Search Options

Results per page
Sort
Preferred Languages
Labels
Advance

Results 11 - 20 of 723 for host:kubernetes.io (0.03 sec)

  1. Romana for NetworkPolicy | Kubernetes

    This page shows how to use Romana for NetworkPolicy. Before you begin Complete steps 1, 2, and 3 of the kubeadm getting started guide. Installing Romana with kubeadm Follow the containerized installation guide for kubeadm. Applying network policies To apply network policies use one of the following: Romana network policies. Example of Romana network policy. The NetworkPolicy API. What's next Once you have installed Romana, you can follow the Declare Network Policy to try out Kubernetes NetworkPolicy.
    kubernetes.io/docs/tasks/administer-cluster/network-policy-provider/romana-network-policy/
    Registered: Mon Jan 26 06:48:24 UTC 2026
    - 469.5K bytes
    - Viewed (0)
  2. Pull an Image from a Private Registry | Kubernetes

    This page shows how to create a Pod that uses a Secret to pull an image from a private container image registry or repository. There are many private registries in use. This task uses Docker Hub as an example registry. ๐Ÿ›‡ This item links to a third party project or product that is not part of Kubernetes itself. More information Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster.
    kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
    Registered: Mon Jan 26 06:48:37 UTC 2026
    - 492K bytes
    - Viewed (0)
  3. Kubernetes Object Management | Kubernetes

    The kubectl command-line tool supports several different ways to create and manage Kubernetes objects. This document provides an overview of the different approaches. Read the Kubectl book for details of managing objects by Kubectl. Management techniques Warning:A Kubernetes object should be managed using only one technique. Mixing and matching techniques for the same object results in undefined behavior. Management technique Operates on Recommended environment Supported writers Learning curve Imperative commands Live objects Development projects 1+ Lowest Imperative object configuration Individual files Production projects 1 Moderate Declarative object configuration Directories of files Production projects 1+ Highest Imperative commands When using imperative commands, a user operates directly on live objects in a cluster.
    kubernetes.io/docs/concepts/overview/working-with-objects/object-management/
    Registered: Mon Jan 26 06:26:15 UTC 2026
    - 479.8K bytes
    - Viewed (0)
  4. Kubernetes Components | Kubernetes

    An overview of the key components that make up a Kubernetes cluster.
    kubernetes.io/docs/concepts/overview/components/
    Registered: Mon Jan 26 06:26:03 UTC 2026
    - 472.8K bytes
    - Viewed (0)
  5. Mixed Version Proxy | Kubernetes

    FEATURE STATE: Kubernetes v1.28 [alpha](disabled by default) Kubernetes 1.35 includes an alpha feature that lets an API Server proxy resource requests to other peer API servers. It also lets clients get a holistic view of resources served across the entire cluster through discovery. This is useful when there are multiple API servers running different versions of Kubernetes in one cluster (for example, during a long-lived rollout to a new release of Kubernetes).
    kubernetes.io/docs/concepts/architecture/mixed-version-proxy/
    Registered: Mon Jan 26 06:26:31 UTC 2026
    - 477.8K bytes
    - Viewed (0)
  6. Advanced Pod Configuration | Kubernetes

    This page covers advanced Pod configuration topics including PriorityClasses, RuntimeClasses, security context within Pods, and introduces aspects of scheduling. PriorityClasses PriorityClasses allow you to set the importance of Pods relative to other Pods. If you assign a priority class to a Pod, Kubernetes sets the .spec.priority field for that Pod based on the PriorityClass you specified (you cannot set .spec.priority directly). If or when a Pod cannot be scheduled, and the problem is due to a lack of resources, the kube-scheduler tries to preempt lower priority Pods, in order to make scheduling of the higher priority Pod possible.
    kubernetes.io/docs/concepts/workloads/pods/advanced-pod-config/
    Registered: Mon Jan 26 06:27:37 UTC 2026
    - 506.4K bytes
    - Viewed (0)
  7. Kubernetes Self-Healing | Kubernetes

    Kubernetes is designed with self-healing capabilities that help maintain the health and availability of workloads. It automatically replaces failed containers, reschedules workloads when nodes become unavailable, and ensures that the desired state of the system is maintained. Self-Healing capabilities Container-level restarts: If a container inside a Pod fails, Kubernetes restarts it based on the restartPolicy. Replica replacement: If a Pod in a Deployment or StatefulSet fails, Kubernetes creates a replacement Pod to maintain the specified number of replicas.
    kubernetes.io/docs/concepts/architecture/self-healing/
    Registered: Mon Jan 26 06:29:13 UTC 2026
    - 470.8K bytes
    - Viewed (0)
  8. EndpointSlices | Kubernetes

    The EndpointSlice API is the mechanism that Kubernetes uses to let your Service scale to handle large numbers of backends, and allows the cluster to update its list of healthy backends efficiently.
    kubernetes.io/docs/concepts/services-networking/endpoint-slices/
    Registered: Mon Jan 26 06:38:00 UTC 2026
    - 483.8K bytes
    - Viewed (0)
  9. Resource Management for Windows nodes | Kubernetes

    This page outlines the differences in how resources are managed between Linux and Windows. On Linux nodes, cgroups are used as a pod boundary for resource control. Containers are created within that boundary for network, process and file system isolation. The Linux cgroup APIs can be used to gather CPU, I/O, and memory use statistics. In contrast, Windows uses a job object per container with a system namespace filter to contain all processes in a container and provide logical isolation from the host.
    kubernetes.io/docs/concepts/configuration/windows-resource-management/
    Registered: Mon Jan 26 06:37:36 UTC 2026
    - 472.6K bytes
    - Viewed (0)
  10. Linux kernel security constraints for Pods and ...

    Overview of Linux kernel security modules and constraints that you can use to harden your Pods and containers.
    kubernetes.io/docs/concepts/security/linux-kernel-security-constraints/
    Registered: Mon Jan 26 06:37:41 UTC 2026
    - 481.9K bytes
    - Viewed (0)
Back to top