10 of 30 for host:kubernetes.io (0.02 sec)

  1. Secrets | Kubernetes

    A Secret is an object that contains a small amount of sensitive data such as a password, a token, or a key. Such information might otherwise be put in a Pod specification or in a container image. Using a Secret means that you don't need to include confidential data in your application code. Because Secrets can be created independently of the Pods that use them, there is less risk of the Secret (and its data) being exposed during the workflow of creating, viewing, and editing Pods.
    kubernetes.io/docs/concepts/configuration/secret/
    Registered: Fri May 10 07:29:36 UTC 2024
    - 491.3K bytes
    - Viewed (0)
  2. kubelet | Kubernetes

    Synopsis The kubelet is the primary "node agent" that runs on each node. It can register the node with the apiserver using one of: the hostname; a flag to override the hostname; or specific logic for a cloud provider. The kubelet works in terms of a PodSpec. A PodSpec is a YAML or JSON object that describes a pod. The kubelet takes a set of PodSpecs that are provided through various mechanisms (primarily through the apiserver) and ensures that the containers described in those PodSpecs are running and healthy.
    kubernetes.io/docs/reference/command-line-tools-reference/kubelet/
    Registered: Fri May 10 08:14:39 UTC 2024
    - 493.5K bytes
    - Viewed (0)
  3. Updating Configuration via a ConfigMap | Kubern...

    This page provides a step-by-step example of updating configuration within a Pod via a ConfigMap and builds upon the Configure a Pod to Use a ConfigMap task. At the end of this tutorial, you will understand how to change the configuration for a running application. This tutorial uses the alpine and nginx images as examples. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster.
    kubernetes.io/docs/tutorials/configuration/updating-configuration-via-a-configmap/
    Registered: Fri May 10 07:59:20 UTC 2024
    - 508.9K bytes
    - Viewed (0)
  4. Using RBAC Authorization | Kubernetes

    Role-based access control (RBAC) is a method of regulating access to computer or network resources based on the roles of individual users within your organization. RBAC authorization uses the rbac.authorization.k8s.io API group to drive authorization decisions, allowing you to dynamically configure policies through the Kubernetes API. To enable RBAC, start the API server with the --authorization-mode flag set to a comma-separated list that includes RBAC; for example: kube-apiserver --authorization-mode=Example,RBAC --other-options --more-options API objects The RBAC API declares four kinds of Kubernetes object: Role, ClusterRole, RoleBinding and ClusterRoleBinding.
    kubernetes.io/docs/reference/access-authn-authz/rbac/
    Registered: Fri May 10 07:57:56 UTC 2024
    - 542.1K bytes
    - Viewed (0)
  5. Validating Admission Policy | Kubernetes

    FEATURE STATE: Kubernetes v1.30 [stable] This page provides an overview of Validating Admission Policy. What is Validating Admission Policy? Validating admission policies offer a declarative, in-process alternative to validating admission webhooks. Validating admission policies use the Common Expression Language (CEL) to declare the validation rules of a policy. Validation admission policies are highly configurable, enabling policy authors to define policies that can be parameterized and scoped to resources as needed by cluster administrators.
    kubernetes.io/docs/reference/access-authn-authz/validating-admission-policy/
    Registered: Fri May 10 07:57:14 UTC 2024
    - 505.7K bytes
    - Viewed (0)
  6. Volumes | Kubernetes

    On-disk files in a container are ephemeral, which presents some problems for non-trivial applications when running in containers. One problem occurs when a container crashes or is stopped. Container state is not saved so all of the files that were created or modified during the lifetime of the container are lost. During a crash, kubelet restarts the container with a clean state. Another problem occurs when multiple containers are running in a Pod and need to share files.
    kubernetes.io/docs/concepts/storage/volumes/
    Registered: Fri May 17 07:29:15 UTC 2024
    - 531.3K bytes
    - Viewed (0)
  7. kubeadm init phase | Kubernetes

    kubeadm init phase enables you to invoke atomic steps of the bootstrap process. Hence, you can let kubeadm do some of the work and you can fill in the gaps if you wish to apply customization. kubeadm init phase is consistent with the kubeadm init workflow, and behind the scene both use the same code. kubeadm init phase preflight Using this command you can execute preflight checks on a control-plane node.
    kubernetes.io/docs/reference/setup-tools/kubeadm/kubeadm-init-phase/
    Registered: Fri May 10 08:03:26 UTC 2024
    - 524.3K bytes
    - Viewed (0)
  8. Glossary | Kubernetes

    Glossary This glossary is intended to be a comprehensive, standardized list of Kubernetes terminology. It includes te...
    kubernetes.io/docs/reference/glossary/
    Registered: Fri May 10 07:58:36 UTC 2024
    - 580.8K bytes
    - Viewed (0)
  9. StatefulSet Basics | Kubernetes

    This tutorial provides an introduction to managing applications with StatefulSets. It demonstrates how to create, delete, scale, and update the Pods of StatefulSets. Before you begin Before you begin this tutorial, you should familiarize yourself with the following Kubernetes concepts: Pods Cluster DNS Headless Services PersistentVolumes PersistentVolume Provisioning The kubectl command line tool You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster.
    kubernetes.io/docs/tutorials/stateful-application/basic-stateful-set/
    Registered: Fri May 10 07:59:36 UTC 2024
    - 510.6K bytes
    - Viewed (0)
  10. Authenticating | Kubernetes

    This page provides an overview of authentication. Users in Kubernetes All Kubernetes clusters have two categories of users: service accounts managed by Kubernetes, and normal users. It is assumed that a cluster-independent service manages normal users in the following ways: an administrator distributing private keys a user store like Keystone or Google Accounts a file with a list of usernames and passwords In this regard, Kubernetes does not have objects which represent normal user accounts.
    kubernetes.io/docs/reference/access-authn-authz/authentication/
    Registered: Fri May 10 07:59:41 UTC 2024
    - 626.1K bytes
    - Viewed (0)
Back to top