- Sort Score
- Result 10 results
- Languages All
- Labels All
Results 311 - 320 of 686 for host:kubernetes.io (0.09 sec)
-
Define Dependent Environment Variables | Kubern...
This page shows how to define dependent environment variables for a container in a Kubernetes Pod. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube or you can use one of these Kubernetes playgrounds:kubernetes.io/docs/tasks/inject-data-application/define-interdependent-environment-variables/Registered: Wed Jun 04 07:02:34 UTC 2025 - 458K bytes - Viewed (0) -
Mutating Admission Policy | Kubernetes
FEATURE STATE: Kubernetes v1.32 [alpha] This page provides an overview of MutatingAdmissionPolicies. What are MutatingAdmissionPolicies? Mutating admission policies offer a declarative, in-process alternative to mutating admission webhooks. Mutating admission policies use the Common Expression Language (CEL) to declare mutations to resources. Mutations can be defined either with an apply configuration that is merged using the server side apply merge strategy, or a JSON patch. Mutating admission policies are highly configurable, enabling policy authors to define policies that can be parameterized and scoped to resources as needed by cluster administrators.kubernetes.io/docs/reference/access-authn-authz/mutating-admission-policy/Registered: Wed Jun 04 07:12:57 UTC 2025 - 476.9K bytes - Viewed (0) -
Kubelet authentication/authorization | Kubernetes
Overview A kubelet's HTTPS endpoint exposes APIs which give access to data of varying sensitivity, and allow you to perform operations with varying levels of power on the node and within containers. This document describes how to authenticate and authorize access to the kubelet's HTTPS endpoint. Kubelet authentication By default, requests to the kubelet's HTTPS endpoint that are not rejected by other configured authentication methods are treated as anonymous requests, and given a username of system:anonymous and a group of system:unauthenticated.kubernetes.io/docs/reference/access-authn-authz/kubelet-authn-authz/Registered: Wed Jun 04 07:12:48 UTC 2025 - 453.1K bytes - Viewed (0) -
Configure a Security Context for a Pod or Conta...
A security context defines privilege and access control settings for a Pod or Container. Security context settings include, but are not limited to: Discretionary Access Control: Permission to access an object, like a file, is based on user ID (UID) and group ID (GID). Security Enhanced Linux (SELinux): Objects are assigned security labels. Running as privileged or unprivileged. Linux Capabilities: Give a process some privileges, but not all the privileges of the root user.kubernetes.io/docs/tasks/configure-pod-container/security-context/Registered: Wed Jun 04 06:59:22 UTC 2025 - 526.7K bytes - Viewed (0) -
Accessing Clusters | Kubernetes
This topic discusses multiple ways to interact with clusters. Accessing for the first time with kubectl When accessing the Kubernetes API for the first time, we suggest using the Kubernetes CLI, kubectl. To access a cluster, you need to know the location of the cluster and have credentials to access it. Typically, this is automatically set-up when you work through a Getting started guide, or someone else set up the cluster and provided you with credentials and a location.kubernetes.io/docs/tasks/access-application-cluster/access-cluster/Registered: Wed Jun 04 07:00:56 UTC 2025 - 464.3K bytes - Viewed (0) -
Command line tool (kubectl) | Kubernetes
Production-Grade Container Orchestrationkubernetes.io/docs/reference/kubectl/Registered: Wed Jun 04 07:17:39 UTC 2025 - 493.8K bytes - Viewed (0) -
Setup tools | Kubernetes
Production-Grade Container Orchestrationkubernetes.io/docs/reference/setup-tools/Registered: Wed Jun 04 07:17:44 UTC 2025 - 444.2K bytes - Viewed (0) -
kubeadm init phase | Kubernetes
kubeadm init phase enables you to invoke atomic steps of the bootstrap process. Hence, you can let kubeadm do some of the work and you can fill in the gaps if you wish to apply customization. kubeadm init phase is consistent with the kubeadm init workflow, and behind the scene both use the same code. kubeadm init phase preflight Using this command you can execute preflight checks on a control-plane node.kubernetes.io/docs/reference/setup-tools/kubeadm/kubeadm-init-phase/Registered: Wed Jun 04 07:25:13 UTC 2025 - 555.5K bytes - Viewed (0) -
kubectl auth can-i | Kubernetes
Synopsis Check whether an action is allowed. VERB is a logical Kubernetes API verb like 'get', 'list', 'watch', 'delete', etc. TYPE is a Kubernetes resource. Shortcuts and groups will be resolved. NONRESOURCEURL is a partial URL that starts with "/". NAME is the name of a particular Kubernetes resource. This command pairs nicely with impersonation. See --as global flag. kubectl auth can-i VERB [TYPE | TYPE/NAME | NONRESOURCEURL] Examples # Check to see if I can create pods in any namespace kubectl auth can-i create pods --all-namespaces # Check to see if I can list deployments in my current namespace kubectl auth can-i list deployments.kubernetes.io/docs/reference/kubectl/generated/kubectl_auth/kubectl_auth_can-i/Registered: Wed Jun 04 07:24:55 UTC 2025 - 456K bytes - Viewed (0) -
kubectl config set | Kubernetes
Synopsis Set an individual value in a kubeconfig file. PROPERTY_NAME is a dot delimited name where each token represents either an attribute name or a map key. Map keys may not contain dots. PROPERTY_VALUE is the new value you want to set. Binary fields such as 'certificate-authority-data' expect a base64 encoded string unless the --set-raw-bytes flag is used. Specifying an attribute name that already exists will merge new fields on top of existing values.kubernetes.io/docs/reference/kubectl/generated/kubectl_config/kubectl_config_set/Registered: Wed Jun 04 07:24:38 UTC 2025 - 454.3K bytes - Viewed (0)