- Sort Score
- Result 10 results
- Languages All
- Labels All
Results 121 - 130 of 686 for host:kubernetes.io (0.03 sec)
-
Manual Rotation of CA Certificates | Kubernetes
This page shows how to manually rotate the certificate authority (CA) certificates. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube or you can use one of these Kubernetes playgrounds:kubernetes.io/docs/tasks/tls/manual-rotation-of-ca-certificates/Registered: Mon May 26 05:58:57 UTC 2025 - 459.3K bytes - Viewed (0) -
kubectl config get-contexts | Kubernetes
Synopsis Display one or many contexts from the kubeconfig file. kubectl config get-contexts [(-o|--output=)name)] Examples # List all the contexts in your kubeconfig file kubectl config get-contexts # Describe one context in your kubeconfig file kubectl config get-contexts my-context Options -h, --help help for get-contexts --no-headers When using the default or custom-column output format, don't print headers (default print headers). -o, --output string Output format. One of: (name). Parent Options Inherited --as string Username to impersonate for the operation.kubernetes.io/docs/reference/kubectl/generated/kubectl_config/kubectl_config_get-contexts/Registered: Mon May 26 06:15:29 UTC 2025 - 454.2K bytes - Viewed (0) -
CRI Pod & Container Metrics | Kubernetes
Collection of Pod & Container metrics via the CRI.kubernetes.io/docs/reference/instrumentation/cri-pod-container-metrics/Registered: Mon May 26 06:14:58 UTC 2025 - 446K bytes - Viewed (0) -
kubectl port-forward | Kubernetes
Production-Grade Container Orchestrationkubernetes.io/docs/reference/kubectl/generated/kubectl_port-forward/Registered: Mon May 26 06:19:31 UTC 2025 - 456.6K bytes - Viewed (0) -
Client Authentication (v1beta1) | Kubernetes
Resource Types ExecCredential ExecCredential ExecCredential is used by exec-based plugins to communicate credentials to HTTP transports. FieldDescription apiVersionstringclient.authentication.k8s.io/v1beta1 kindstringExecCredential spec [Required] ExecCredentialSpec Spec holds information passed to the plugin by the transport. status ExecCredentialStatus Status is filled in by the plugin and holds the credentials that the transport should use to contact the API. Cluster Appears in: ExecCredentialSpec Cluster contains information to allow an exec plugin to communicate with the kubernetes cluster being authenticated to.kubernetes.io/docs/reference/config-api/client-authentication.v1beta1/ Similar Results (1)Registered: Mon May 26 06:34:50 UTC 2025 - 452.5K bytes - Viewed (0) -
Changing the Container Runtime on a Node from D...
This task outlines the steps needed to update your container runtime to containerd from Docker. It is applicable for cluster operators running Kubernetes 1.23 or earlier. This also covers an example scenario for migrating from dockershim to containerd. Alternative container runtimes can be picked from this page. Before you begin Note: This section links to third party projects that provide functionality required by Kubernetes. The Kubernetes project authors aren't responsible for these projects, which are listed alphabetically.kubernetes.io/docs/tasks/administer-cluster/migrating-from-dockershim/change-runtime-containerd/Registered: Mon May 26 05:46:27 UTC 2025 - 460.7K bytes - Viewed (0) -
Apply Pod Security Standards at the Cluster Lev...
Note This tutorial applies only for new clusters. Pod Security is an admission controller that carries out checks against the Kubernetes Pod Security Standards when new pods are created. It is a feature GA'ed in v1.25. This tutorial shows you how to enforce the baseline Pod Security Standard at the cluster level which applies a standard configuration to all namespaces in a cluster. To apply Pod Security Standards to specific namespaces, refer to Apply Pod Security Standards at the namespace level.kubernetes.io/docs/tutorials/security/cluster-level-pss/Registered: Mon May 26 06:05:01 UTC 2025 - 465.9K bytes - Viewed (0) -
Reference | Kubernetes
Production-Grade Container Orchestrationkubernetes.io/docs/reference/Registered: Mon May 26 06:04:50 UTC 2025 - 453.1K bytes - Viewed (0) -
Dynamic Admission Control | Kubernetes
In addition to compiled-in admission plugins, admission plugins can be developed as extensions and run as webhooks configured at runtime. This page describes how to build, configure, use, and monitor admission webhooks. What are admission webhooks? Admission webhooks are HTTP callbacks that receive admission requests and do something with them. You can define two types of admission webhooks, validating admission webhook and mutating admission webhook. Mutating admission webhooks are invoked first, and can modify objects sent to the API server to enforce custom defaults.kubernetes.io/docs/reference/access-authn-authz/extensible-admission-controllers/Registered: Mon May 26 06:05:43 UTC 2025 - 582.1K bytes - Viewed (0) -
Container Runtime Interface (CRI) | Kubernetes
The CRI is a plugin interface which enables the kubelet to use a wide variety of container runtimes, without having a need to recompile the cluster components. You need a working container runtime on each Node in your cluster, so that the kubelet can launch Pods and their containers. The Container Runtime Interface (CRI) is the main protocol for the communication between the kubelet and Container Runtime. The Kubernetes Container Runtime Interface (CRI) defines the main gRPC protocol for the communication between the node components kubelet and container runtime.kubernetes.io/docs/concepts/architecture/cri/Registered: Mon May 26 05:34:44 UTC 2025 - 450.2K bytes - Viewed (0)