Search Options

Results per page
Sort
Preferred Languages
Labels
Advance

Results 491 - 500 of 673 for host:kubernetes.io (0.05 sec)

  1. Updating Configuration via a ConfigMap | Kubern...

    This page provides a step-by-step example of updating configuration within a Pod via a ConfigMap and builds upon the Configure a Pod to Use a ConfigMap task. At the end of this tutorial, you will understand how to change the configuration for a running application. This tutorial uses the alpine and nginx images as examples. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster.
    kubernetes.io/docs/tutorials/configuration/updating-configuration-via-a-configmap/
    Registered: Wed Feb 12 06:18:33 UTC 2025
    - 521.1K bytes
    - Viewed (0)
  2. Fine Parallel Processing Using a Work Queue | K...

    In this example, you will run a Kubernetes Job that runs multiple parallel tasks as worker processes, each running as a separate Pod. In this example, as each pod is created, it picks up one unit of work from a task queue, processes it, and repeats until the end of the queue is reached. Here is an overview of the steps in this example: Start a storage service to hold the work queue.
    kubernetes.io/docs/tasks/job/fine-parallel-processing-work-queue/
    Registered: Wed Feb 12 06:19:32 UTC 2025
    - 450.4K bytes
    - Viewed (0)
  3. Handling retriable and non-retriable pod failur...

    FEATURE STATE: Kubernetes v1.31 [stable] (enabled by default: true) This document shows you how to use the Pod failure policy, in combination with the default Pod backoff failure policy, to improve the control over the handling of container- or Pod-level failure within a Job. The definition of Pod failure policy may help you to: better utilize the computational resources by avoiding unnecessary Pod retries. avoid Job failures due to Pod disruptions (such preemption, API-initiated eviction or taint-based eviction).
    kubernetes.io/docs/tasks/job/pod-failure-policy/
    Registered: Wed Feb 12 06:18:51 UTC 2025
    - 460.6K bytes
    - Viewed (0)
  4. Client Libraries | Kubernetes

    This page contains an overview of the client libraries for using the Kubernetes API from various programming languages. To write applications using the Kubernetes REST API, you do not need to implement the API calls and request/response types yourself. You can use a client library for the programming language you are using. Client libraries often handle common tasks such as authentication for you. Most client libraries can discover and use the Kubernetes Service Account to authenticate if the API client is running inside the Kubernetes cluster, or can understand the kubeconfig file format to read the credentials and the API Server address.
    kubernetes.io/docs/reference/using-api/client-libraries/
    Registered: Wed Feb 12 06:22:35 UTC 2025
    - 436.9K bytes
    - Viewed (0)
  5. Using RBAC Authorization | Kubernetes

    Role-based access control (RBAC) is a method of regulating access to computer or network resources based on the roles of individual users within your organization. RBAC authorization uses the rbac.authorization.k8s.io API group to drive authorization decisions, allowing you to dynamically configure policies through the Kubernetes API. To enable RBAC, start the API server with the --authorization-config flag set to a file that includes the RBAC authorizer; for example: apiVersion: apiserver.
    kubernetes.io/docs/reference/access-authn-authz/rbac/
    Registered: Wed Feb 12 06:22:14 UTC 2025
    - 556.4K bytes
    - Viewed (0)
  6. Mapping PodSecurityPolicies to Pod Security Sta...

    The tables below enumerate the configuration parameters on PodSecurityPolicy objects, whether the field mutates and/or validates pods, and how the configuration values map to the Pod Security Standards. For each applicable parameter, the allowed values for the Baseline and Restricted profiles are listed. Anything outside the allowed values for those profiles would fall under the Privileged profile. "No opinion" means all values are allowed under all Pod Security Standards.
    kubernetes.io/docs/reference/access-authn-authz/psp-to-pod-security-standards/
    Registered: Wed Feb 12 06:22:22 UTC 2025
    - 435.5K bytes
    - Viewed (0)
  7. TLS | Kubernetes

    Understand how to protect traffic within your cluster using Transport Layer Security (TLS).
    kubernetes.io/docs/tasks/tls/
    Registered: Wed Feb 12 06:21:37 UTC 2025
    - 426.4K bytes
    - Viewed (0)
  8. Authenticating with Bootstrap Tokens | Kubernetes

    FEATURE STATE: Kubernetes v1.18 [stable] Bootstrap tokens are a simple bearer token that is meant to be used when creating new clusters or joining new nodes to an existing cluster. It was built to support kubeadm, but can be used in other contexts for users that wish to start clusters without kubeadm. It is also built to work, via RBAC policy, with the kubelet TLS Bootstrapping system. Bootstrap Tokens Overview Bootstrap Tokens are defined with a specific type (bootstrap.
    kubernetes.io/docs/reference/access-authn-authz/bootstrap-tokens/
    Registered: Wed Feb 12 06:22:01 UTC 2025
    - 442.7K bytes
    - Viewed (0)
  9. Configure Access to Multiple Clusters | Kubernetes

    This page shows how to configure access to multiple clusters by using configuration files. After your clusters, users, and contexts are defined in one or more configuration files, you can quickly switch between clusters by using the kubectl config use-context command. Note:A file that is used to configure access to a cluster is sometimes called a kubeconfig file. This is a generic way of referring to configuration files. It does not mean that there is a file named kubeconfig.
    kubernetes.io/docs/tasks/access-application-cluster/configure-access-multiple-clusters/
    Registered: Wed Feb 12 06:21:24 UTC 2025
    - 471K bytes
    - Viewed (0)
  10. Update Your App | Kubernetes

    Production-Grade Container Orchestration
    kubernetes.io/docs/tutorials/kubernetes-basics/update/
    Registered: Wed Feb 12 06:21:41 UTC 2025
    - 427.8K bytes
    - Viewed (0)
Back to top