Search Options

Results per page
Sort
Preferred Languages
Labels
Advance

Popular Words: test ใƒ†ใ‚นใƒˆ

Results 21 - 30 of 30 for host:kubernetes.io (0.02 sec)

  1. Running ZooKeeper, A Distributed System Coordin...

    This tutorial demonstrates running Apache Zookeeper on Kubernetes using StatefulSets, PodDisruptionBudgets, and PodAntiAffinity. Before you begin Before starting this tutorial, you should be familiar with the following Kubernetes concepts: Pods Cluster DNS Headless Services PersistentVolumes PersistentVolume Provisioning StatefulSets PodDisruptionBudgets PodAntiAffinity kubectl CLI You must have a cluster with at least four nodes, and each node requires at least 2 CPUs and 4 GiB of memory. In this tutorial you will cordon and drain the cluster's nodes.
    kubernetes.io/docs/tutorials/stateful-application/zookeeper/
    Registered: Fri Apr 26 07:56:57 UTC 2024
    - 509.5K bytes
    - Viewed (0)
  2. Well-Known Labels, Annotations and Taints | Kub...

    Kubernetes reserves all labels and annotations in the kubernetes.io and k8s.io namespaces. This document serves both as a reference to the values and as a coordination point for assigning values. Labels, annotations and taints used on API objects apf.kubernetes.io/autoupdate-spec Type: Annotation Example: apf.kubernetes.io/autoupdate-spec: "true" Used on: FlowSchema and PriorityLevelConfiguration Objects If this annotation is set to true on a FlowSchema or PriorityLevelConfiguration, the spec for that object is managed by the kube-apiserver.
    kubernetes.io/docs/reference/labels-annotations-taints/
    Registered: Fri Apr 26 07:57:16 UTC 2024
    - 541.9K bytes
    - Viewed (0)
  3. Kubernetes API Concepts | Kubernetes

    The Kubernetes API is a resource-based (RESTful) programmatic interface provided via HTTP. It supports retrieving, creating, updating, and deleting primary resources via the standard HTTP verbs (POST, PUT, PATCH, DELETE, GET). For some resources, the API includes additional subresources that allow fine grained authorization (such as separate views for Pod details and log retrievals), and can accept and serve those resources in different representations for convenience or efficiency. Kubernetes supports efficient change notifications on resources via watches.
    kubernetes.io/docs/reference/using-api/api-concepts/
    Registered: Fri Apr 26 07:56:30 UTC 2024
    - 493.7K bytes
    - Viewed (0)
  4. Service | Kubernetes

    Expose an application running in your cluster behind a single outward-facing endpoint, even when the workload is split across multiple backends.
    kubernetes.io/docs/concepts/services-networking/service/
    Registered: Fri Apr 26 07:23:41 UTC 2024
    - 500.7K bytes
    - Viewed (0)
  5. Volumes | Kubernetes

    On-disk files in a container are ephemeral, which presents some problems for non-trivial applications when running in containers. One problem occurs when a container crashes or is stopped. Container state is not saved so all of the files that were created or modified during the lifetime of the container are lost. During a crash, kubelet restarts the container with a clean state. Another problem occurs when multiple containers are running in a Pod and need to share files.
    kubernetes.io/docs/concepts/storage/volumes/
    Registered: Fri Apr 26 07:26:51 UTC 2024
    - 529.6K bytes
    - Viewed (0)
  6. Validating Admission Policy | Kubernetes

    FEATURE STATE: Kubernetes v1.30 [stable] This page provides an overview of Validating Admission Policy. What is Validating Admission Policy? Validating admission policies offer a declarative, in-process alternative to validating admission webhooks. Validating admission policies use the Common Expression Language (CEL) to declare the validation rules of a policy. Validation admission policies are highly configurable, enabling policy authors to define policies that can be parameterized and scoped to resources as needed by cluster administrators.
    kubernetes.io/docs/reference/access-authn-authz/validating-admission-policy/
    Registered: Fri Apr 26 07:54:40 UTC 2024
    - 504.7K bytes
    - Viewed (0)
  7. Using RBAC Authorization | Kubernetes

    Role-based access control (RBAC) is a method of regulating access to computer or network resources based on the roles of individual users within your organization. RBAC authorization uses the rbac.authorization.k8s.io API group to drive authorization decisions, allowing you to dynamically configure policies through the Kubernetes API. To enable RBAC, start the API server with the --authorization-mode flag set to a comma-separated list that includes RBAC; for example: kube-apiserver --authorization-mode=Example,RBAC --other-options --more-options API objects The RBAC API declares four kinds of Kubernetes object: Role, ClusterRole, RoleBinding and ClusterRoleBinding.
    kubernetes.io/docs/reference/access-authn-authz/rbac/
    Registered: Fri Apr 26 07:53:50 UTC 2024
    - 541.1K bytes
    - Viewed (0)
  8. Secrets | Kubernetes

    A Secret is an object that contains a small amount of sensitive data such as a password, a token, or a key. Such information might otherwise be put in a Pod specification or in a container image. Using a Secret means that you don't need to include confidential data in your application code. Because Secrets can be created independently of the Pods that use them, there is less risk of the Secret (and its data) being exposed during the workflow of creating, viewing, and editing Pods.
    kubernetes.io/docs/concepts/configuration/secret/
    Registered: Fri Apr 26 07:25:34 UTC 2024
    - 490.2K bytes
    - Viewed (0)
  9. kubelet | Kubernetes

    Synopsis The kubelet is the primary "node agent" that runs on each node. It can register the node with the apiserver using one of: the hostname; a flag to override the hostname; or specific logic for a cloud provider. The kubelet works in terms of a PodSpec. A PodSpec is a YAML or JSON object that describes a pod. The kubelet takes a set of PodSpecs that are provided through various mechanisms (primarily through the apiserver) and ensures that the containers described in those PodSpecs are running and healthy.
    kubernetes.io/docs/reference/command-line-tools-reference/kubelet/
    Registered: Fri Apr 26 08:14:41 UTC 2024
    - 492.4K bytes
    - Viewed (0)
  10. Updating Configuration via a ConfigMap | Kubern...

    This page provides a step-by-step example of updating configuration within a Pod via a ConfigMap and builds upon the Configure a Pod to Use a ConfigMap task. At the end of this tutorial, you will understand how to change the configuration for a running application. This tutorial uses the alpine and nginx images as examples. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster.
    kubernetes.io/docs/tutorials/configuration/updating-configuration-via-a-configmap/
    Registered: Fri Apr 26 07:50:50 UTC 2024
    - 507.8K bytes
    - Viewed (0)
Back to top