- Sort Score
- Result 10 results
- Languages All
- Labels All
Results 341 - 350 of 723 for host:kubernetes.io (0.03 sec)
-
Gang Scheduling | Kubernetes
FEATURE STATE: Kubernetes v1.35 [alpha](disabled by default) Gang scheduling ensures that a group of Pods are scheduled on an "all-or-nothing" basis. If the cluster cannot accommodate the entire group (or a defined minimum number of Pods), none of the Pods are bound to a node. This feature depends on the Workload API. Ensure the GenericWorkload feature gate and the scheduling.k8s.io/v1alpha1 API group are enabled in the cluster. How it works When the GangScheduling plugin is enabled, the scheduler alters the lifecycle for Pods belonging to a gang pod group policy within a Workload.kubernetes.io/docs/concepts/scheduling-eviction/gang-scheduling/Registered: Mon Jan 26 06:42:02 UTC 2026 - 470.7K bytes - Viewed (0) -
Networking on Windows | Kubernetes
Kubernetes supports running nodes on either Linux or Windows. You can mix both kinds of node within a single cluster. This page provides an overview to networking specific to the Windows operating system. Container networking on Windows Networking for Windows containers is exposed through CNI plugins. Windows containers function similarly to virtual machines in regards to networking. Each container has a virtual network adapter (vNIC) which is connected to a Hyper-V virtual switch (vSwitch).kubernetes.io/docs/concepts/services-networking/windows-networking/Registered: Mon Jan 26 06:39:41 UTC 2026 - 482K bytes - Viewed (0) -
Controlling Access to the Kubernetes API | Kube...
This page provides an overview of controlling access to the Kubernetes API. Users access the Kubernetes API using kubectl, client libraries, or by making REST requests. Both human users and Kubernetes service accounts can be authorized for API access. When a request reaches the API, it goes through several stages, illustrated in the following diagram: Transport security By default, the Kubernetes API server listens on port 6443 on the first non-localhost network interface, protected by TLS.kubernetes.io/docs/concepts/security/controlling-access/Registered: Mon Jan 26 06:41:01 UTC 2026 - 479.8K bytes - Viewed (0) -
Limit Ranges | Kubernetes
By default, containers run with unbounded compute resources on a Kubernetes cluster. Using Kubernetes resource quotas, administrators (also termed cluster operators) can restrict consumption and creation of cluster resources (such as CPU time, memory, and persistent storage) within a specified namespace. Within a namespace, a Pod can consume as much CPU and memory as is allowed by the ResourceQuotas that apply to that namespace. As a cluster operator, or as a namespace-level administrator, you might also be concerned about making sure that a single object cannot monopolize all available resources within a namespace.kubernetes.io/docs/concepts/policy/limit-range/Registered: Mon Jan 26 06:41:48 UTC 2026 - 487.6K bytes - Viewed (0) -
Create an External Load Balancer | Kubernetes
This page shows how to create an external load balancer. When creating a Service, you have the option of automatically creating a cloud load balancer. This provides an externally-accessible IP address that sends traffic to the correct port on your cluster nodes, provided your cluster runs in a supported environment and is configured with the correct cloud load balancer provider package. You can also use an Ingress in place of Service.kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/Registered: Mon Jan 26 06:59:00 UTC 2026 - 484.1K bytes - Viewed (0) -
Define Environment Variable Values Using An Ini...
FEATURE STATE: Kubernetes v1.35 [beta](enabled by default) This page show how to configure environment variables for containers in a Pod via file. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube or you can use one of these Kubernetes playgrounds:kubernetes.io/docs/tasks/inject-data-application/define-environment-variable-via-file/Registered: Mon Jan 26 06:59:40 UTC 2026 - 482.6K bytes - Viewed (0) -
Share Process Namespace between Containers in a...
This page shows how to configure process namespace sharing for a pod. When process namespace sharing is enabled, processes in a container are visible to all other containers in the same pod. You can use this feature to configure cooperating containers, such as a log handler sidecar container, or to troubleshoot container images that don't include debugging utilities like a shell. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster.kubernetes.io/docs/tasks/configure-pod-container/share-process-namespace/Registered: Mon Jan 26 07:00:20 UTC 2026 - 480.1K bytes - Viewed (0) -
kubectl certificate deny | Kubernetes
Synopsis Deny a certificate signing request. kubectl certificate deny allows a cluster admin to deny a certificate signing request (CSR). This action tells a certificate signing controller to not to issue a certificate to the requester. kubectl certificate deny (-f FILENAME | NAME) Examples # Deny CSR 'csr-sqgzp' kubectl certificate deny csr-sqgzp Options --allow-missing-template-keys Default: true If true, ignore any errors in templates when a field or map key is missing in the template.kubernetes.io/docs/reference/kubectl/generated/kubectl_certificate/kubectl_certificate_deny/Registered: Mon Jan 26 07:16:23 UTC 2026 - 477.3K bytes - Viewed (0) -
Kubelet Systemd Watchdog | Kubernetes
FEATURE STATE: Kubernetes v1.32 [beta](enabled by default) On Linux nodes, Kubernetes 1.35 supports integrating with systemd to allow the operating system supervisor to recover a failed kubelet. This integration is not enabled by default. It can be used as an alternative to periodically requesting the kubelet's /healthz endpoint for health checks. If the kubelet does not respond to the watchdog within the timeout period, the watchdog will kill the kubelet.kubernetes.io/docs/reference/node/systemd-watchdog/Registered: Mon Jan 26 07:15:50 UTC 2026 - 472.8K bytes - Viewed (0) -
kubeadm reset phase | Kubernetes
kubeadm reset phase enables you to invoke atomic steps of the node reset process. Hence, you can let kubeadm do some of the work and you can fill in the gaps if you wish to apply customization. kubeadm reset phase is consistent with the kubeadm reset workflow, and behind the scene both use the same code. kubeadm reset phase phase Synopsis Use this command to invoke single phase of the "reset" workflowkubernetes.io/docs/reference/setup-tools/kubeadm/kubeadm-reset-phase/Registered: Mon Jan 26 07:21:15 UTC 2026 - 475.8K bytes - Viewed (0)