Search Options

Results per page
Sort
Preferred Languages
Labels
Advance

Popular Words: test

Results 131 - 140 of 629 for host:kubernetes.io (0.04 sec)

  1. Pod Security Policies | Kubernetes

    Removed feature PodSecurityPolicy was deprecated in Kubernetes v1.21, and removed from Kubernetes in v1.25. Instead of using PodSecurityPolicy, you can enforce similar restrictions on Pods using either or both: Pod Security Admission a 3rd party admission plugin, that you deploy and configure yourself For a migration guide, see Migrate from PodSecurityPolicy to the Built-In PodSecurity Admission Controller. For more information on the removal of this API, see PodSecurityPolicy Deprecation: Past, Present, and Future.
    kubernetes.io/docs/concepts/security/pod-security-policy/
    Registered: Mon Oct 28 08:45:13 UTC 2024
    - 426.5K bytes
    - Viewed (0)
  2. Configure Default CPU Requests and Limits for a...

    Define a default CPU resource limits for a namespace, so that every new Pod in that namespace has a CPU resource limit configured.
    kubernetes.io/docs/tasks/administer-cluster/manage-resources/cpu-default-namespace/
    Registered: Mon Oct 28 08:45:45 UTC 2024
    - 446.3K bytes
    - Viewed (0)
  3. Considerations for large clusters | Kubernetes

    A cluster is a set of nodes (physical or virtual machines) running Kubernetes agents, managed by the control plane. Kubernetes v1.31 supports clusters with up to 5,000 nodes. More specifically, Kubernetes is designed to accommodate configurations that meet all of the following criteria: No more than 110 pods per node No more than 5,000 nodes No more than 150,000 total pods No more than 300,000 total containers You can scale your cluster by adding or removing nodes.
    kubernetes.io/docs/setup/best-practices/cluster-large/
    Registered: Mon Oct 28 08:44:19 UTC 2024
    - 433.6K bytes
    - Viewed (0)
  4. Projected Volumes | Kubernetes

    This document describes projected volumes in Kubernetes. Familiarity with volumes is suggested. Introduction A projected volume maps several existing volume sources into the same directory. Currently, the following types of volume sources can be projected: secret downwardAPI configMap serviceAccountToken clusterTrustBundle All sources are required to be in the same namespace as the Pod. For more details, see the all-in-one volume design document. Example configuration with a secret, a downwardAPI, and a configMap pods/storage/projected-secret-downwardapi-configmap.
    kubernetes.io/docs/concepts/storage/projected-volumes/
    Registered: Mon Oct 28 08:46:11 UTC 2024
    - 462.9K bytes
    - Viewed (0)
  5. Policies | Kubernetes

    Manage security and best-practices with policies.
    kubernetes.io/docs/concepts/policy/
    Registered: Mon Oct 28 08:46:36 UTC 2024
    - 429.4K bytes
    - Viewed (0)
  6. Service ClusterIP allocation | Kubernetes

    In Kubernetes, Services are an abstract way to expose an application running on a set of Pods. Services can have a cluster-scoped virtual IP address (using a Service of type: ClusterIP). Clients can connect using that virtual IP address, and Kubernetes then load-balances traffic to that Service across the different backing Pods. How Service ClusterIPs are allocated? When Kubernetes needs to assign a virtual IP address for a Service, that assignment happens one of two ways:
    kubernetes.io/docs/concepts/services-networking/cluster-ip-allocation/
    Registered: Mon Oct 28 08:46:40 UTC 2024
    - 435.8K bytes
    - Viewed (0)
  7. Node-specific Volume Limits | Kubernetes

    This page describes the maximum number of volumes that can be attached to a Node for various cloud providers. Cloud providers like Google, Amazon, and Microsoft typically have a limit on how many volumes can be attached to a Node. It is important for Kubernetes to respect those limits. Otherwise, Pods scheduled on a Node could get stuck waiting for volumes to attach. Kubernetes default limits The Kubernetes scheduler has default limits on the number of volumes that can be attached to a Node:
    kubernetes.io/docs/concepts/storage/storage-limits/
    Registered: Mon Oct 28 08:47:52 UTC 2024
    - 429.2K bytes
    - Viewed (0)
  8. Kubernetes API Server Bypass Risks | Kubernetes

    Security architecture information relating to the API server and other components
    kubernetes.io/docs/concepts/security/api-server-bypass-risks/
    Registered: Mon Oct 28 08:48:00 UTC 2024
    - 432K bytes
    - Viewed (0)
  9. Device Plugins | Kubernetes

    Device plugins let you configure your cluster with support for devices or resources that require vendor-specific setup, such as GPUs, NICs, FPGAs, or non-volatile main memory.
    kubernetes.io/docs/concepts/extend-kubernetes/compute-storage-net/device-plugins/
    Registered: Mon Oct 28 08:50:05 UTC 2024
    - 456.3K bytes
    - Viewed (0)
  10. Taints and Tolerations | Kubernetes

    Node affinity is a property of Pods that attracts them to a set of nodes (either as a preference or a hard requirement). Taints are the opposite -- they allow a node to repel a set of pods. Tolerations are applied to pods. Tolerations allow the scheduler to schedule pods with matching taints. Tolerations allow scheduling but don't guarantee scheduling: the scheduler also evaluates other parameters as part of its function.
    kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/
    Registered: Mon Oct 28 08:50:36 UTC 2024
    - 454.2K bytes
    - Viewed (0)
Back to top