Search Options

Results per page
Sort
Preferred Languages
Labels
Advance

Popular Words: test

Results 21 - 30 of 629 for host:kubernetes.io (0.03 sec)

  1. Install and Set Up kubectl on macOS | Kubernetes

    Before you begin You must use a kubectl version that is within one minor version difference of your cluster. For example, a v1.31 client can communicate with v1.30, v1.31, and v1.32 control planes. Using the latest compatible version of kubectl helps avoid unforeseen issues. Install kubectl on macOS The following methods exist for installing kubectl on macOS: Install kubectl on macOS Install kubectl binary with curl on macOS Install with Homebrew on macOS Install with Macports on macOS Verify kubectl configuration Optional kubectl configurations and plugins Enable shell autocompletion Install kubectl convert plugin Install kubectl binary with curl on macOS Download the latest release:
    kubernetes.io/docs/tasks/tools/install-kubectl-macos/
    Registered: Mon Oct 28 08:56:31 UTC 2024
    - 461.1K bytes
    - Viewed (0)
  2. Limit Ranges | Kubernetes

    By default, containers run with unbounded compute resources on a Kubernetes cluster. Using Kubernetes resource quotas, administrators (also termed cluster operators) can restrict consumption and creation of cluster resources (such as CPU time, memory, and persistent storage) within a specified namespace. Within a namespace, a Pod can consume as much CPU and memory as is allowed by the ResourceQuotas that apply to that namespace. As a cluster operator, or as a namespace-level administrator, you might also be concerned about making sure that a single object cannot monopolize all available resources within a namespace.
    kubernetes.io/docs/concepts/policy/limit-range/
    Registered: Mon Oct 28 08:55:38 UTC 2024
    - 444.6K bytes
    - Viewed (0)
  3. Pod Topology Spread Constraints | Kubernetes

    You can use topology spread constraints to control how Pods are spread across your cluster among failure-domains such as regions, zones, nodes, and other user-defined topology domains. This can help to achieve high availability as well as efficient resource utilization. You can set cluster-level constraints as a default, or configure topology spread constraints for individual workloads. Motivation Imagine that you have a cluster of up to twenty nodes, and you want to run a workload that automatically scales how many replicas it uses.
    kubernetes.io/docs/concepts/scheduling-eviction/topology-spread-constraints/
    Registered: Mon Oct 28 08:55:45 UTC 2024
    - 483.5K bytes
    - Viewed (0)
  4. Configure DNS for a Cluster | Kubernetes

    Kubernetes offers a DNS cluster addon, which most of the supported environments enable by default. In Kubernetes version 1.11 and later, CoreDNS is recommended and is installed by default with kubeadm. For more information on how to configure CoreDNS for a Kubernetes cluster, see the Customizing DNS Service. An example demonstrating how to use Kubernetes DNS with kube-dns, see the Kubernetes DNS sample plugin.
    kubernetes.io/docs/tasks/access-application-cluster/configure-dns-cluster/
    Registered: Mon Oct 28 09:01:41 UTC 2024
    - 425.7K bytes
    - Viewed (0)
  5. Access Services Running on Clusters | Kubernetes

    This page shows how to connect to services running on the Kubernetes cluster. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube or you can use one of these Kubernetes playgrounds:
    kubernetes.io/docs/tasks/access-application-cluster/access-cluster-services/
    Registered: Mon Oct 28 09:01:45 UTC 2024
    - 435.8K bytes
    - Viewed (0)
  6. Manage Cluster Daemons | Kubernetes

    Perform common tasks for managing a DaemonSet, such as performing a rolling update.
    kubernetes.io/docs/tasks/manage-daemon/
    Registered: Mon Oct 28 09:02:01 UTC 2024
    - 423.2K bytes
    - Viewed (0)
  7. Reserve Compute Resources for System Daemons | ...

    Kubernetes nodes can be scheduled to Capacity. Pods can consume all the available capacity on a node by default. This is an issue because nodes typically run quite a few system daemons that power the OS and Kubernetes itself. Unless resources are set aside for these system daemons, pods and system daemons compete for resources and lead to resource starvation issues on the node. The kubelet exposes a feature named 'Node Allocatable' that helps to reserve compute resources for system daemons.
    kubernetes.io/docs/tasks/administer-cluster/reserve-compute-resources/
    Registered: Mon Oct 28 09:01:17 UTC 2024
    - 440.1K bytes
    - Viewed (0)
  8. Parallel Processing using Expansions | Kubernetes

    This task demonstrates running multiple Jobs based on a common template. You can use this approach to process batches of work in parallel. For this example there are only three items: apple, banana, and cherry. The sample Jobs process each item by printing a string then pausing. See using Jobs in real workloads to learn about how this pattern fits more realistic use cases. Before you begin You should be familiar with the basic, non-parallel, use of Job.
    kubernetes.io/docs/tasks/job/parallel-processing-expansion/
    Registered: Mon Oct 28 09:02:30 UTC 2024
    - 446.1K bytes
    - Viewed (0)
  9. Security For Windows Nodes | Kubernetes

    This page describes security considerations and best practices specific to the Windows operating system. Protection for Secret data on nodes On Windows, data from Secrets are written out in clear text onto the node's local storage (as compared to using tmpfs / in-memory filesystems on Linux). As a cluster operator, you should take both of the following additional measures: Use file ACLs to secure the Secrets' file location. Apply volume-level encryption using BitLocker.
    kubernetes.io/docs/concepts/security/windows-security/
    Registered: Mon Oct 28 08:49:32 UTC 2024
    - 427.9K bytes
    - Viewed (0)
  10. Controlling Access to the Kubernetes API | Kube...

    This page provides an overview of controlling access to the Kubernetes API. Users access the Kubernetes API using kubectl, client libraries, or by making REST requests. Both human users and Kubernetes service accounts can be authorized for API access. When a request reaches the API, it goes through several stages, illustrated in the following diagram: Transport security By default, the Kubernetes API server listens on port 6443 on the first non-localhost network interface, protected by TLS.
    kubernetes.io/docs/concepts/security/controlling-access/
    Registered: Mon Oct 28 08:48:14 UTC 2024
    - 437.3K bytes
    - Viewed (0)
Back to top