- Sort Score
- Result 10 results
- Languages All
- Labels All
Results 221 - 230 of 562 for content_length:[500000 TO 999999] (0.03 sec)
-
Using RBAC Authorization | Kubernetes
Role-based access control (RBAC) is a method of regulating access to computer or network resources based on the roles of individual users within your organization. RBAC authorization uses the rbac.authorization.k8s.io API group to drive authorization decisions, allowing you to dynamically configure policies through the Kubernetes API. To enable RBAC, start the API server with the --authorization-config flag set to a file that includes the RBAC authorizer; for example: apiVersion: apiserver.kubernetes.io/docs/reference/access-authn-authz/rbac/Registered: Wed Sep 03 06:32:55 UTC 2025 - 585K bytes - Viewed (0) -
Set up Konnectivity service | Kubernetes
The Konnectivity service provides a TCP level proxy for the control plane to cluster communication. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube.kubernetes.io/docs/tasks/extend-kubernetes/setup-konnectivity/Registered: Wed Sep 03 06:33:55 UTC 2025 - 499.9K bytes - Viewed (0) -
OpenAPI models - FastAPI
fastapi.tiangolo.com/ko/reference/openapi/models/Registered: Wed Sep 03 06:02:29 UTC 2025 - 683.9K bytes - Viewed (0) -
Horizontal Pod Autoscaling | Kubernetes
In Kubernetes, a HorizontalPodAutoscaler automatically updates a workload resource (such as a Deployment or StatefulSet), with the aim of automatically scaling the workload to match demand. Horizontal scaling means that the response to increased load is to deploy more Pods. This is different from vertical scaling, which for Kubernetes would mean assigning more resources (for example: memory or CPU) to the Pods that are already running for the workload.kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/Registered: Wed Sep 03 06:20:28 UTC 2025 - 507.9K bytes - Viewed (0) -
Connecting Applications with Services | Kubernetes
The Kubernetes model for connecting containers Now that you have a continuously running, replicated application you can expose it on a network. Kubernetes assumes that pods can communicate with other pods, regardless of which host they land on. Kubernetes gives every pod its own cluster-private IP address, so you do not need to explicitly create links between pods or map container ports to host ports. This means that containers within a Pod can all reach each other's ports on localhost, and all pods in a cluster can see each other without NAT.kubernetes.io/docs/tutorials/services/connect-applications-service/Registered: Wed Sep 03 06:28:33 UTC 2025 - 512.5K bytes - Viewed (0) -
Secrets | Kubernetes
A Secret is an object that contains a small amount of sensitive data such as a password, a token, or a key. Such information might otherwise be put in a Pod specification or in a container image. Using a Secret means that you don't need to include confidential data in your application code. Because Secrets can be created independently of the Pods that use them, there is less risk of the Secret (and its data) being exposed during the workflow of creating, viewing, and editing Pods.kubernetes.io/docs/concepts/configuration/secret/Registered: Wed Sep 03 06:01:43 UTC 2025 - 527.7K bytes - Viewed (0) -
Resource Quotas | Kubernetes
When several users or teams share a cluster with a fixed number of nodes, there is a concern that one team could use more than its fair share of resources. Resource quotas are a tool for administrators to address this concern. A resource quota, defined by a ResourceQuota object, provides constraints that limit aggregate resource consumption per namespace. A ResourceQuota can also limit the quantity of objects that can be created in a namespace by API kind, as well as the total amount of infrastructure resources that may be consumed by API objects found in that namespace.kubernetes.io/docs/concepts/policy/resource-quotas/Registered: Wed Sep 03 06:02:59 UTC 2025 - 544.5K bytes - Viewed (0) -
Projected Volumes | Kubernetes
This document describes projected volumes in Kubernetes. Familiarity with volumes is suggested. Introduction A projected volume maps several existing volume sources into the same directory. Currently, the following types of volume sources can be projected: secret downwardAPI configMap serviceAccountToken clusterTrustBundle podCertificate All sources are required to be in the same namespace as the Pod. For more details, see the all-in-one volume design document. Example configuration with a secret, a downwardAPI, and a configMap pods/storage/projected-secret-downwardapi-configmap.kubernetes.io/docs/concepts/storage/projected-volumes/Registered: Wed Sep 03 06:02:20 UTC 2025 - 502.1K bytes - Viewed (0) -
Common Expression Language in Kubernetes | Kube...
The Common Expression Language (CEL) is used in the Kubernetes API to declare validation rules, policy rules, and other constraints or conditions. CEL expressions are evaluated directly in the API server, making CEL a convenient alternative to out-of-process mechanisms, such as webhooks, for many extensibility use cases. Your CEL expressions continue to execute so long as the control plane's API server component remains available. Language overview The CEL language has a straightforward syntax that is similar to the expressions in C, C++, Java, JavaScript and Go.kubernetes.io/docs/reference/using-api/cel/Registered: Wed Sep 03 06:29:34 UTC 2025 - 499.3K bytes - Viewed (0) -
TLS bootstrapping | Kubernetes
In a Kubernetes cluster, the components on the worker nodes - kubelet and kube-proxy - need to communicate with Kubernetes control plane components, specifically kube-apiserver. In order to ensure that communication is kept private, not interfered with, and ensure that each component of the cluster is talking to another trusted component, we strongly recommend using client TLS certificates on nodes. The normal process of bootstrapping these components, especially worker nodes that need certificates so they can communicate safely with kube-apiserver, can be a challenging process as it is often outside of the scope of Kubernetes and requires significant additional work.kubernetes.io/docs/reference/access-authn-authz/kubelet-tls-bootstrapping/Registered: Wed Sep 03 06:30:14 UTC 2025 - 492.9K bytes - Viewed (0)