Search Options

Results per page
Sort
Preferred Languages
Labels
Advance

Popular Words: %27 テスト test [xss]

Results 451 - 460 of 704 for host:kubernetes.io (0.03 sec)

  1. Managing Secrets using Configuration File | Kub...

    Creating Secret objects using resource configuration file.
    kubernetes.io/docs/tasks/configmap-secret/managing-secret-using-config-file/
    Registered: Mon Nov 03 10:37:15 UTC 2025
    - 479.6K bytes
    - Viewed (0)
  2. kubeadm upgrade phases | Kubernetes

    kubeadm upgrade apply phase Using the phases of kubeadm upgrade apply, you can choose to execute the separate steps of the initial upgrade of a control plane node. phase preflight control-plane upload-config kubelet-config bootstrap-token addon post-upgrade Synopsis Use this command to invoke single phase of the "apply" workflow kubeadm upgrade apply phase [flags] Options -h, --help help for phase Options inherited from parent commands --rootfs string The path to the 'real' host root filesystem.
    kubernetes.io/docs/reference/setup-tools/kubeadm/kubeadm-upgrade-phase/
    Registered: Mon Nov 03 10:56:50 UTC 2025
    - 486.7K bytes
    - Viewed (0)
  3. kubeadm token | Kubernetes

    Bootstrap tokens are used for establishing bidirectional trust between a node joining the cluster and a control-plane node, as described in authenticating with bootstrap tokens. kubeadm init creates an initial token with a 24-hour TTL. The following commands allow you to manage such a token and also to create and manage new ones. kubeadm token create Create bootstrap tokens on the server Synopsis This command will create a bootstrap token for you.
    kubernetes.io/docs/reference/setup-tools/kubeadm/kubeadm-token/
    Registered: Mon Nov 03 10:56:57 UTC 2025
    - 469K bytes
    - Viewed (0)
  4. Seccomp and Kubernetes | Kubernetes

    Seccomp stands for secure computing mode and has been a feature of the Linux kernel since version 2.6.12. It can be used to sandbox the privileges of a process, restricting the calls it is able to make from userspace into the kernel. Kubernetes lets you automatically apply seccomp profiles loaded onto a node to your Pods and containers. Seccomp fields FEATURE STATE: Kubernetes v1.19 [stable] There are four ways to specify a seccomp profile for a pod:
    kubernetes.io/docs/reference/node/seccomp/
    Registered: Mon Nov 03 10:55:47 UTC 2025
    - 474.7K bytes
    - Viewed (0)
  5. kubeadm kubeconfig | Kubernetes

    kubeadm kubeconfig provides utilities for managing kubeconfig files. For examples on how to use kubeadm kubeconfig user see Generating kubeconfig files for additional users. kubeadm kubeconfig overview Synopsis Kubeconfig file utilities. Options -h, --help help for kubeconfig Options inherited from parent commands --rootfs string The path to the 'real' host root filesystem. This will cause kubeadm to chroot into the provided path. kubeadm kubeconfig user This command can be used to output a kubeconfig file for an additional user.
    kubernetes.io/docs/reference/setup-tools/kubeadm/kubeadm-kubeconfig/
    Registered: Mon Nov 03 10:57:28 UTC 2025
    - 463.7K bytes
    - Viewed (0)
  6. Generate Certificates Manually | Kubernetes

    When using client certificate authentication, you can generate certificates manually through easyrsa, openssl or cfssl. easyrsa easyrsa can manually generate certificates for your cluster. Download, unpack, and initialize the patched version of easyrsa3. curl -LO https://dl.k8s.io/easy-rsa/easy-rsa.tar.gz tar xzf easy-rsa.tar.gz cd easy-rsa-master/easyrsa3 ./easyrsa init-pki Generate a new certificate authority (CA). --batch sets automatic mode; --req-cn specifies the Common Name (CN) for the CA's new root certificate. ./easyrsa --batch "--req-cn=${MASTER_IP}@`date +%s`" build-ca nopass Generate server certificate and key.
    kubernetes.io/docs/tasks/administer-cluster/certificates/
    Registered: Mon Nov 03 10:15:26 UTC 2025
    - 485.2K bytes
    - Viewed (0)
  7. Weave Net for NetworkPolicy | Kubernetes

    This page shows how to use Weave Net for NetworkPolicy. Before you begin You need to have a Kubernetes cluster. Follow the kubeadm getting started guide to bootstrap one. Install the Weave Net addon Follow the Integrating Kubernetes via the Addon guide. The Weave Net addon for Kubernetes comes with a Network Policy Controller that automatically monitors Kubernetes for any NetworkPolicy annotations on all namespaces and configures iptables rules to allow or block traffic as directed by the policies.
    kubernetes.io/docs/tasks/administer-cluster/network-policy-provider/weave-network-policy/
    Registered: Mon Nov 03 10:15:50 UTC 2025
    - 462.4K bytes
    - Viewed (0)
  8. Developing and debugging services locally using...

    Note: This section links to third party projects that provide functionality required by Kubernetes. The Kubernetes project authors aren't responsible for these projects, which are listed alphabetically. To add a project to this list, read the content guide before submitting a change. More information. Kubernetes applications usually consist of multiple, separate services, each running in its own container. Developing and debugging these services on a remote Kubernetes cluster can be cumbersome, requiring you to get a shell on a running container in order to run debugging tools.
    kubernetes.io/docs/tasks/debug/debug-cluster/local-debugging/
    Registered: Mon Nov 03 10:33:39 UTC 2025
    - 465.6K bytes
    - Viewed (0)
  9. Fine Parallel Processing Using a Work Queue | K...

    In this example, you will run a Kubernetes Job that runs multiple parallel tasks as worker processes, each running as a separate Pod. In this example, as each pod is created, it picks up one unit of work from a task queue, processes it, and repeats until the end of the queue is reached. Here is an overview of the steps in this example: Start a storage service to hold the work queue.
    kubernetes.io/docs/tasks/job/fine-parallel-processing-work-queue/
    Registered: Mon Nov 03 10:34:48 UTC 2025
    - 482K bytes
    - Viewed (0)
  10. Manage TLS Certificates in a Cluster | Kubernetes

    Kubernetes provides a certificates.k8s.io API, which lets you provision TLS certificates signed by a Certificate Authority (CA) that you control. These CA and certificates can be used by your workloads to establish trust. certificates.k8s.io API uses a protocol that is similar to the ACME draft. Note:Certificates created using the certificates.k8s.io API are signed by a dedicated CA. It is possible to configure your cluster to use the cluster root CA for this purpose, but you should never rely on this.
    kubernetes.io/docs/tasks/tls/managing-tls-in-a-cluster/
    Registered: Mon Nov 03 10:33:53 UTC 2025
    - 485K bytes
    - Viewed (0)
Back to top