Search Options

Results per page
Sort
Preferred Languages
Labels
Advance

Popular Words: %27 [xss] test テスト

Results 581 - 590 of 705 for host:kubernetes.io (2.07 sec)

  1. Configuring Redis using a ConfigMap | Kubernetes

    This page provides a real world example of how to configure Redis using a ConfigMap and builds upon the Configure a Pod to Use a ConfigMap task. Objectives Create a ConfigMap with Redis configuration values Create a Redis Pod that mounts and uses the created ConfigMap Verify that the configuration was correctly applied. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster.
    kubernetes.io/docs/tutorials/configuration/configure-redis-using-configmap/
    Registered: Fri Dec 12 08:48:51 UTC 2025
    - 483.2K bytes
    - Viewed (0)
  2. Well-Known Labels, Annotations and Taints | Kub...

    Production-Grade Container Orchestration
    kubernetes.io/docs/reference/labels-annotations-taints/
    Registered: Fri Dec 12 08:49:03 UTC 2025
    - 615.4K bytes
    - Viewed (0)
  3. Kubernetes API Concepts | Kubernetes

    The Kubernetes API is a resource-based (RESTful) programmatic interface provided via HTTP. It supports retrieving, creating, updating, and deleting primary resources via the standard HTTP verbs (POST, PUT, PATCH, DELETE, GET). For some resources, the API includes additional subresources that allow fine-grained authorization (such as separate views for Pod details and log retrievals), and can accept and serve those resources in different representations for convenience or efficiency. Kubernetes supports efficient change notifications on resources via watches: in the Kubernetes API, watch is a verb that is used to track changes to an object in Kubernetes as a stream.
    kubernetes.io/docs/reference/using-api/api-concepts/
    Registered: Fri Dec 12 08:48:32 UTC 2025
    - 566.5K bytes
    - Viewed (0)
  4. Restrict a Container's Access to Resources with...

    FEATURE STATE: Kubernetes v1.31 [stable](enabled by default) This page shows you how to load AppArmor profiles on your nodes and enforce those profiles in Pods. To learn more about how Kubernetes can confine Pods using AppArmor, see Linux kernel security constraints for Pods and containers. Objectives See an example of how to load a profile on a Node Learn how to enforce the profile on a Pod Learn how to check that the profile is loaded See what happens when a profile is violated See what happens when a profile cannot be loaded Before you begin AppArmor is an optional kernel module and Kubernetes feature, so verify it is supported on your Nodes before proceeding:
    kubernetes.io/docs/tutorials/security/apparmor/
    Registered: Fri Dec 12 08:49:27 UTC 2025
    - 481.1K bytes
    - Viewed (0)
  5. Cluster Management | Kubernetes

    Production-Grade Container Orchestration
    kubernetes.io/docs/tutorials/cluster-management/
    Registered: Fri Dec 12 08:50:14 UTC 2025
    - 456.4K bytes
    - Viewed (0)
  6. Running ZooKeeper, A Distributed System Coordin...

    This tutorial demonstrates running Apache Zookeeper on Kubernetes using StatefulSets, PodDisruptionBudgets, and PodAntiAffinity. Before you begin Before starting this tutorial, you should be familiar with the following Kubernetes concepts: Pods Cluster DNS Headless Services PersistentVolumes StatefulSets PodDisruptionBudgets PodAntiAffinity kubectl CLI You must have a cluster with at least four nodes, and each node requires at least 2 CPUs and 4 GiB of memory. In this tutorial you will cordon and drain the cluster's nodes.
    kubernetes.io/docs/tutorials/stateful-application/zookeeper/
    Registered: Fri Dec 12 08:55:14 UTC 2025
    - 553.6K bytes
    - Viewed (0)
  7. kubectl create service nodeport | Kubernetes

    Synopsis Create a NodePort service with the specified name. kubectl create service nodeport NAME [--tcp=port:targetPort] [--dry-run=server|client|none] Examples # Create a new NodePort service named my-ns kubectl create service nodeport my-ns --tcp=5678:8080 Options --allow-missing-template-keys     Default: true If true, ignore any errors in templates when a field or map key is missing in the template. Only applies to golang and jsonpath output formats. --dry-run string[="unchanged"]     Default: "none" Must be "none", "server", or "client". If client strategy, only print the object that would be sent, without sending it.
    kubernetes.io/docs/reference/kubectl/generated/kubectl_create/kubectl_create_service_nodeport/
    Registered: Fri Dec 12 09:10:41 UTC 2025
    - 469.5K bytes
    - Viewed (0)
  8. kubectl create secret tls | Kubernetes

    Synopsis Create a TLS secret from the given public/private key pair. The public/private key pair must exist beforehand. The public key certificate must be .PEM encoded and match the given private key. kubectl create secret tls NAME --cert=path/to/cert/file --key=path/to/key/file [--dry-run=server|client|none] Examples # Create a new TLS secret named tls-secret with the given key pair kubectl create secret tls tls-secret --cert=path/to/tls.crt --key=path/to/tls.key Options --allow-missing-template-keys     Default: true If true, ignore any errors in templates when a field or map key is missing in the template.
    kubernetes.io/docs/reference/kubectl/generated/kubectl_create/kubectl_create_secret_tls/
    Registered: Fri Dec 12 09:10:28 UTC 2025
    - 469.6K bytes
    - Viewed (0)
  9. Implementation details | Kubernetes

    FEATURE STATE: Kubernetes v1.10 [stable] kubeadm init and kubeadm join together provide a nice user experience for creating a bare Kubernetes cluster from scratch, that aligns with the best-practices. However, it might not be obvious how kubeadm does that. This document provides additional details on what happens under the hood, with the aim of sharing knowledge on the best practices for a Kubernetes cluster. Core design principles The cluster that kubeadm init and kubeadm join set up should be:
    kubernetes.io/docs/reference/setup-tools/kubeadm/implementation-details/
    Registered: Fri Dec 12 08:58:57 UTC 2025
    - 505.3K bytes
    - Viewed (0)
  10. Ports and Protocols | Kubernetes

    When running Kubernetes in an environment with strict network boundaries, such as on-premises datacenter with physical network firewalls or Virtual Networks in Public Cloud, it is useful to be aware of the ports and protocols used by Kubernetes components. Control plane Protocol Direction Port Range Purpose Used By TCP Inbound 6443 Kubernetes API server All TCP Inbound 2379-2380 etcd server client API kube-apiserver, etcd TCP Inbound 10250 Kubelet API Self, Control plane TCP Inbound 10259 kube-scheduler Self TCP Inbound 10257 kube-controller-manager Self Although etcd ports are included in control plane section, you can also host your own etcd cluster externally or on custom ports.
    kubernetes.io/docs/reference/networking/ports-and-protocols/
    Registered: Fri Dec 12 08:59:48 UTC 2025
    - 461.5K bytes
    - Viewed (0)
Back to top