Search Options

Results per page
Sort
Preferred Languages
Labels
Advance

Popular Words: test ใƒ†ใ‚นใƒˆ

Results 31 - 40 of 657 for timestamp:[now/d-7d TO *] (0.04 sec)

  1. Restrict a Container's Syscalls with seccomp | ...

    FEATURE STATE: Kubernetes v1.19 [stable] Seccomp stands for secure computing mode and has been a feature of the Linux kernel since version 2.6.12. It can be used to sandbox the privileges of a process, restricting the calls it is able to make from userspace into the kernel. Kubernetes lets you automatically apply seccomp profiles loaded onto a node to your Pods and containers. Identifying the privileges required for your workloads can be difficult.
    kubernetes.io/docs/tutorials/security/seccomp/
    Registered: Fri May 10 07:58:27 UTC 2024
    - 477.7K bytes
    - Viewed (0)
  2. Multi-tenancy | Kubernetes

    This page provides an overview of available configuration options and best practices for cluster multi-tenancy. Sharing clusters saves costs and simplifies administration. However, sharing clusters also presents challenges such as security, fairness, and managing noisy neighbors. Clusters can be shared in many ways. In some cases, different applications may run in the same cluster. In other cases, multiple instances of the same application may run in the same cluster, one for each end user.
    kubernetes.io/docs/concepts/security/multi-tenancy/
    Registered: Fri May 10 07:29:51 UTC 2024
    - 449.9K bytes
    - Viewed (0)
  3. Node-pressure Eviction | Kubernetes

    Node-pressure eviction is the process by which the kubelet proactively terminates pods to reclaim resources on nodes. The kubelet monitors resources like memory, disk space, and filesystem inodes on your cluster's nodes. When one or more of these resources reach specific consumption levels, the kubelet can proactively fail one or more pods on the node to reclaim resources and prevent starvation. During a node-pressure eviction, the kubelet sets the phase for the selected pods to Failed, and terminates the Pod.
    kubernetes.io/docs/concepts/scheduling-eviction/node-pressure-eviction/
    Registered: Fri May 10 07:28:57 UTC 2024
    - 445K bytes
    - Viewed (0)
  4. Security | Kubernetes

    Concepts for keeping your cloud-native workload secure.
    kubernetes.io/docs/concepts/security/
    Registered: Fri May 10 07:29:59 UTC 2024
    - 422.2K bytes
    - Viewed (0)
  5. Volume Snapshot Classes | Kubernetes

    This document describes the concept of VolumeSnapshotClass in Kubernetes. Familiarity with volume snapshots and storage classes is suggested. Introduction Just like StorageClass provides a way for administrators to describe the "classes" of storage they offer when provisioning a volume, VolumeSnapshotClass provides a way to describe the "classes" of storage when provisioning a volume snapshot. The VolumeSnapshotClass Resource Each VolumeSnapshotClass contains the fields driver, deletionPolicy, and parameters, which are used when a VolumeSnapshot belonging to the class needs to be dynamically provisioned.
    kubernetes.io/docs/concepts/storage/volume-snapshot-classes/
    Registered: Fri May 10 07:28:40 UTC 2024
    - 422.9K bytes
    - Viewed (1)
  6. Windows Storage | Kubernetes

    This page provides an storage overview specific to the Windows operating system. Persistent storage Windows has a layered filesystem driver to mount container layers and create a copy filesystem based on NTFS. All file paths in the container are resolved only within the context of that container. With Docker, volume mounts can only target a directory in the container, and not an individual file. This limitation does not apply to containerd.
    kubernetes.io/docs/concepts/storage/windows-storage/
    Registered: Fri May 10 07:30:14 UTC 2024
    - 418.2K bytes
    - Viewed (0)
  7. Configure GMSA for Windows Pods and containers ...

    FEATURE STATE: Kubernetes v1.18 [stable] This page shows how to configure Group Managed Service Accounts (GMSA) for Pods and containers that will run on Windows nodes. Group Managed Service Accounts are a specific type of Active Directory account that provides automatic password management, simplified service principal name (SPN) management, and the ability to delegate the management to other administrators across multiple servers. In Kubernetes, GMSA credential specs are configured at a Kubernetes cluster-wide scope as Custom Resources.
    kubernetes.io/docs/tasks/configure-pod-container/configure-gmsa/
    Registered: Fri May 10 07:37:56 UTC 2024
    - 451.4K bytes
    - Viewed (0)
  8. Configure Pod Initialization | Kubernetes

    This page shows how to use an Init Container to initialize a Pod before an application Container runs. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube or you can use one of these Kubernetes playgrounds:
    kubernetes.io/docs/tasks/configure-pod-container/configure-pod-initialization/
    Registered: Fri May 10 07:39:00 UTC 2024
    - 428K bytes
    - Viewed (0)
  9. Limit Storage Consumption | Kubernetes

    This example demonstrates how to limit the amount of storage consumed in a namespace. The following resources are used in the demonstration: ResourceQuota, LimitRange, and PersistentVolumeClaim. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts.
    kubernetes.io/docs/tasks/administer-cluster/limit-storage-consumption/
    Registered: Fri May 10 07:38:47 UTC 2024
    - 422.9K bytes
    - Viewed (0)
  10. Using ABAC Authorization | Kubernetes

    Attribute-based access control (ABAC) defines an access control paradigm whereby access rights are granted to users through the use of policies which combine attributes together. Policy File Format To enable ABAC mode, specify --authorization-policy-file=SOME_FILENAME and --authorization-mode=ABAC on startup. The file format is one JSON object per line. There should be no enclosing list or map, only one map per line. Each line is a "policy object", where each such object is a map with the following properties:
    kubernetes.io/docs/reference/access-authn-authz/abac/
    Registered: Fri May 10 07:58:44 UTC 2024
    - 428.7K bytes
    - Viewed (0)
Back to top