- Sort Score
- Result 10 results
- Languages All
- Labels All
Results 451 - 460 of 699 for host:kubernetes.io (0.11 sec)
-
Webhook Mode | Kubernetes
A WebHook is an HTTP callback: an HTTP POST that occurs when something happens; a simple event-notification via HTTP POST. A web application implementing WebHooks will POST a message to a URL when certain things happen. When specified, mode Webhook causes Kubernetes to query an outside REST service when determining user privileges. Configuration File Format Mode Webhook requires a file for HTTP configuration, specify by the --authorization-webhook-config-file=SOME_FILENAME flag. The configuration file uses the kubeconfig file format.kubernetes.io/docs/reference/access-authn-authz/webhook/Registered: Mon Sep 15 09:05:49 UTC 2025 - 476.6K bytes - Viewed (0) -
Mapping PodSecurityPolicies to Pod Security Sta...
The tables below enumerate the configuration parameters on PodSecurityPolicy objects, whether the field mutates and/or validates pods, and how the configuration values map to the Pod Security Standards. For each applicable parameter, the allowed values for the Baseline and Restricted profiles are listed. Anything outside the allowed values for those profiles would fall under the Privileged profile. "No opinion" means all values are allowed under all Pod Security Standards.kubernetes.io/docs/reference/access-authn-authz/psp-to-pod-security-standards/Registered: Mon Sep 15 09:06:22 UTC 2025 - 464.1K bytes - Viewed (0) -
TLS bootstrapping | Kubernetes
In a Kubernetes cluster, the components on the worker nodes - kubelet and kube-proxy - need to communicate with Kubernetes control plane components, specifically kube-apiserver. In order to ensure that communication is kept private, not interfered with, and ensure that each component of the cluster is talking to another trusted component, we strongly recommend using client TLS certificates on nodes. The normal process of bootstrapping these components, especially worker nodes that need certificates so they can communicate safely with kube-apiserver, can be a challenging process as it is often outside of the scope of Kubernetes and requires significant additional work.kubernetes.io/docs/reference/access-authn-authz/kubelet-tls-bootstrapping/Registered: Mon Sep 15 09:06:26 UTC 2025 - 494.6K bytes - Viewed (0) -
Declarative API Validation | Kubernetes
FEATURE STATE: Kubernetes v1.33 [beta] Kubernetes 1.34 includes optional declarative validation for APIs. When enabled, the Kubernetes API server can use this mechanism rather than the legacy approach that relies on hand-written Go code (validation.go files) to ensure that requests against the API are valid. Kubernetes developers, and people extending the Kubernetes API, can define validation rules directly alongside the API type definitions (types.go files). Code authors define pecial comment tags (e.kubernetes.io/docs/reference/using-api/declarative-validation/Registered: Mon Sep 15 09:06:49 UTC 2025 - 508.7K bytes - Viewed (0) -
Organizing Cluster Access Using kubeconfig File...
Use kubeconfig files to organize information about clusters, users, namespaces, and authentication mechanisms. The kubectl command-line tool uses kubeconfig files to find the information it needs to choose a cluster and communicate with the API server of a cluster. Note:A file that is used to configure access to clusters is called a kubeconfig file. This is a generic way of referring to configuration files. It does not mean that there is a file named kubeconfig.kubernetes.io/docs/concepts/configuration/organize-cluster-access-kubeconfig/Registered: Mon Sep 15 08:38:26 UTC 2025 - 468.2K bytes - Viewed (0) -
API Priority and Fairness | Kubernetes
FEATURE STATE: Kubernetes v1.29 [stable] Controlling the behavior of the Kubernetes API server in an overload situation is a key task for cluster administrators. The kube-apiserver has some controls available (i.e. the --max-requests-inflight and --max-mutating-requests-inflight command-line flags) to limit the amount of outstanding work that will be accepted, preventing a flood of inbound requests from overloading and potentially crashing the API server, but these flags are not enough to ensure that the most important requests get through in a period of high traffic.kubernetes.io/docs/concepts/cluster-administration/flow-control/Registered: Mon Sep 15 08:39:13 UTC 2025 - 516.4K bytes - Viewed (0) -
Configure Minimum and Maximum Memory Constraint...
Define a range of valid memory resource limits for a namespace, so that every new Pod in that namespace falls within the range you configure.kubernetes.io/docs/tasks/administer-cluster/manage-resources/memory-constraint-namespace/Registered: Mon Sep 15 08:42:54 UTC 2025 - 487.8K bytes - Viewed (0) -
Using sysctls in a Kubernetes Cluster | Kubernetes
FEATURE STATE: Kubernetes v1.21 [stable] This document describes how to configure and use kernel parameters within a Kubernetes cluster using the sysctl interface. Note:Starting from Kubernetes version 1.23, the kubelet supports the use of either / or . as separators for sysctl names. Starting from Kubernetes version 1.25, setting Sysctls for a Pod supports setting sysctls with slashes. For example, you can represent the same sysctl name as kernel.shm_rmid_forced using a period as the separator, or as kernel/shm_rmid_forced using a slash as a separator.kubernetes.io/docs/tasks/administer-cluster/sysctl-cluster/Registered: Mon Sep 15 08:43:18 UTC 2025 - 469.7K bytes - Viewed (0) -
Weave Net for NetworkPolicy | Kubernetes
This page shows how to use Weave Net for NetworkPolicy. Before you begin You need to have a Kubernetes cluster. Follow the kubeadm getting started guide to bootstrap one. Install the Weave Net addon Follow the Integrating Kubernetes via the Addon guide. The Weave Net addon for Kubernetes comes with a Network Policy Controller that automatically monitors Kubernetes for any NetworkPolicy annotations on all namespaces and configures iptables rules to allow or block traffic as directed by the policies.kubernetes.io/docs/tasks/administer-cluster/network-policy-provider/weave-network-policy/Registered: Mon Sep 15 08:44:13 UTC 2025 - 459.6K bytes - Viewed (0) -
Configure Pods and Containers | Kubernetes
Perform common configuration tasks for Pods and containers.kubernetes.io/docs/tasks/configure-pod-container/Registered: Mon Sep 15 08:43:26 UTC 2025 - 460.5K bytes - Viewed (0)