Search Options

Results per page
Sort
Preferred Languages
Labels
Advance

Results 481 - 490 of 723 for host:kubernetes.io (0.02 sec)

  1. Organizing Cluster Access Using kubeconfig File...

    Use kubeconfig files to organize information about clusters, users, namespaces, and authentication mechanisms. The kubectl command-line tool uses kubeconfig files to find the information it needs to choose a cluster and communicate with the API server of a cluster. Note:A file that is used to configure access to clusters is called a kubeconfig file. This is a generic way of referring to configuration files. It does not mean that there is a file named kubeconfig.
    kubernetes.io/docs/concepts/configuration/organize-cluster-access-kubeconfig/
    Registered: Mon Jan 26 06:36:21 UTC 2026
    - 479.5K bytes
    - Viewed (0)
  2. Pod Security Policies | Kubernetes

    Removed feature PodSecurityPolicy was deprecated in Kubernetes v1.21, and removed from Kubernetes in v1.25. Instead of using PodSecurityPolicy, you can enforce similar restrictions on Pods using either or both: Pod Security Admission a 3rd party admission plugin, that you deploy and configure yourself For a migration guide, see Migrate from PodSecurityPolicy to the Built-In PodSecurity Admission Controller. For more information on the removal of this API, see PodSecurityPolicy Deprecation: Past, Present, and Future.
    kubernetes.io/docs/concepts/security/pod-security-policy/
    Registered: Mon Jan 26 06:36:58 UTC 2026
    - 469.1K bytes
    - Viewed (0)
  3. Kubernetes API Server Bypass Risks | Kubernetes

    Security architecture information relating to the API server and other components
    kubernetes.io/docs/concepts/security/api-server-bypass-risks/
    Registered: Mon Jan 26 06:37:21 UTC 2026
    - 475.4K bytes
    - Viewed (0)
  4. Service ClusterIP allocation | Kubernetes

    In Kubernetes, Services are an abstract way to expose an application running on a set of Pods. Services can have a cluster-scoped virtual IP address (using a Service of type: ClusterIP). Clients can connect using that virtual IP address, and Kubernetes then load-balances traffic to that Service across the different backing Pods. How Service ClusterIPs are allocated? When Kubernetes needs to assign a virtual IP address for a Service, that assignment happens one of two ways:
    kubernetes.io/docs/concepts/services-networking/cluster-ip-allocation/
    Registered: Mon Jan 26 06:36:40 UTC 2026
    - 478.6K bytes
    - Viewed (0)
  5. Node-specific Volume Limits | Kubernetes

    This page describes the maximum number of volumes that can be attached to a Node for various cloud providers. Cloud providers like Google, Amazon, and Microsoft typically have a limit on how many volumes can be attached to a Node. It is important for Kubernetes to respect those limits. Otherwise, Pods scheduled on a Node could get stuck waiting for volumes to attach. Kubernetes default limits The Kubernetes scheduler has default limits on the number of volumes that can be attached to a Node:
    kubernetes.io/docs/concepts/storage/storage-limits/
    Registered: Mon Jan 26 06:37:26 UTC 2026
    - 474.9K bytes
    - Viewed (0)
  6. Attach Handlers to Container Lifecycle Events |...

    This page shows how to attach handlers to Container lifecycle events. Kubernetes supports the postStart and preStop events. Kubernetes sends the postStart event immediately after a Container is started, and it sends the preStop event immediately before the Container is terminated. A Container may specify one handler per event. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster.
    kubernetes.io/docs/tasks/configure-pod-container/attach-handler-lifecycle-event/
    Registered: Mon Jan 26 06:53:20 UTC 2026
    - 477.1K bytes
    - Viewed (0)
  7. IP Masquerade Agent User Guide | Kubernetes

    This page shows how to configure and enable the ip-masq-agent. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube or you can use one of these Kubernetes playgrounds:
    kubernetes.io/docs/tasks/administer-cluster/ip-masq-agent/
    Registered: Mon Jan 26 06:53:43 UTC 2026
    - 479K bytes
    - Viewed (0)
  8. Weave Net for NetworkPolicy | Kubernetes

    This page shows how to use Weave Net for NetworkPolicy. Before you begin You need to have a Kubernetes cluster. Follow the kubeadm getting started guide to bootstrap one. Install the Weave Net addon Follow the Integrating Kubernetes via the Addon guide. The Weave Net addon for Kubernetes comes with a Network Policy Controller that automatically monitors Kubernetes for any NetworkPolicy annotations on all namespaces and configures iptables rules to allow or block traffic as directed by the policies.
    kubernetes.io/docs/tasks/administer-cluster/network-policy-provider/weave-network-policy/
    Registered: Mon Jan 26 06:53:47 UTC 2026
    - 470.9K bytes
    - Viewed (0)
  9. Switching from Polling to CRI Event-based Updat...

    FEATURE STATE: Kubernetes v1.26 [alpha](disabled by default) This page shows how to migrate nodes to use event based updates for container status. The event-based implementation reduces node resource consumption by the kubelet, compared to the legacy approach that relies on polling. You may know this feature as evented Pod lifecycle event generator (PLEG). That's the name used internally within the Kubernetes project for a key implementation detail. The polling based approach is referred to as generic PLEG.
    kubernetes.io/docs/tasks/administer-cluster/switch-to-evented-pleg/
    Registered: Mon Jan 26 06:52:00 UTC 2026
    - 474.3K bytes
    - Viewed (0)
  10. Managing Secrets using kubectl | Kubernetes

    Creating Secret objects using kubectl command line.
    kubernetes.io/docs/tasks/configmap-secret/managing-secret-using-kubectl/
    Registered: Mon Jan 26 07:01:20 UTC 2026
    - 481.1K bytes
    - Viewed (0)
Back to top