- Sort Score
- Result 10 results
- Languages All
- Labels All
Results 391 - 400 of 699 for host:kubernetes.io (0.05 sec)
-
Windows debugging tips | Kubernetes
Node-level troubleshooting My Pods are stuck at "Container Creating" or restarting over and over Ensure that your pause image is compatible with your Windows OS version. See Pause container to see the latest / recommended pause image and/or get more information. Note:If using containerd as your container runtime the pause image is specified in the plugins.plugins.cri.sandbox_image field of the of config.toml configuration file. My pods show status as ErrImgPull or ImagePullBackOffkubernetes.io/docs/tasks/debug/debug-cluster/windows/Registered: Mon Sep 08 23:01:58 UTC 2025 - 467.1K bytes - Viewed (0) -
Enforce Pod Security Standards by Configuring t...
Kubernetes provides a built-in admission controller to enforce the Pod Security Standards. You can configure this admission controller to set cluster-wide defaults and exemptions. Before you begin Following an alpha release in Kubernetes v1.22, Pod Security Admission became available by default in Kubernetes v1.23, as a beta. From version 1.25 onwards, Pod Security Admission is generally available. To check the version, enter kubectl version. If you are not running Kubernetes 1.kubernetes.io/docs/tasks/configure-pod-container/enforce-standards-admission-controller/Registered: Mon Sep 08 22:58:30 UTC 2025 - 465.2K bytes - Viewed (0) -
Apply Pod Security Standards at the Namespace L...
Note This tutorial applies only for new clusters. Pod Security Admission is an admission controller that applies Pod Security Standards when pods are created. It is a feature GA'ed in v1.25. In this tutorial, you will enforce the baseline Pod Security Standard, one namespace at a time. You can also apply Pod Security Standards to multiple namespaces at once at the cluster level. For instructions, refer to Apply Pod Security Standards at the cluster level.kubernetes.io/docs/tutorials/security/ns-level-pss/Registered: Mon Sep 08 23:14:35 UTC 2025 - 465.7K bytes - Viewed (0) -
Create a Cluster | Kubernetes
Production-Grade Container Orchestrationkubernetes.io/docs/tutorials/kubernetes-basics/create-cluster/Registered: Mon Sep 08 23:13:38 UTC 2025 - 457.7K bytes - Viewed (0) -
Adding entries to Pod /etc/hosts with HostAlias...
Adding entries to a Pod's /etc/hosts file provides Pod-level override of hostname resolution when DNS and other options are not applicable. You can add these custom entries with the HostAliases field in PodSpec. The Kubernetes project recommends modifying DNS configuration using the hostAliases field (part of the .spec for a Pod), and not by using an init container or other means to edit /etc/hosts directly. Change made in other ways may be overwritten by the kubelet during Pod creation or restart.kubernetes.io/docs/tasks/network/customize-hosts-file-for-pods/Registered: Mon Sep 08 23:13:02 UTC 2025 - 467.5K bytes - Viewed (0) -
Update Your App | Kubernetes
Production-Grade Container Orchestrationkubernetes.io/docs/tutorials/kubernetes-basics/update/Registered: Mon Sep 08 23:14:24 UTC 2025 - 456.4K bytes - Viewed (0) -
Declarative API Validation | Kubernetes
FEATURE STATE: Kubernetes v1.33 [beta] Kubernetes 1.34 includes optional declarative validation for APIs. When enabled, the Kubernetes API server can use this mechanism rather than the legacy approach that relies on hand-written Go code (validation.go files) to ensure that requests against the API are valid. Kubernetes developers, and people extending the Kubernetes API, can define validation rules directly alongside the API type definitions (types.go files). Code authors define pecial comment tags (e.kubernetes.io/docs/reference/using-api/declarative-validation/Registered: Mon Sep 08 23:29:30 UTC 2025 - 508.7K bytes - Viewed (0) -
Mapping PodSecurityPolicies to Pod Security Sta...
The tables below enumerate the configuration parameters on PodSecurityPolicy objects, whether the field mutates and/or validates pods, and how the configuration values map to the Pod Security Standards. For each applicable parameter, the allowed values for the Baseline and Restricted profiles are listed. Anything outside the allowed values for those profiles would fall under the Privileged profile. "No opinion" means all values are allowed under all Pod Security Standards.kubernetes.io/docs/reference/access-authn-authz/psp-to-pod-security-standards/Registered: Mon Sep 08 23:30:43 UTC 2025 - 464.1K bytes - Viewed (0) -
Common Expression Language in Kubernetes | Kube...
The Common Expression Language (CEL) is used in the Kubernetes API to declare validation rules, policy rules, and other constraints or conditions. CEL expressions are evaluated directly in the API server, making CEL a convenient alternative to out-of-process mechanisms, such as webhooks, for many extensibility use cases. Your CEL expressions continue to execute so long as the control plane's API server component remains available. Language overview The CEL language has a straightforward syntax that is similar to the expressions in C, C++, Java, JavaScript and Go.kubernetes.io/docs/reference/using-api/cel/Registered: Mon Sep 08 23:29:21 UTC 2025 - 501.1K bytes - Viewed (0) -
Webhook Mode | Kubernetes
A WebHook is an HTTP callback: an HTTP POST that occurs when something happens; a simple event-notification via HTTP POST. A web application implementing WebHooks will POST a message to a URL when certain things happen. When specified, mode Webhook causes Kubernetes to query an outside REST service when determining user privileges. Configuration File Format Mode Webhook requires a file for HTTP configuration, specify by the --authorization-webhook-config-file=SOME_FILENAME flag. The configuration file uses the kubeconfig file format.kubernetes.io/docs/reference/access-authn-authz/webhook/Registered: Mon Sep 08 23:28:27 UTC 2025 - 476.6K bytes - Viewed (0)