Search Options

Results per page
Sort
Preferred Languages
Labels
Advance

Results 301 - 310 of 562 for content_length:[500000 TO 999999] (0.06 sec)

  1. Configure Service Accounts for Pods | Kubernetes

    Kubernetes offers two distinct ways for clients that run within your cluster, or that otherwise have a relationship to your cluster's control plane to authenticate to the API server. A service account provides an identity for processes that run in a Pod, and maps to a ServiceAccount object. When you authenticate to the API server, you identify yourself as a particular user. Kubernetes recognises the concept of a user, however, Kubernetes itself does not have a User API.
    kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/
    Registered: Wed Sep 03 06:16:27 UTC 2025
    - 503.2K bytes
    - Viewed (0)
  2. Declarative Management of Kubernetes Objects Us...

    Kustomize is a standalone tool to customize Kubernetes objects through a kustomization file. Since 1.14, kubectl also supports the management of Kubernetes objects using a kustomization file. To view resources found in a directory containing a kustomization file, run the following command: kubectl kustomize <kustomization_directory> To apply those resources, run kubectl apply with --kustomize or -k flag: kubectl apply -k <kustomization_directory> Before you begin Install kubectl. You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster.
    kubernetes.io/docs/tasks/manage-kubernetes-objects/kustomization/
    Registered: Wed Sep 03 06:20:01 UTC 2025
    - 559K bytes
    - Viewed (0)
  3. Validate IPv4/IPv6 dual-stack | Kubernetes

    This document shares how to validate IPv4/IPv6 dual-stack enabled Kubernetes clusters. Before you begin Provider support for dual-stack networking (Cloud provider or otherwise must be able to provide Kubernetes nodes with routable IPv4/IPv6 network interfaces) A network plugin that supports dual-stack networking. Dual-stack enabled cluster Your Kubernetes server must be at or later than version v1.23. To check the version, enter kubectl version. Note:While you can validate with an earlier version, the feature is only GA and officially supported since v1.
    kubernetes.io/docs/tasks/network/validate-dual-stack/
    Registered: Wed Sep 03 06:30:23 UTC 2025
    - 488.6K bytes
    - Viewed (0)
  4. Namespaces Walkthrough | Kubernetes

    Kubernetes namespaces help different projects, teams, or customers to share a Kubernetes cluster. It does this by providing the following: A scope for Names. A mechanism to attach authorization and policy to a subsection of the cluster. Use of multiple namespaces is optional. This example demonstrates how to use Kubernetes namespaces to subdivide your cluster. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster.
    kubernetes.io/docs/tutorials/cluster-management/namespaces-walkthrough/
    Registered: Wed Sep 03 06:30:50 UTC 2025
    - 488.5K bytes
    - Viewed (0)
  5. Pod Lifecycle | Kubernetes

    This page describes the lifecycle of a Pod. Pods follow a defined lifecycle, starting in the Pending phase, moving through Running if at least one of its primary containers starts OK, and then through either the Succeeded or Failed phases depending on whether any container in the Pod terminated in failure. Like individual application containers, Pods are considered to be relatively ephemeral (rather than durable) entities. Pods are created, assigned a unique ID (UID), and scheduled to run on nodes where they remain until termination (according to restart policy) or deletion.
    kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/
    Registered: Wed Sep 03 06:02:51 UTC 2025
    - 531.2K bytes
    - Viewed (0)
  6. Distribute Credentials Securely Using Secrets |...

    This page shows how to securely inject sensitive data, such as passwords and encryption keys, into Pods. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube or you can use one of these Kubernetes playgrounds:
    kubernetes.io/docs/tasks/inject-data-application/distribute-credentials-secure/
    Registered: Wed Sep 03 06:18:52 UTC 2025
    - 507.1K bytes
    - Viewed (0)
  7. Configure GMSA for Windows Pods and containers ...

    FEATURE STATE: Kubernetes v1.18 [stable] This page shows how to configure Group Managed Service Accounts (GMSA) for Pods and containers that will run on Windows nodes. Group Managed Service Accounts are a specific type of Active Directory account that provides automatic password management, simplified service principal name (SPN) management, and the ability to delegate the management to other administrators across multiple servers. In Kubernetes, GMSA credential specs are configured at a Kubernetes cluster-wide scope as Custom Resources.
    kubernetes.io/docs/tasks/configure-pod-container/configure-gmsa/
    Registered: Wed Sep 03 06:17:46 UTC 2025
    - 490.6K bytes
    - Viewed (0)
  8. Dynamic Resource Allocation | Kubernetes

    FEATURE STATE: Kubernetes v1.34 [stable] (enabled by default: true) This page describes dynamic resource allocation (DRA) in Kubernetes. About DRA DRA is a Kubernetes feature that lets you request and share resources among Pods. These resources are often attached devices like hardware accelerators. With DRA, device drivers and cluster admins define device classes that are available to claim in workloads. Kubernetes allocates matching devices to specific claims and places the corresponding Pods on nodes that can access the allocated devices.
    kubernetes.io/docs/concepts/scheduling-eviction/dynamic-resource-allocation/
    Registered: Wed Sep 03 06:10:44 UTC 2025
    - 534K bytes
    - Viewed (0)
  9. Node-pressure Eviction | Kubernetes

    Node-pressure eviction is the process by which the kubelet proactively terminates pods to reclaim resource on nodes. The kubelet monitors resources like memory, disk space, and filesystem inodes on your cluster's nodes. When one or more of these resources reach specific consumption levels, the kubelet can proactively fail one or more pods on the node to reclaim resources and prevent starvation. During a node-pressure eviction, the kubelet sets the phase for the selected pods to Failed, and terminates the Pod.
    kubernetes.io/docs/concepts/scheduling-eviction/node-pressure-eviction/
    Registered: Wed Sep 03 06:10:48 UTC 2025
    - 491.2K bytes
    - Viewed (0)
  10. Run a Replicated Stateful Application | Kubernetes

    This page shows how to run a replicated stateful application using a StatefulSet. This application is a replicated MySQL database. The example topology has a single primary server and multiple replicas, using asynchronous row-based replication. Note:This is not a production configuration. MySQL settings remain on insecure defaults to keep the focus on general patterns for running stateful applications in Kubernetes. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster.
    kubernetes.io/docs/tasks/run-application/run-replicated-stateful-application/
    Registered: Wed Sep 03 06:23:54 UTC 2025
    - 526.7K bytes
    - Viewed (0)
Back to top