Search Options

Results per page
Sort
Preferred Languages
Labels
Advance

Popular Words: ใƒ†ใ‚นใƒˆ test

Results 11 - 20 of 659 for timestamp:[now/d-1M TO *] (0.03 sec)

  1. ReplicaSet | Kubernetes

    A ReplicaSet's purpose is to maintain a stable set of replica Pods running at any given time. Usually, you define a Deployment and let that Deployment manage ReplicaSets automatically.
    kubernetes.io/docs/concepts/workloads/controllers/replicaset/
    Registered: Fri May 10 07:22:39 UTC 2024
    - 456K bytes
    - Viewed (0)
  2. Sidecar Containers | Kubernetes

    FEATURE STATE: Kubernetes v1.29 [beta] Sidecar containers are the secondary containers that run along with the main application container within the same Pod. These containers are used to enhance or to extend the functionality of the primary app container by providing additional services, or functionality such as logging, monitoring, security, or data synchronization, without directly altering the primary application code. Typically, you only have one app container in a Pod.
    kubernetes.io/docs/concepts/workloads/pods/sidecar-containers/
    Registered: Fri May 10 07:23:40 UTC 2024
    - 437.6K bytes
    - Viewed (0)
  3. Service ClusterIP allocation | Kubernetes

    In Kubernetes, Services are an abstract way to expose an application running on a set of Pods. Services can have a cluster-scoped virtual IP address (using a Service of type: ClusterIP). Clients can connect using that virtual IP address, and Kubernetes then load-balances traffic to that Service across the different backing Pods. How Service ClusterIPs are allocated? When Kubernetes needs to assign a virtual IP address for a Service, that assignment happens one of two ways:
    kubernetes.io/docs/concepts/services-networking/cluster-ip-allocation/
    Registered: Fri May 10 07:25:35 UTC 2024
    - 425.8K bytes
    - Viewed (0)
  4. Ephemeral Containers | Kubernetes

    FEATURE STATE: Kubernetes v1.25 [stable] This page provides an overview of ephemeral containers: a special type of container that runs temporarily in an existing Pod to accomplish user-initiated actions such as troubleshooting. You use ephemeral containers to inspect services rather than to build applications. Understanding ephemeral containers Pods are the fundamental building block of Kubernetes applications. Since Pods are intended to be disposable and replaceable, you cannot add a container to a Pod once it has been created.
    kubernetes.io/docs/concepts/workloads/pods/ephemeral-containers/
    Registered: Fri May 10 07:26:18 UTC 2024
    - 420.6K bytes
    - Viewed (0)
  5. IPv4/IPv6 dual-stack | Kubernetes

    Kubernetes lets you configure single-stack IPv4 networking, single-stack IPv6 networking, or dual stack networking with both network families active. This page explains how.
    kubernetes.io/docs/concepts/services-networking/dual-stack/
    Registered: Fri May 10 07:26:37 UTC 2024
    - 453.2K bytes
    - Viewed (0)
  6. Owners and Dependents | Kubernetes

    In Kubernetes, some objects are owners of other objects. For example, a ReplicaSet is the owner of a set of Pods. These owned objects are dependents of their owner. Ownership is different from the labels and selectors mechanism that some resources also use. For example, consider a Service that creates EndpointSlice objects. The Service uses labels to allow the control plane to determine which EndpointSlice objects are used for that Service.
    kubernetes.io/docs/concepts/overview/working-with-objects/owners-dependents/
    Registered: Fri May 10 07:25:50 UTC 2024
    - 422.6K bytes
    - Viewed (0)
  7. Configuration | Kubernetes

    Resources that Kubernetes provides for configuring Pods.
    kubernetes.io/docs/concepts/configuration/
    Registered: Fri May 10 07:29:32 UTC 2024
    - 414.2K bytes
    - Viewed (0)
  8. Secrets | Kubernetes

    A Secret is an object that contains a small amount of sensitive data such as a password, a token, or a key. Such information might otherwise be put in a Pod specification or in a container image. Using a Secret means that you don't need to include confidential data in your application code. Because Secrets can be created independently of the Pods that use them, there is less risk of the Secret (and its data) being exposed during the workflow of creating, viewing, and editing Pods.
    kubernetes.io/docs/concepts/configuration/secret/
    Registered: Fri May 10 07:29:36 UTC 2024
    - 491.3K bytes
    - Viewed (0)
  9. Kubernetes API Server Bypass Risks | Kubernetes

    Security architecture information relating to the API server and other components
    kubernetes.io/docs/concepts/security/api-server-bypass-risks/
    Registered: Fri May 10 07:30:53 UTC 2024
    - 422.1K bytes
    - Viewed (0)
  10. Organizing Cluster Access Using kubeconfig File...

    Use kubeconfig files to organize information about clusters, users, namespaces, and authentication mechanisms. The kubectl command-line tool uses kubeconfig files to find the information it needs to choose a cluster and communicate with the API server of a cluster. Note: A file that is used to configure access to clusters is called a kubeconfig file. This is a generic way of referring to configuration files. It does not mean that there is a file named kubeconfig.
    kubernetes.io/docs/concepts/configuration/organize-cluster-access-kubeconfig/
    Registered: Fri May 10 07:30:24 UTC 2024
    - 427.3K bytes
    - Viewed (0)
Back to top