Search Options

Results per page
Sort
Preferred Languages
Labels
Advance

Results 431 - 440 of 705 for host:kubernetes.io (0.03 sec)

  1. Debugging Kubernetes nodes with crictl | Kubern...

    FEATURE STATE: Kubernetes v1.11 [stable] crictl is a command-line interface for CRI-compatible container runtimes. You can use it to inspect and debug container runtimes and applications on a Kubernetes node. crictl and its source are hosted in the cri-tools repository. Before you begin crictl requires a Linux operating system with a CRI runtime. Installing crictl You can download a compressed archive crictl from the cri-tools release page, for several different architectures.
    kubernetes.io/docs/tasks/debug/debug-cluster/crictl/
    Registered: Fri Dec 05 09:14:53 UTC 2025
    - 469K bytes
    - Viewed (0)
  2. Enforce Pod Security Standards with Namespace L...

    Namespaces can be labeled to enforce the Pod Security Standards. The three policies privileged, baseline and restricted broadly cover the security spectrum and are implemented by the Pod Security admission controller. Before you begin Pod Security Admission was available by default in Kubernetes v1.23, as a beta. From version 1.25 onwards, Pod Security Admission is generally available. To check the version, enter kubectl version. Requiring the baseline Pod Security Standard with namespace labels This manifest defines a Namespace my-baseline-namespace that:
    kubernetes.io/docs/tasks/configure-pod-container/enforce-standards-namespace-labels/
    Registered: Fri Dec 05 09:15:45 UTC 2025
    - 466.5K bytes
    - Viewed (0)
  3. Volumes | Kubernetes

    Kubernetes volumes provide a way for containers in a pod to access and share data via the filesystem. There are different kinds of volume that you can use for different purposes, such as: populating a configuration file based on a ConfigMap or a Secret providing some temporary scratch space for a pod sharing a filesystem between two different containers in the same pod sharing a filesystem between two different pods (even if those Pods run on different nodes) durably storing data so that it stays available even if the Pod restarts or is replaced passing configuration information to an app running in a container, based on details of the Pod the container is in (for example: telling a sidecar container what namespace the Pod is running in) providing read-only access to data in a different container image Data sharing can be between different local processes within a container, or between different containers, or between Pods.
    kubernetes.io/docs/concepts/storage/volumes/
    Registered: Fri Dec 05 08:41:12 UTC 2025
    - 580.3K bytes
    - Viewed (0)
  4. Sidecar Containers | Kubernetes

    FEATURE STATE: Kubernetes v1.33 [stable](enabled by default) Sidecar containers are the secondary containers that run along with the main application container within the same Pod. These containers are used to enhance or to extend the functionality of the primary app container by providing additional services, or functionality such as logging, monitoring, security, or data synchronization, without directly altering the primary application code. Typically, you only have one app container in a Pod.
    kubernetes.io/docs/concepts/workloads/pods/sidecar-containers/
    Registered: Fri Dec 05 08:40:26 UTC 2025
    - 481.5K bytes
    - Viewed (0)
  5. Share a Cluster with Namespaces | Kubernetes

    This page shows how to view, work in, and delete namespaces. The page also shows how to use Kubernetes namespaces to subdivide your cluster. Before you begin Have an existing Kubernetes cluster. You have a basic understanding of Kubernetes Pods, Services, and Deployments. Viewing namespaces List the current namespaces in a cluster using: kubectl get namespaces NAME STATUS AGE default Active 11d kube-node-lease Active 11d kube-public Active 11d kube-system Active 11d Kubernetes starts with four initial namespaces:
    kubernetes.io/docs/tasks/administer-cluster/namespaces/
    Registered: Fri Dec 05 09:02:57 UTC 2025
    - 480.1K bytes
    - Viewed (0)
  6. Configuring a cgroup driver | Kubernetes

    This page explains how to configure the kubelet's cgroup driver to match the container runtime cgroup driver for kubeadm clusters. Before you begin You should be familiar with the Kubernetes container runtime requirements. Configuring the container runtime cgroup driver The Container runtimes page explains that the systemd driver is recommended for kubeadm based setups instead of the kubelet's default cgroupfs driver, because kubeadm manages the kubelet as a systemd service.
    kubernetes.io/docs/tasks/administer-cluster/kubeadm/configure-cgroup-driver/
    Registered: Fri Dec 05 09:03:33 UTC 2025
    - 466K bytes
    - Viewed (0)
  7. Configure Default Memory Requests and Limits fo...

    Define a default memory resource limit for a namespace, so that every new Pod in that namespace has a memory resource limit configured.
    kubernetes.io/docs/tasks/administer-cluster/manage-resources/memory-default-namespace/
    Registered: Fri Dec 05 09:03:55 UTC 2025
    - 481.6K bytes
    - Viewed (0)
  8. Configure Default CPU Requests and Limits for a...

    Define a default CPU resource limits for a namespace, so that every new Pod in that namespace has a CPU resource limit configured.
    kubernetes.io/docs/tasks/administer-cluster/manage-resources/cpu-default-namespace/
    Registered: Fri Dec 05 09:04:01 UTC 2025
    - 479.6K bytes
    - Viewed (0)
  9. Guaranteed Scheduling For Critical Add-On Pods ...

    Kubernetes core components such as the API server, scheduler, and controller-manager run on a control plane node. However, add-ons must run on a regular cluster node. Some of these add-ons are critical to a fully functional cluster, such as metrics-server, DNS, and UI. A cluster may stop working properly if a critical add-on is evicted (either manually or as a side effect of another operation like upgrade) and becomes pending (for example when the cluster is highly utilized and either there are other pending pods that schedule into the space vacated by the evicted critical add-on pod or the amount of resources available on the node changed for some other reason).
    kubernetes.io/docs/tasks/administer-cluster/guaranteed-scheduling-critical-addon-pods/
    Registered: Fri Dec 05 09:04:26 UTC 2025
    - 459.6K bytes
    - Viewed (0)
  10. IP Masquerade Agent User Guide | Kubernetes

    This page shows how to configure and enable the ip-masq-agent. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube or you can use one of these Kubernetes playgrounds:
    kubernetes.io/docs/tasks/administer-cluster/ip-masq-agent/
    Registered: Fri Dec 05 09:04:31 UTC 2025
    - 468.5K bytes
    - Viewed (0)
Back to top