Search Options

Results per page
Sort
Preferred Languages
Labels
Advance

Popular Words: テスト test

Results 101 - 110 of 660 for host:kubernetes.io (0.02 sec)

  1. Advertise Extended Resources for a Node | Kuber...

    This page shows how to specify extended resources for a Node. Extended resources allow cluster administrators to advertise node-level resources that would otherwise be unknown to Kubernetes. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts.
    kubernetes.io/docs/tasks/administer-cluster/extended-resource-node/
    Registered: Fri May 31 05:46:54 UTC 2024
    - 427.6K bytes
    - Viewed (0)
  2. Compute, Storage, and Networking Extensions | K...

    This section covers extensions to your cluster that do not come as part as Kubernetes itself. You can use these extensions to enhance the nodes in your cluster, or to provide the network fabric that links Pods together. CSI and FlexVolume storage plugins Container Storage Interface (CSI) plugins provide a way to extend Kubernetes with supports for new kinds of volumes. The volumes can be backed by durable external storage, or provide ephemeral storage, or they might offer a read-only interface to information using a filesystem paradigm.
    kubernetes.io/docs/concepts/extend-kubernetes/compute-storage-net/
    Registered: Fri May 31 05:47:51 UTC 2024
    - 419.2K bytes
    - Viewed (0)
  3. Use Calico for NetworkPolicy | Kubernetes

    This page shows a couple of quick ways to create a Calico cluster on Kubernetes. Before you begin Decide whether you want to deploy a cloud or local cluster. Creating a Calico cluster with Google Kubernetes Engine (GKE) Prerequisite: gcloud. To launch a GKE cluster with Calico, include the --enable-network-policy flag. Syntax gcloud container clusters create [CLUSTER_NAME] --enable-network-policy Example gcloud container clusters create my-calico-cluster --enable-network-policy To verify the deployment, use the following command.
    kubernetes.io/docs/tasks/administer-cluster/network-policy-provider/calico-network-policy/
    Registered: Fri May 31 05:47:26 UTC 2024
    - 420K bytes
    - Viewed (0)
  4. Expose Pod Information to Containers Through En...

    This page shows how a Pod can use environment variables to expose information about itself to containers running in the Pod, using the downward API. You can use environment variables to expose Pod fields, container fields, or both. In Kubernetes, there are two ways to expose Pod and container fields to a running container: Environment variables, as explained in this task Volume files Together, these two ways of exposing Pod and container fields are called the downward API.
    kubernetes.io/docs/tasks/inject-data-application/environment-variable-expose-pod-information/
    Registered: Fri May 31 05:59:43 UTC 2024
    - 443.4K bytes
    - Viewed (0)
  5. Explore Termination Behavior for Pods And Their...

    Once you connected your Application with Service following steps like those outlined in Connecting Applications with Services, you have a continuously running, replicated application, that is exposed on a network. This tutorial helps you look at the termination flow for Pods and to explore ways to implement graceful connection draining. Termination process for Pods and their endpoints There are often cases when you need to terminate a Pod - be it for upgrade or scale down.
    kubernetes.io/docs/tutorials/services/pods-and-endpoint-termination-flow/
    Registered: Fri May 31 06:09:52 UTC 2024
    - 434.4K bytes
    - Viewed (0)
  6. Authenticating | Kubernetes

    This page provides an overview of authentication. Users in Kubernetes All Kubernetes clusters have two categories of users: service accounts managed by Kubernetes, and normal users. It is assumed that a cluster-independent service manages normal users in the following ways: an administrator distributing private keys a user store like Keystone or Google Accounts a file with a list of usernames and passwords In this regard, Kubernetes does not have objects which represent normal user accounts.
    kubernetes.io/docs/reference/access-authn-authz/authentication/
    Registered: Fri May 31 06:09:58 UTC 2024
    - 627.1K bytes
    - Viewed (0)
  7. Managing Service Accounts | Kubernetes

    A ServiceAccount provides an identity for processes that run in a Pod. A process inside a Pod can use the identity of its associated service account to authenticate to the cluster's API server. For an introduction to service accounts, read configure service accounts. This task guide explains some of the concepts behind ServiceAccounts. The guide also explains how to obtain or revoke tokens that represent ServiceAccounts. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster.
    kubernetes.io/docs/reference/access-authn-authz/service-accounts-admin/
    Registered: Fri May 31 06:10:15 UTC 2024
    - 465.4K bytes
    - Viewed (0)
  8. Kubelet authentication/authorization | Kubernetes

    Overview A kubelet's HTTPS endpoint exposes APIs which give access to data of varying sensitivity, and allow you to perform operations with varying levels of power on the node and within containers. This document describes how to authenticate and authorize access to the kubelet's HTTPS endpoint. Kubelet authentication By default, requests to the kubelet's HTTPS endpoint that are not rejected by other configured authentication methods are treated as anonymous requests, and given a username of system:anonymous and a group of system:unauthenticated.
    kubernetes.io/docs/reference/access-authn-authz/kubelet-authn-authz/
    Registered: Fri May 31 06:10:27 UTC 2024
    - 421.4K bytes
    - Viewed (0)
  9. kubectl config use-context | Kubernetes

    Synopsis Set the current-context in a kubeconfig file. kubectl config use-context CONTEXT_NAME Examples # Use the context for the minikube cluster kubectl config use-context minikube Options -h, --help help for use-context --as string Username to impersonate for the operation. User could be a regular user or a service account in a namespace. --as-group strings Group to impersonate for the operation, this flag can be repeated to specify multiple groups.
    kubernetes.io/docs/reference/kubectl/generated/kubectl_config/kubectl_config_use-context/
    Registered: Fri May 31 06:18:15 UTC 2024
    - 424.8K bytes
    - Viewed (0)
  10. kubectl config view | Kubernetes

    Synopsis Display merged kubeconfig settings or a specified kubeconfig file. You can use --output jsonpath={...} to extract specific values using a jsonpath expression. kubectl config view [flags] Examples # Show merged kubeconfig settings kubectl config view # Show merged kubeconfig settings, raw certificate data, and exposed secrets kubectl config view --raw # Get the password for the e2e user kubectl config view -o jsonpath='{.users[?(@.name == "e2e")].user.password}' Options --allow-missing-template-keys     Default: true If true, ignore any errors in templates when a field or map key is missing in the template.
    kubernetes.io/docs/reference/kubectl/generated/kubectl_config/kubectl_config_view/
    Registered: Fri May 31 06:18:21 UTC 2024
    - 428K bytes
    - Viewed (0)
Back to top