- Sort Score
- Result 10 results
- Languages All
- Labels All
Results 151 - 160 of 723 for host:kubernetes.io (0.03 sec)
-
Namespaces Walkthrough | Kubernetes
Kubernetes namespaces help different projects, teams, or customers to share a Kubernetes cluster. It does this by providing the following: A scope for Names. A mechanism to attach authorization and policy to a subsection of the cluster. Use of multiple namespaces is optional. This example demonstrates how to use Kubernetes namespaces to subdivide your cluster. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster.kubernetes.io/docs/tutorials/cluster-management/namespaces-walkthrough/Registered: Fri Jan 16 11:57:49 UTC 2026 - 501.6K bytes - Viewed (0) -
User Impersonation | Kubernetes
User impersonation is a method of allowing authenticated users to act as another user, group, or service account through HTTP headers. A user can act as another user through impersonation headers. These let requests manually override the user info a request authenticates as. For example, an admin could use this feature to debug an authorization policy by temporarily impersonating another user and seeing if a request was denied. Impersonation requests first authenticate as the requesting user, then switch to the impersonated user info.kubernetes.io/docs/reference/access-authn-authz/user-impersonation/Registered: Fri Jan 16 11:57:25 UTC 2026 - 535.6K bytes - Viewed (0) -
Authorization | Kubernetes
Details of Kubernetes authorization mechanisms and supported authorization modes.kubernetes.io/docs/reference/access-authn-authz/authorization/Registered: Fri Jan 16 11:58:45 UTC 2026 - 516.4K bytes - Viewed (0) -
kubeadm init | Kubernetes
This command initializes a Kubernetes control plane node. Synopsis Run this command in order to set up the Kubernetes control plane The "init" command executes the following phases: preflight Run pre-flight checks certs Certificate generation /ca Generate the self-signed Kubernetes CA to provision identities for other Kubernetes components /apiserver Generate the certificate for serving the Kubernetes API /apiserver-kubelet-client Generate the certificate for the API server to connect to kubelet /front-proxy-ca Generate the self-signed CA to provision identities for front proxy /front-proxy-client Generate the certificate for the front proxy client /etcd-ca Generate the self-signed CA to provision identities for etcd /etcd-server Generate the certificate for serving etcd /etcd-peer Generate the certificate for etcd nodes to communicate with each other /etcd-healthcheck-client Generate the certificate for liveness probes to healthcheck etcd /apiserver-etcd-client Generate the certificate the apiserver uses to access etcd /sa Generate a private key for signing service account tokens along with its public key kubeconfig Generate all kubeconfig files necessary to establish the control plane and the admin kubeconfig file /admin Generate a kubeconfig file for the admin to use and for kubeadm itself /super-admin Generate a kubeconfig file for the super-admin /kubelet Generate a kubeconfig file for the kubelet to use *only* for cluster bootstrapping purposes /controller-manager Generate a kubeconfig file for the controller manager to use /scheduler Generate a kubeconfig file for the scheduler to use etcd Generate static Pod manifest file for local etcd /local Generate the static Pod manifest file for a local, single-node local etcd instance control-plane Generate all static Pod manifest files necessary to establish the control plane /apiserver Generates the kube-apiserver static Pod manifest /controller-manager Generates the kube-controller-manager static Pod manifest /scheduler Generates the kube-scheduler static Pod manifest kubelet-start Write kubelet settings and (re)start the kubelet wait-control-plane Wait for the control plane to start upload-config Upload the kubeadm and kubelet configuration to a ConfigMap /kubeadm Upload the kubeadm ClusterConfiguration to a ConfigMap /kubelet Upload the kubelet component config to a ConfigMap upload-certs Upload certificates to kubeadm-certs mark-control-plane Mark a node as a control-plane bootstrap-token Generates bootstrap tokens used to join a node to a cluster kubelet-finalize Updates settings relevant to the kubelet after TLS bootstrap /enable-client-cert-rotation Enable kubelet client certificate rotation addon Install required addons for passing conformance tests /coredns Install the CoreDNS addon to a Kubernetes cluster /kube-proxy Install the kube-proxy addon to a Kubernetes cluster show-join-command Show the join command for control-plane and worker node kubeadm init [flags] Options --apiserver-advertise-address string The IP address the API Server will advertise it's listening on.kubernetes.io/docs/reference/setup-tools/kubeadm/kubeadm-init/Registered: Fri Jan 16 12:05:30 UTC 2026 - 517K bytes - Viewed (0) -
kubectl apply set-last-applied | Kubernetes
Synopsis Set the latest last-applied-configuration annotations by setting it to match the contents of a file. This results in the last-applied-configuration being updated as though 'kubectl apply -f<file> ' was run, without updating any other parts of the object. kubectl apply set-last-applied -f FILENAME Examples # Set the last-applied-configuration of a resource to match the contents of a file kubectl apply set-last-applied -f deploy.yaml # Execute set-last-applied against each configuration file in a directory kubectl apply set-last-applied -f path/ # Set the last-applied-configuration of a resource to match the contents of a file; will create the annotation if it does not already exist kubectl apply set-last-applied -f deploy.kubernetes.io/docs/reference/kubectl/generated/kubectl_apply/kubectl_apply_set-last-applied/Registered: Fri Jan 16 12:06:04 UTC 2026 - 478.7K bytes - Viewed (0) -
Node Labels Populated By The Kubelet | Kubernetes
Kubernetes nodes come pre-populated with a standard set of labels. You can also set your own labels on nodes, either through the kubelet configuration or using the Kubernetes API. Preset labels The preset labels that Kubernetes sets on nodes are: kubernetes.io/arch kubernetes.io/hostname kubernetes.io/os node.kubernetes.io/instance-type (if known to the kubelet – Kubernetes may not have this information to set the label) topology.kubernetes.io/region (if known to the kubelet – Kubernetes may not have this information to set the label) topology.kubernetes.io/docs/reference/node/node-labels/Registered: Fri Jan 16 12:07:23 UTC 2026 - 469.8K bytes - Viewed (0) -
CRI Pod & Container Metrics | Kubernetes
Collection of Pod & Container metrics via the CRI.kubernetes.io/docs/reference/instrumentation/cri-pod-container-metrics/Registered: Fri Jan 16 12:11:56 UTC 2026 - 467.8K bytes - Viewed (0) -
kubectl debug | Kubernetes
Production-Grade Container Orchestrationkubernetes.io/docs/reference/kubectl/generated/kubectl_debug/Registered: Fri Jan 16 12:16:04 UTC 2026 - 480.9K bytes - Viewed (0) -
kubectl port-forward | Kubernetes
Production-Grade Container Orchestrationkubernetes.io/docs/reference/kubectl/generated/kubectl_port-forward/Registered: Fri Jan 16 12:16:40 UTC 2026 - 478.3K bytes - Viewed (0) -
Versions in CustomResourceDefinitions | Kubernetes
This page explains how to add versioning information to CustomResourceDefinitions, to indicate the stability level of your CustomResourceDefinitions or advance your API to a new version with conversion between API representations. It also describes how to upgrade an object from one version to another. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts.kubernetes.io/docs/tasks/extend-kubernetes/custom-resources/custom-resource-definition-versioning/Registered: Fri Jan 16 11:43:13 UTC 2026 - 616K bytes - Viewed (0)