- Sort Score
- Result 10 results
- Languages All
- Labels All
Results 311 - 320 of 685 for host:kubernetes.io (0.03 sec)
-
Kubernetes Metrics Reference | Kubernetes
Details of the metric data that Kubernetes components export.kubernetes.io/docs/reference/instrumentation/metrics/Registered: Wed Apr 16 06:29:32 UTC 2025 - 698.3K bytes - Viewed (0) -
kubectl attach | Kubernetes
Production-Grade Container Orchestrationkubernetes.io/docs/reference/kubectl/generated/kubectl_attach/Registered: Wed Apr 16 06:29:53 UTC 2025 - 441.4K bytes - Viewed (0) -
Extend kubectl with plugins | Kubernetes
Extend kubectl by creating and installing kubectl plugins.kubernetes.io/docs/tasks/extend-kubectl/kubectl-plugins/Registered: Wed Apr 16 06:17:38 UTC 2025 - 454.5K bytes - Viewed (0) -
Expose Pod Information to Containers Through En...
This page shows how a Pod can use environment variables to expose information about itself to containers running in the Pod, using the downward API. You can use environment variables to expose Pod fields, container fields, or both. In Kubernetes, there are two ways to expose Pod and container fields to a running container: Environment variables, as explained in this task Volume files Together, these two ways of exposing Pod and container fields are called the downward API.kubernetes.io/docs/tasks/inject-data-application/environment-variable-expose-pod-information/Registered: Wed Apr 16 06:17:52 UTC 2025 - 460.1K bytes - Viewed (0) -
Mutating Admission Policy | Kubernetes
FEATURE STATE: Kubernetes v1.32 [alpha] This page provides an overview of MutatingAdmissionPolicies. What are MutatingAdmissionPolicies? Mutating admission policies offer a declarative, in-process alternative to mutating admission webhooks. Mutating admission policies use the Common Expression Language (CEL) to declare mutations to resources. Mutations can be defined either with an apply configuration that is merged using the server side apply merge strategy, or a JSON patch. Mutating admission policies are highly configurable, enabling policy authors to define policies that can be parameterized and scoped to resources as needed by cluster administrators.kubernetes.io/docs/reference/access-authn-authz/mutating-admission-policy/Registered: Wed Apr 16 06:23:36 UTC 2025 - 463.5K bytes - Viewed (0) -
Authenticating | Kubernetes
This page provides an overview of authentication. Users in Kubernetes All Kubernetes clusters have two categories of users: service accounts managed by Kubernetes, and normal users. It is assumed that a cluster-independent service manages normal users in the following ways: an administrator distributing private keys a user store like Keystone or Google Accounts a file with a list of usernames and passwords In this regard, Kubernetes does not have objects which represent normal user accounts.kubernetes.io/docs/reference/access-authn-authz/authentication/Registered: Wed Apr 16 06:23:41 UTC 2025 - 649.2K bytes - Viewed (0) -
Kubernetes Deprecation Policy | Kubernetes
This document details the deprecation policy for various facets of the system. Kubernetes is a large system with many components and many contributors. As with any such software, the feature set naturally evolves over time, and sometimes a feature may need to be removed. This could include an API, a flag, or even an entire feature. To avoid breaking existing users, Kubernetes follows a deprecation policy for aspects of the system that are slated to be removed.kubernetes.io/docs/reference/using-api/deprecation-policy/Registered: Wed Apr 16 06:24:17 UTC 2025 - 454.2K bytes - Viewed (0) -
StatefulSet Basics | Kubernetes
This tutorial provides an introduction to managing applications with StatefulSets. It demonstrates how to create, delete, scale, and update the Pods of StatefulSets. Before you begin Before you begin this tutorial, you should familiarize yourself with the following Kubernetes concepts: Pods Cluster DNS Headless Services PersistentVolumes PersistentVolume Provisioning The kubectl command line tool You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster.kubernetes.io/docs/tutorials/stateful-application/basic-stateful-set/Registered: Wed Apr 16 06:24:22 UTC 2025 - 528.3K bytes - Viewed (0) -
Kubelet authentication/authorization | Kubernetes
Overview A kubelet's HTTPS endpoint exposes APIs which give access to data of varying sensitivity, and allow you to perform operations with varying levels of power on the node and within containers. This document describes how to authenticate and authorize access to the kubelet's HTTPS endpoint. Kubelet authentication By default, requests to the kubelet's HTTPS endpoint that are not rejected by other configured authentication methods are treated as anonymous requests, and given a username of system:anonymous and a group of system:unauthenticated.kubernetes.io/docs/reference/access-authn-authz/kubelet-authn-authz/Registered: Wed Apr 16 06:24:47 UTC 2025 - 439.7K bytes - Viewed (0) -
Explore Termination Behavior for Pods And Their...
Once you connected your Application with Service following steps like those outlined in Connecting Applications with Services, you have a continuously running, replicated application, that is exposed on a network. This tutorial helps you look at the termination flow for Pods and to explore ways to implement graceful connection draining. Termination process for Pods and their endpoints There are often cases when you need to terminate a Pod - be it to upgrade or scale down.kubernetes.io/docs/tutorials/services/pods-and-endpoint-termination-flow/Registered: Wed Apr 16 06:24:11 UTC 2025 - 451K bytes - Viewed (0)