Search Options

Results per page
Sort
Preferred Languages
Labels
Advance

Results 61 - 70 of 699 for host:kubernetes.io (0.03 sec)

  1. Pod Quality of Service Classes | Kubernetes

    This page introduces Quality of Service (QoS) classes in Kubernetes, and explains how Kubernetes assigns a QoS class to each Pod as a consequence of the resource constraints that you specify for the containers in that Pod. Kubernetes relies on this classification to make decisions about which Pods to evict when there are not enough available resources on a Node. Quality of Service classes Kubernetes classifies the Pods that you run and allocates each Pod into a specific quality of service (QoS) class.
    kubernetes.io/docs/concepts/workloads/pods/pod-qos/
    Registered: Mon Sep 15 08:26:39 UTC 2025
    - 465.1K bytes
    - Viewed (0)
  2. User Namespaces | Kubernetes

    FEATURE STATE: Kubernetes v1.30 [beta] This page explains how user namespaces are used in Kubernetes pods. A user namespace isolates the user running inside the container from the one in the host. A process running as root in a container can run as a different (non-root) user in the host; in other words, the process has full privileges for operations inside the user namespace, but is unprivileged for operations outside the namespace.
    kubernetes.io/docs/concepts/workloads/pods/user-namespaces/
    Registered: Mon Sep 15 08:28:16 UTC 2025
    - 473.6K bytes
    - Viewed (0)
  3. DaemonSet | Kubernetes

    A DaemonSet defines Pods that provide node-local facilities. These might be fundamental to the operation of your cluster, such as a networking helper tool, or be part of an add-on.
    kubernetes.io/docs/concepts/workloads/controllers/daemonset/
    Registered: Mon Sep 15 08:28:22 UTC 2025
    - 484.8K bytes
    - Viewed (0)
  4. Enforcing Pod Security Standards | Kubernetes

    This page provides an overview of best practices when it comes to enforcing Pod Security Standards. Using the built-in Pod Security Admission Controller FEATURE STATE: Kubernetes v1.25 [stable] The Pod Security Admission Controller intends to replace the deprecated PodSecurityPolicies. Configure all cluster namespaces Namespaces that lack any configuration at all should be considered significant gaps in your cluster security model. We recommend taking the time to analyze the types of workloads occurring in each namespace, and by referencing the Pod Security Standards, decide on an appropriate level for each of them.
    kubernetes.io/docs/setup/best-practices/enforcing-pod-security-standards/
    Registered: Mon Sep 15 08:28:02 UTC 2025
    - 463.4K bytes
    - Viewed (0)
  5. Volume Snapshot Classes | Kubernetes

    This document describes the concept of VolumeSnapshotClass in Kubernetes. Familiarity with volume snapshots and storage classes is suggested. Introduction Just like StorageClass provides a way for administrators to describe the "classes" of storage they offer when provisioning a volume, VolumeSnapshotClass provides a way to describe the "classes" of storage when provisioning a volume snapshot. The VolumeSnapshotClass Resource Each VolumeSnapshotClass contains the fields driver, deletionPolicy, and parameters, which are used when a VolumeSnapshot belonging to the class needs to be dynamically provisioned.
    kubernetes.io/docs/concepts/storage/volume-snapshot-classes/
    Registered: Mon Sep 15 08:27:43 UTC 2025
    - 464.4K bytes
    - Viewed (0)
  6. CSI Volume Cloning | Kubernetes

    This document describes the concept of cloning existing CSI Volumes in Kubernetes. Familiarity with Volumes is suggested. Introduction The CSI Volume Cloning feature adds support for specifying existing PVCs in the dataSource field to indicate a user would like to clone a Volume. A Clone is defined as a duplicate of an existing Kubernetes Volume that can be consumed as any standard Volume would be. The only difference is that upon provisioning, rather than creating a "new" empty Volume, the back end device creates an exact duplicate of the specified Volume.
    kubernetes.io/docs/concepts/storage/volume-pvc-datasource/
    Registered: Mon Sep 15 08:22:54 UTC 2025
    - 463.5K bytes
    - Viewed (0)
  7. Managing Workloads | Kubernetes

    You've deployed your application and exposed it via a Service. Now what? Kubernetes provides a number of tools to help you manage your application deployment, including scaling and updating. Organizing resource configurations Many applications require multiple resources to be created, such as a Deployment along with a Service. Management of multiple resources can be simplified by grouping them together in the same file (separated by --- in YAML). For example:
    kubernetes.io/docs/concepts/workloads/management/
    Registered: Mon Sep 15 08:23:19 UTC 2025
    - 491.7K bytes
    - Viewed (0)
  8. PKI certificates and requirements | Kubernetes

    Kubernetes requires PKI certificates for authentication over TLS. If you install Kubernetes with kubeadm, the certificates that your cluster requires are automatically generated. You can also generate your own certificates -- for example, to keep your private keys more secure by not storing them on the API server. This page explains the certificates that your cluster requires. How certificates are used by your cluster Kubernetes requires PKI for the following operations:
    kubernetes.io/docs/setup/best-practices/certificates/
    Registered: Mon Sep 15 08:23:27 UTC 2025
    - 473.8K bytes
    - Viewed (0)
  9. Deployments | Kubernetes

    A Deployment manages a set of Pods to run an application workload, usually one that doesn't maintain state.
    kubernetes.io/docs/concepts/workloads/controllers/deployment/
    Registered: Mon Sep 15 08:20:58 UTC 2025
    - 551.2K bytes
    - Viewed (0)
  10. Production environment | Kubernetes

    Create a production-quality Kubernetes cluster
    kubernetes.io/docs/setup/production-environment/
    Registered: Mon Sep 15 08:18:22 UTC 2025
    - 475.6K bytes
    - Viewed (0)
Back to top