- Sort Score
- Result 10 results
- Languages All
- Labels All
Popular Words: test
Results 21 - 30 of 669 for timestamp:[now/d-1y TO *] (0.03 sec)
-
Certificate Management with kubeadm | Kubernetes
FEATURE STATE: Kubernetes v1.15 [stable] Client certificates generated by kubeadm expire after 1 year. This page explains how to manage certificate renewals with kubeadm. It also covers other tasks related to kubeadm certificate management. The Kubernetes project recommends upgrading to the latest patch releases promptly, and to ensure that you are running a supported minor release of Kubernetes. Following this recommendation helps you to to stay secure. Before you begin You should be familiar with PKI certificates and requirements in Kubernetes.kubernetes.io/docs/tasks/administer-cluster/kubeadm/kubeadm-certs/Registered: Mon Oct 28 08:53:11 UTC 2024 - 482.1K bytes - Viewed (0) -
Install and Set Up kubectl on macOS | Kubernetes
Before you begin You must use a kubectl version that is within one minor version difference of your cluster. For example, a v1.31 client can communicate with v1.30, v1.31, and v1.32 control planes. Using the latest compatible version of kubectl helps avoid unforeseen issues. Install kubectl on macOS The following methods exist for installing kubectl on macOS: Install kubectl on macOS Install kubectl binary with curl on macOS Install with Homebrew on macOS Install with Macports on macOS Verify kubectl configuration Optional kubectl configurations and plugins Enable shell autocompletion Install kubectl convert plugin Install kubectl binary with curl on macOS Download the latest release:kubernetes.io/docs/tasks/tools/install-kubectl-macos/Registered: Mon Oct 28 08:56:31 UTC 2024 - 461.1K bytes - Viewed (0) -
Limit Ranges | Kubernetes
By default, containers run with unbounded compute resources on a Kubernetes cluster. Using Kubernetes resource quotas, administrators (also termed cluster operators) can restrict consumption and creation of cluster resources (such as CPU time, memory, and persistent storage) within a specified namespace. Within a namespace, a Pod can consume as much CPU and memory as is allowed by the ResourceQuotas that apply to that namespace. As a cluster operator, or as a namespace-level administrator, you might also be concerned about making sure that a single object cannot monopolize all available resources within a namespace.kubernetes.io/docs/concepts/policy/limit-range/Registered: Mon Oct 28 08:55:38 UTC 2024 - 444.6K bytes - Viewed (0) -
Pod Topology Spread Constraints | Kubernetes
You can use topology spread constraints to control how Pods are spread across your cluster among failure-domains such as regions, zones, nodes, and other user-defined topology domains. This can help to achieve high availability as well as efficient resource utilization. You can set cluster-level constraints as a default, or configure topology spread constraints for individual workloads. Motivation Imagine that you have a cluster of up to twenty nodes, and you want to run a workload that automatically scales how many replicas it uses.kubernetes.io/docs/concepts/scheduling-eviction/topology-spread-constraints/Registered: Mon Oct 28 08:55:45 UTC 2024 - 483.5K bytes - Viewed (0) -
Configure DNS for a Cluster | Kubernetes
Kubernetes offers a DNS cluster addon, which most of the supported environments enable by default. In Kubernetes version 1.11 and later, CoreDNS is recommended and is installed by default with kubeadm. For more information on how to configure CoreDNS for a Kubernetes cluster, see the Customizing DNS Service. An example demonstrating how to use Kubernetes DNS with kube-dns, see the Kubernetes DNS sample plugin.kubernetes.io/docs/tasks/access-application-cluster/configure-dns-cluster/Registered: Mon Oct 28 09:01:41 UTC 2024 - 425.7K bytes - Viewed (0) -
Access Services Running on Clusters | Kubernetes
This page shows how to connect to services running on the Kubernetes cluster. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube or you can use one of these Kubernetes playgrounds:kubernetes.io/docs/tasks/access-application-cluster/access-cluster-services/Registered: Mon Oct 28 09:01:45 UTC 2024 - 435.8K bytes - Viewed (0) -
Manage Cluster Daemons | Kubernetes
Perform common tasks for managing a DaemonSet, such as performing a rolling update.kubernetes.io/docs/tasks/manage-daemon/Registered: Mon Oct 28 09:02:01 UTC 2024 - 423.2K bytes - Viewed (0) -
Reserve Compute Resources for System Daemons | ...
Kubernetes nodes can be scheduled to Capacity. Pods can consume all the available capacity on a node by default. This is an issue because nodes typically run quite a few system daemons that power the OS and Kubernetes itself. Unless resources are set aside for these system daemons, pods and system daemons compete for resources and lead to resource starvation issues on the node. The kubelet exposes a feature named 'Node Allocatable' that helps to reserve compute resources for system daemons.kubernetes.io/docs/tasks/administer-cluster/reserve-compute-resources/Registered: Mon Oct 28 09:01:17 UTC 2024 - 440.1K bytes - Viewed (0) -
Parallel Processing using Expansions | Kubernetes
This task demonstrates running multiple Jobs based on a common template. You can use this approach to process batches of work in parallel. For this example there are only three items: apple, banana, and cherry. The sample Jobs process each item by printing a string then pausing. See using Jobs in real workloads to learn about how this pattern fits more realistic use cases. Before you begin You should be familiar with the basic, non-parallel, use of Job.kubernetes.io/docs/tasks/job/parallel-processing-expansion/Registered: Mon Oct 28 09:02:30 UTC 2024 - 446.1K bytes - Viewed (0) -
Security For Windows Nodes | Kubernetes
This page describes security considerations and best practices specific to the Windows operating system. Protection for Secret data on nodes On Windows, data from Secrets are written out in clear text onto the node's local storage (as compared to using tmpfs / in-memory filesystems on Linux). As a cluster operator, you should take both of the following additional measures: Use file ACLs to secure the Secrets' file location. Apply volume-level encryption using BitLocker.kubernetes.io/docs/concepts/security/windows-security/Registered: Mon Oct 28 08:49:32 UTC 2024 - 427.9K bytes - Viewed (0)