Search Options

Results per page
Sort
Preferred Languages
Labels
Advance

Results 441 - 450 of 705 for host:kubernetes.io (0.05 sec)

  1. Configuring a cgroup driver | Kubernetes

    This page explains how to configure the kubelet's cgroup driver to match the container runtime cgroup driver for kubeadm clusters. Before you begin You should be familiar with the Kubernetes container runtime requirements. Configuring the container runtime cgroup driver The Container runtimes page explains that the systemd driver is recommended for kubeadm based setups instead of the kubelet's default cgroupfs driver, because kubeadm manages the kubelet as a systemd service.
    kubernetes.io/docs/tasks/administer-cluster/kubeadm/configure-cgroup-driver/
    Registered: Fri Dec 12 08:30:54 UTC 2025
    - 467.1K bytes
    - Viewed (0)
  2. Node Shutdowns | Kubernetes

    In a Kubernetes cluster, a node can be shut down in a planned graceful way or unexpectedly because of reasons such as a power outage or something else external. A node shutdown could lead to workload failure if the node is not drained before the shutdown. A node shutdown can be either graceful or non-graceful. Graceful node shutdown The kubelet attempts to detect node system shutdown and terminates pods running on the node.
    kubernetes.io/docs/concepts/cluster-administration/node-shutdown/
    Registered: Fri Dec 12 08:31:12 UTC 2025
    - 478.5K bytes
    - Viewed (0)
  3. Configure Minimum and Maximum Memory Constraint...

    Define a range of valid memory resource limits for a namespace, so that every new Pod in that namespace falls within the range you configure.
    kubernetes.io/docs/tasks/administer-cluster/manage-resources/memory-constraint-namespace/
    Registered: Fri Dec 12 08:31:17 UTC 2025
    - 489.8K bytes
    - Viewed (0)
  4. Taints and Tolerations | Kubernetes

    Node affinity is a property of Pods that attracts them to a set of nodes (either as a preference or a hard requirement). Taints are the opposite -- they allow a node to repel a set of pods. Tolerations are applied to pods. Tolerations allow the scheduler to schedule pods with matching taints. Tolerations allow scheduling but don't guarantee scheduling: the scheduler also evaluates other parameters as part of its function.
    kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/
    Registered: Fri Dec 12 08:29:57 UTC 2025
    - 489.3K bytes
    - Viewed (0)
  5. Enforce Pod Security Standards with Namespace L...

    Namespaces can be labeled to enforce the Pod Security Standards. The three policies privileged, baseline and restricted broadly cover the security spectrum and are implemented by the Pod Security admission controller. Before you begin Pod Security Admission was available by default in Kubernetes v1.23, as a beta. From version 1.25 onwards, Pod Security Admission is generally available. To check the version, enter kubectl version. Requiring the baseline Pod Security Standard with namespace labels This manifest defines a Namespace my-baseline-namespace that:
    kubernetes.io/docs/tasks/configure-pod-container/enforce-standards-namespace-labels/
    Registered: Fri Dec 12 08:38:53 UTC 2025
    - 467.6K bytes
    - Viewed (0)
  6. Communicate Between Containers in the Same Pod ...

    This page shows how to use a Volume to communicate between two Containers running in the same Pod. See also how to allow processes to communicate by sharing process namespace between containers. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts.
    kubernetes.io/docs/tasks/access-application-cluster/communicate-containers-same-pod-shared-volume/
    Registered: Fri Dec 12 08:40:00 UTC 2025
    - 471.5K bytes
    - Viewed (0)
  7. Guaranteed Scheduling For Critical Add-On Pods ...

    Kubernetes core components such as the API server, scheduler, and controller-manager run on a control plane node. However, add-ons must run on a regular cluster node. Some of these add-ons are critical to a fully functional cluster, such as metrics-server, DNS, and UI. A cluster may stop working properly if a critical add-on is evicted (either manually or as a side effect of another operation like upgrade) and becomes pending (for example when the cluster is highly utilized and either there are other pending pods that schedule into the space vacated by the evicted critical add-on pod or the amount of resources available on the node changed for some other reason).
    kubernetes.io/docs/tasks/administer-cluster/guaranteed-scheduling-critical-addon-pods/
    Registered: Fri Dec 12 08:39:32 UTC 2025
    - 460.8K bytes
    - Viewed (0)
  8. Configuring swap memory on Kubernetes nodes | K...

    This page provides an example of how to provision and configure swap memory on a Kubernetes node using kubeadm. Objectives Provision swap memory on a Kubernetes node using kubeadm. Learn to configure both encrypted and unencrypted swap. Learn to enable swap on boot. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts.
    kubernetes.io/docs/tutorials/cluster-management/provision-swap-memory/
    Registered: Fri Dec 12 08:57:34 UTC 2025
    - 468K bytes
    - Viewed (0)
  9. Connecting Applications with Services | Kubernetes

    The Kubernetes model for connecting containers Now that you have a continuously running, replicated application you can expose it on a network. Kubernetes assumes that pods can communicate with other pods, regardless of which host they land on. Kubernetes gives every pod its own cluster-private IP address, so you do not need to explicitly create links between pods or map container ports to host ports. This means that containers within a Pod can all reach each other's ports on localhost, and all pods in a cluster can see each other without NAT.
    kubernetes.io/docs/tutorials/services/connect-applications-service/
    Registered: Fri Dec 12 08:57:40 UTC 2025
    - 516.2K bytes
    - Viewed (0)
  10. TLS | Kubernetes

    Understand how to protect traffic within your cluster using Transport Layer Security (TLS).
    kubernetes.io/docs/tasks/tls/
    Registered: Fri Dec 12 08:57:28 UTC 2025
    - 457.3K bytes
    - Viewed (0)
Back to top