Search Options

Results per page
Sort
Preferred Languages
Labels
Advance

Results 131 - 140 of 705 for host:kubernetes.io (0.05 sec)

  1. Decrypt Confidential Data that is Already Encry...

    All of the APIs in Kubernetes that let you write persistent API resource data support at-rest encryption. For example, you can enable at-rest encryption for Secrets. This at-rest encryption is additional to any system-level encryption for the etcd cluster or for the filesystem(s) on hosts where you are running the kube-apiserver. This page shows how to switch from encryption of API data at rest, so that API data are stored unencrypted.
    kubernetes.io/docs/tasks/administer-cluster/decrypt-data/
    Registered: Mon Nov 24 07:58:23 UTC 2025
    - 471.2K bytes
    - Viewed (0)
  2. Migrate Replicated Control Plane To Use Cloud C...

    The cloud-controller-manager is a Kubernetes control plane component that embeds cloud-specific control logic. The cloud controller manager lets you link your cluster into your cloud provider's API, and separates out the components that interact with that cloud platform from components that only interact with your cluster. By decoupling the interoperability logic between Kubernetes and the underlying cloud infrastructure, the cloud-controller-manager component enables cloud providers to release features at a different pace compared to the main Kubernetes project.
    kubernetes.io/docs/tasks/administer-cluster/controller-manager-leader-migration/
    Registered: Mon Nov 24 07:59:26 UTC 2025
    - 482.4K bytes
    - Viewed (0)
  3. Configure a Security Context for a Pod or Conta...

    A security context defines privilege and access control settings for a Pod or Container. Security context settings include, but are not limited to: Discretionary Access Control: Permission to access an object, like a file, is based on user ID (UID) and group ID (GID). Security Enhanced Linux (SELinux): Objects are assigned security labels. Running as privileged or unprivileged. Linux Capabilities: Give a process some privileges, but not all the privileges of the root user.
    kubernetes.io/docs/tasks/configure-pod-container/security-context/
    Registered: Mon Nov 24 07:59:48 UTC 2025
    - 539.2K bytes
    - Viewed (0)
  4. Romana for NetworkPolicy | Kubernetes

    This page shows how to use Romana for NetworkPolicy. Before you begin Complete steps 1, 2, and 3 of the kubeadm getting started guide. Installing Romana with kubeadm Follow the containerized installation guide for kubeadm. Applying network policies To apply network policies use one of the following: Romana network policies. Example of Romana network policy. The NetworkPolicy API. What's next Once you have installed Romana, you can follow the Declare Network Policy to try out Kubernetes NetworkPolicy.
    kubernetes.io/docs/tasks/administer-cluster/network-policy-provider/romana-network-policy/
    Registered: Mon Nov 24 07:58:58 UTC 2025
    - 460.1K bytes
    - Viewed (0)
  5. Disruptions | Kubernetes

    This guide is for application owners who want to build highly available applications, and thus need to understand what types of disruptions can happen to Pods. It is also for cluster administrators who want to perform automated cluster actions, like upgrading and autoscaling clusters. Voluntary and involuntary disruptions Pods do not disappear until someone (a person or a controller) destroys them, or there is an unavoidable hardware or system software error.
    kubernetes.io/docs/concepts/workloads/pods/disruptions/
    Registered: Mon Nov 24 07:45:33 UTC 2025
    - 479.6K bytes
    - Viewed (0)
  6. Ingress Controllers | Kubernetes

    In order for an [Ingress](/docs/concepts/services-networking/ingress/) to work in your cluster, there must be an _ingress controller_ running. You need to select at least one ingress controller and make sure it is set up in your cluster. This page lists common ingress controllers that you can deploy.
    kubernetes.io/docs/concepts/services-networking/ingress-controllers/
    Registered: Mon Nov 24 07:44:54 UTC 2025
    - 468.6K bytes
    - Viewed (0)
  7. Cluster Networking | Kubernetes

    Networking is a central part of Kubernetes, but it can be challenging to understand exactly how it is expected to work. There are 4 distinct networking problems to address: Highly-coupled container-to-container communications: this is solved by Pods and localhost communications. Pod-to-Pod communications: this is the primary focus of this document. Pod-to-Service communications: this is covered by Services. External-to-Service communications: this is also covered by Services. Kubernetes is all about sharing machines among applications.
    kubernetes.io/docs/concepts/cluster-administration/networking/
    Registered: Mon Nov 24 07:45:50 UTC 2025
    - 464.4K bytes
    - Viewed (0)
  8. Assigning Pods to Nodes | Kubernetes

    You can constrain a Pod so that it is restricted to run on particular node(s), or to prefer to run on particular nodes. There are several ways to do this and the recommended approaches all use label selectors to facilitate the selection. Often, you do not need to set any such constraints; the scheduler will automatically do a reasonable placement (for example, spreading your Pods across nodes so as not place Pods on a node with insufficient free resources).
    kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/
    Registered: Mon Nov 24 07:52:22 UTC 2025
    - 539.4K bytes
    - Viewed (0)
  9. Pod Scheduling Readiness | Kubernetes

    FEATURE STATE: Kubernetes v1.30 [stable] Pods were considered ready for scheduling once created. Kubernetes scheduler does its due diligence to find nodes to place all pending Pods. However, in a real-world case, some Pods may stay in a "miss-essential-resources" state for a long period. These Pods actually churn the scheduler (and downstream integrators like Cluster AutoScaler) in an unnecessary manner. By specifying/removing a Pod's .spec.schedulingGates, you can control when a Pod is ready to be considered for scheduling.
    kubernetes.io/docs/concepts/scheduling-eviction/pod-scheduling-readiness/
    Registered: Mon Nov 24 07:46:59 UTC 2025
    - 471.5K bytes
    - Viewed (0)
  10. Scheduling Framework | Kubernetes

    FEATURE STATE: Kubernetes v1.19 [stable] The scheduling framework is a pluggable architecture for the Kubernetes scheduler. It consists of a set of "plugin" APIs that are compiled directly into the scheduler. These APIs allow most scheduling features to be implemented as plugins, while keeping the scheduling "core" lightweight and maintainable. Refer to the design proposal of the scheduling framework for more technical information on the design of the framework.
    kubernetes.io/docs/concepts/scheduling-eviction/scheduling-framework/
    Registered: Mon Nov 24 07:47:12 UTC 2025
    - 475.5K bytes
    - Viewed (0)
Back to top