- Sort Score
- Result 10 results
- Languages All
- Labels All
Results 1701 - 1710 of about 10,000 for content_length:[100000 TO 499999] (0.98 sec)
-
Expose Pod Information to Containers Through En...
This page shows how a Pod can use environment variables to expose information about itself to containers running in the Pod, using the downward API. You can use environment variables to expose Pod fields, container fields, or both. In Kubernetes, there are two ways to expose Pod and container fields to a running container: Environment variables, as explained in this task Volume files Together, these two ways of exposing Pod and container fields are called the downward API.kubernetes.io/docs/tasks/inject-data-application/environment-variable-expose-pod-information/Registered: Wed Apr 16 06:17:52 UTC 2025 - 460.1K bytes - Viewed (0) -
Mutating Admission Policy | Kubernetes
FEATURE STATE: Kubernetes v1.32 [alpha] This page provides an overview of MutatingAdmissionPolicies. What are MutatingAdmissionPolicies? Mutating admission policies offer a declarative, in-process alternative to mutating admission webhooks. Mutating admission policies use the Common Expression Language (CEL) to declare mutations to resources. Mutations can be defined either with an apply configuration that is merged using the server side apply merge strategy, or a JSON patch. Mutating admission policies are highly configurable, enabling policy authors to define policies that can be parameterized and scoped to resources as needed by cluster administrators.kubernetes.io/docs/reference/access-authn-authz/mutating-admission-policy/Registered: Wed Apr 16 06:23:36 UTC 2025 - 463.5K bytes - Viewed (0) -
Configuration file :: Apache Log4j
Edit this Page Configuration file Using a configuration file is the most popular and recommended approach for configu...logging.apache.org/log4j/2.x/manual/configuration.htmlRegistered: Wed Apr 16 06:23:47 UTC 2025 - Last Modified: Thu Jan 23 12:08:55 UTC 2025 - 127.2K bytes - Viewed (0) -
Kubernetes Deprecation Policy | Kubernetes
This document details the deprecation policy for various facets of the system. Kubernetes is a large system with many components and many contributors. As with any such software, the feature set naturally evolves over time, and sometimes a feature may need to be removed. This could include an API, a flag, or even an entire feature. To avoid breaking existing users, Kubernetes follows a deprecation policy for aspects of the system that are slated to be removed.kubernetes.io/docs/reference/using-api/deprecation-policy/Registered: Wed Apr 16 06:24:17 UTC 2025 - 454.2K bytes - Viewed (0) -
WebSockets - FastAPI
fastapi.tiangolo.com/az/reference/websockets/Registered: Wed Apr 16 06:24:38 UTC 2025 - 223.8K bytes - Viewed (0) -
Kubelet authentication/authorization | Kubernetes
Overview A kubelet's HTTPS endpoint exposes APIs which give access to data of varying sensitivity, and allow you to perform operations with varying levels of power on the node and within containers. This document describes how to authenticate and authorize access to the kubelet's HTTPS endpoint. Kubelet authentication By default, requests to the kubelet's HTTPS endpoint that are not rejected by other configured authentication methods are treated as anonymous requests, and given a username of system:anonymous and a group of system:unauthenticated.kubernetes.io/docs/reference/access-authn-authz/kubelet-authn-authz/Registered: Wed Apr 16 06:24:47 UTC 2025 - 439.7K bytes - Viewed (0) -
Explore Termination Behavior for Pods And Their...
Once you connected your Application with Service following steps like those outlined in Connecting Applications with Services, you have a continuously running, replicated application, that is exposed on a network. This tutorial helps you look at the termination flow for Pods and to explore ways to implement graceful connection draining. Termination process for Pods and their endpoints There are often cases when you need to terminate a Pod - be it to upgrade or scale down.kubernetes.io/docs/tutorials/services/pods-and-endpoint-termination-flow/Registered: Wed Apr 16 06:24:11 UTC 2025 - 451K bytes - Viewed (0) -
Repository Management - FastAPI
fastapi.tiangolo.com/uk/management/Registered: Wed Apr 16 06:13:49 UTC 2025 - 112.7K bytes - Viewed (0) -
Running Kubernetes Node Components as a Non-roo...
FEATURE STATE: Kubernetes v1.22 [alpha] This document describes how to run Kubernetes Node components such as kubelet, CRI, OCI, and CNI without root privileges, by using a user namespace. This technique is also known as rootless mode. Note:This document describes how to run Kubernetes Node components (and hence pods) as a non-root user. If you are just looking for how to run a pod as a non-root user, see SecurityContext.kubernetes.io/docs/tasks/administer-cluster/kubelet-in-userns/Registered: Wed Apr 16 06:13:18 UTC 2025 - 455.2K bytes - Viewed (0) -
Migrate Kubernetes Objects Using Storage Versio...
FEATURE STATE: Kubernetes v1.30 [alpha] (enabled by default: false) Kubernetes relies on API data being actively re-written, to support some maintenance activities related to at rest storage. Two prominent examples are the versioned schema of stored resources (that is, the preferred storage schema changing from v1 to v2 for a given resource) and encryption at rest (that is, rewriting stale data based on a change in how the data should be encrypted).kubernetes.io/docs/tasks/manage-kubernetes-objects/storage-version-migration/Registered: Wed Apr 16 06:13:22 UTC 2025 - 477.1K bytes - Viewed (0)