- Sort Score
- Result 10 results
- Languages All
- Labels All
Results 681 - 690 of 723 for host:kubernetes.io (0.03 sec)
-
kubectl create quota | Kubernetes
Synopsis Create a resource quota with the specified name, hard limits, and optional scopes. kubectl create quota NAME [--hard=key1=value1,key2=value2] [--scopes=Scope1,Scope2] [--dry-run=server|client|none] Examples # Create a new resource quota named my-quota kubectl create quota my-quota --hard=cpu=1,memory=1G,pods=2,services=3,replicationcontrollers=2,resourcequotas=1,secrets=5,persistentvolumeclaims=10 # Create a new resource quota named best-effort kubectl create quota best-effort --hard=pods=100 --scopes=BestEffort Options --allow-missing-template-keys Default: true If true, ignore any errors in templates when a field or map key is missing in the template.kubernetes.io/docs/reference/kubectl/generated/kubectl_create/kubectl_create_quota/Registered: Mon Jan 26 07:28:53 UTC 2026 - 479.3K bytes - Viewed (0) -
kubectl drain | Kubernetes
Production-Grade Container Orchestrationkubernetes.io/docs/reference/kubectl/generated/kubectl_drain/Registered: Mon Jan 26 07:28:29 UTC 2026 - 479.3K bytes - Viewed (0) -
kubectl create secret tls | Kubernetes
Synopsis Create a TLS secret from the given public/private key pair. The public/private key pair must exist beforehand. The public key certificate must be .PEM encoded and match the given private key. kubectl create secret tls NAME --cert=path/to/cert/file --key=path/to/key/file [--dry-run=server|client|none] Examples # Create a new TLS secret named tls-secret with the given key pair kubectl create secret tls tls-secret --cert=path/to/tls.crt --key=path/to/tls.key Options --allow-missing-template-keys Default: true If true, ignore any errors in templates when a field or map key is missing in the template.kubernetes.io/docs/reference/kubectl/generated/kubectl_create/kubectl_create_secret_tls/Registered: Mon Jan 26 07:31:32 UTC 2026 - 479.2K bytes - Viewed (0) -
kubectl create service nodeport | Kubernetes
Synopsis Create a NodePort service with the specified name. kubectl create service nodeport NAME [--tcp=port:targetPort] [--dry-run=server|client|none] Examples # Create a new NodePort service named my-ns kubectl create service nodeport my-ns --tcp=5678:8080 Options --allow-missing-template-keys Default: true If true, ignore any errors in templates when a field or map key is missing in the template. Only applies to golang and jsonpath output formats. --dry-run string[="unchanged"] Default: "none" Must be "none", "server", or "client". If client strategy, only print the object that would be sent, without sending it.kubernetes.io/docs/reference/kubectl/generated/kubectl_create/kubectl_create_service_nodeport/Registered: Mon Jan 26 07:30:44 UTC 2026 - 479.1K bytes - Viewed (0) -
kubectl set serviceaccount | Kubernetes
Synopsis Update the service account of pod template resources. Possible resources (case insensitive) can be: replicationcontroller (rc), deployment (deploy), daemonset (ds), job, replicaset (rs), statefulset kubectl set serviceaccount (-f FILENAME | TYPE NAME) SERVICE_ACCOUNT Examples # Set deployment nginx-deployment's service account to serviceaccount1 kubectl set serviceaccount deployment nginx-deployment serviceaccount1 # Print the result (in YAML format) of updated nginx deployment with the service account from local file, without hitting the API server kubectl set sa -f nginx-deployment.kubernetes.io/docs/reference/kubectl/generated/kubectl_set/kubectl_set_serviceaccount/Registered: Mon Jan 26 07:30:17 UTC 2026 - 478.7K bytes - Viewed (0) -
kubectl create secret generic | Kubernetes
Synopsis Create a secret based on a file, directory, or specified literal value. A single secret may package one or more key/value pairs. When creating a secret based on a file, the key will default to the basename of the file, and the value will default to the file content. If the basename is an invalid key or you wish to chose your own, you may specify an alternate key.kubernetes.io/docs/reference/kubectl/generated/kubectl_create/kubectl_create_secret_generic/Registered: Mon Jan 26 07:32:29 UTC 2026 - 480.1K bytes - Viewed (0) -
kubectl top pod | Kubernetes
Synopsis Display resource (CPU/memory) usage of pods. The 'top pod' command allows you to see the resource consumption of pods. Due to the metrics pipeline delay, they may be unavailable for a few minutes since pod creation. kubectl top pod [NAME | -l label] Examples # Show metrics for all pods in the default namespace kubectl top pod # Show metrics for all pods in the given namespace kubectl top pod --namespace=NAMESPACE # Show metrics for a given pod and its containers kubectl top pod POD_NAME --containers # Show metrics for the pods defined by label name=myLabel kubectl top pod -l name=myLabel Options -A, --all-namespaces If present, list the requested object(s) across all namespaces.kubernetes.io/docs/reference/kubectl/generated/kubectl_top/kubectl_top_pod/Registered: Mon Jan 26 07:34:31 UTC 2026 - 478K bytes - Viewed (0) -
kubectl create secret docker-registry | Kubernetes
Synopsis Create a new secret for use with Docker registries. Dockercfg secrets are used to authenticate against Docker registries. When using the Docker command line to push images, you can authenticate to a given registry by running: '$ docker login DOCKER_REGISTRY_SERVER --username=DOCKER_USER --password=DOCKER_PASSWORD --email=DOCKER_EMAIL'. That produces a ~/.dockercfg file that is used by subsequent 'docker push' and 'docker pull' commands to authenticate to the registry. The email address is optional.kubernetes.io/docs/reference/kubectl/generated/kubectl_create/kubectl_create_secret_docker-registry/Registered: Mon Jan 26 07:34:38 UTC 2026 - 480.9K bytes - Viewed (0) -
kubectl delete | Kubernetes
Production-Grade Container Orchestrationkubernetes.io/docs/reference/kubectl/generated/kubectl_delete/Registered: Mon Jan 26 07:33:50 UTC 2026 - 481.7K bytes - Viewed (0) -
Roles and responsibilities | Kubernetes
Anyone can contribute to Kubernetes. As your contributions to SIG Docs grow, you can apply for different levels of membership in the community. These roles allow you to take on more responsibility within the community. Each role requires more time and commitment. The roles are: Anyone: regular contributors to the Kubernetes documentation Members: can assign and triage issues and provide non-binding review on pull requests Reviewers: can lead reviews on documentation pull requests and can vouch for a change's quality Approvers: can lead reviews on documentation and merge changes Anyone Anyone with a GitHub account can contribute to Kubernetes.kubernetes.io/docs/contribute/participate/roles-and-responsibilities/Registered: Mon Jan 26 07:35:54 UTC 2026 - 479.8K bytes - Viewed (0)