- Sort Score
- Result 10 results
- Languages All
- Labels All
Results 321 - 330 of 699 for host:kubernetes.io (1.5 sec)
-
Security For Windows Nodes | Kubernetes
This page describes security considerations and best practices specific to the Windows operating system. Protection for Secret data on nodes On Windows, data from Secrets are written out in clear text onto the node's local storage (as compared to using tmpfs / in-memory filesystems on Linux). As a cluster operator, you should take both of the following additional measures: Use file ACLs to secure the Secrets' file location. Apply volume-level encryption using BitLocker.kubernetes.io/docs/concepts/security/windows-security/Registered: Wed Sep 03 06:00:38 UTC 2025 - 457.3K bytes - Viewed (0) -
Configuration Best Practices | Kubernetes
This document highlights and consolidates configuration best practices that are introduced throughout the user guide, Getting Started documentation, and examples. This is a living document. If you think of something that is not on this list but might be useful to others, please don't hesitate to file an issue or submit a PR. General Configuration Tips When defining configurations, specify the latest stable API version. Configuration files should be stored in version control before being pushed to the cluster.kubernetes.io/docs/concepts/configuration/overview/Registered: Wed Sep 03 05:59:42 UTC 2025 - 465.6K bytes - Viewed (0) -
About cgroup v2 | Kubernetes
On Linux, control groups constrain resources that are allocated to processes. The kubelet and the underlying container runtime need to interface with cgroups to enforce resource management for pods and containers which includes cpu/memory requests and limits for containerized workloads. There are two versions of cgroups in Linux: cgroup v1 and cgroup v2. cgroup v2 is the new generation of the cgroup API. What is cgroup v2? FEATURE STATE: Kubernetes v1.kubernetes.io/docs/concepts/architecture/cgroups/Registered: Wed Sep 03 05:59:46 UTC 2025 - 461.9K bytes - Viewed (0) -
Pod Security Standards | Kubernetes
A detailed look at the different policy levels defined in the Pod Security Standards.kubernetes.io/docs/concepts/security/pod-security-standards/Registered: Wed Sep 03 05:59:50 UTC 2025 - 478.8K bytes - Viewed (0) -
Dynamic Volume Provisioning | Kubernetes
Dynamic volume provisioning allows storage volumes to be created on-demand. Without dynamic provisioning, cluster administrators have to manually make calls to their cloud or storage provider to create new storage volumes, and then create PersistentVolume objects to represent them in Kubernetes. The dynamic provisioning feature eliminates the need for cluster administrators to pre-provision storage. Instead, it automatically provisions storage when users create PersistentVolumeClaim objects. Background The implementation of dynamic volume provisioning is based on the API object StorageClass from the API group storage.kubernetes.io/docs/concepts/storage/dynamic-provisioning/Registered: Wed Sep 03 06:00:57 UTC 2025 - 465.7K bytes - Viewed (0) -
Security For Linux Nodes | Kubernetes
This page describes security considerations and best practices specific to the Linux operating system. Protection for Secret data on nodes On Linux nodes, memory-backed volumes (such as secret volume mounts, or emptyDir with medium: Memory) are implemented with a tmpfs filesystem. If you have swap configured and use an older Linux kernel (or a current kernel and an unsupported configuration of Kubernetes), memory backed volumes can have data written to persistent storage.kubernetes.io/docs/concepts/security/linux-security/Registered: Wed Sep 03 06:01:24 UTC 2025 - 455.2K bytes - Viewed (0) -
Controlling Access to the Kubernetes API | Kube...
This page provides an overview of controlling access to the Kubernetes API. Users access the Kubernetes API using kubectl, client libraries, or by making REST requests. Both human users and Kubernetes service accounts can be authorized for API access. When a request reaches the API, it goes through several stages, illustrated in the following diagram: Transport security By default, the Kubernetes API server listens on port 6443 on the first non-localhost network interface, protected by TLS.kubernetes.io/docs/concepts/security/controlling-access/Registered: Wed Sep 03 06:01:55 UTC 2025 - 466.7K bytes - Viewed (0) -
Autoscaling Workloads | Kubernetes
With autoscaling, you can automatically update your workloads in one way or another. This allows your cluster to react to changes in resource demand more elastically and efficiently.kubernetes.io/docs/concepts/workloads/autoscaling/Registered: Wed Sep 03 06:03:12 UTC 2025 - 464K bytes - Viewed (0) -
Garbage Collection | Kubernetes
Garbage collection is a collective term for the various mechanisms Kubernetes uses to clean up cluster resources. This allows the clean up of resources like the following: Terminated pods Completed Jobs Objects without owner references Unused containers and container images Dynamically provisioned PersistentVolumes with a StorageClass reclaim policy of Delete Stale or expired CertificateSigningRequests (CSRs) Nodes deleted in the following scenarios: On a cloud when the cluster uses a cloud controller manager On-premises when the cluster uses an addon similar to a cloud controller manager Node Lease objects Owners and dependents Many objects in Kubernetes link to each other through owner references.kubernetes.io/docs/concepts/architecture/garbage-collection/Registered: Wed Sep 03 06:02:40 UTC 2025 - 469.5K bytes - Viewed (0) -
ReplicationController | Kubernetes
Legacy API for managing workloads that can scale horizontally. Superseded by the Deployment and ReplicaSet APIs.kubernetes.io/docs/concepts/workloads/controllers/replicationcontroller/Registered: Wed Sep 03 06:03:26 UTC 2025 - 482.7K bytes - Viewed (0)