- Sort Score
- Result 10 results
- Languages All
- Labels All
Results 191 - 200 of 602 for content_length:[500000 TO 999999] (0.1 sec)
-
Updating Configuration via a ConfigMap | Kubern...
This page provides a step-by-step example of updating configuration within a Pod via a ConfigMap and builds upon the Configure a Pod to Use a ConfigMap task. At the end of this tutorial, you will understand how to change the configuration for a running application. This tutorial uses the alpine and nginx images as examples. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster.kubernetes.io/docs/tutorials/configuration/updating-configuration-via-a-configmap/Registered: Wed Oct 15 08:18:43 UTC 2025 - 552.2K bytes - Viewed (0) -
Secrets | Kubernetes
A Secret is an object that contains a small amount of sensitive data such as a password, a token, or a key. Such information might otherwise be put in a Pod specification or in a container image. Using a Secret means that you don't need to include confidential data in your application code. Because Secrets can be created independently of the Pods that use them, there is less risk of the Secret (and its data) being exposed during the workflow of creating, viewing, and editing Pods.kubernetes.io/docs/concepts/configuration/secret/Registered: Wed Oct 15 07:39:02 UTC 2025 - 531.8K bytes - Viewed (0) -
Control Topology Management Policies on a node ...
FEATURE STATE: Kubernetes v1.27 [stable] An increasing number of systems leverage a combination of CPUs and hardware accelerators to support latency-critical execution and high-throughput parallel computation. These include workloads in fields such as telecommunications, scientific computing, machine learning, financial services and data analytics. Such hybrid systems comprise a high performance environment. In order to extract the best performance, optimizations related to CPU isolation, memory and device locality are required. However, in Kubernetes, these optimizations are handled by a disjoint set of components.kubernetes.io/docs/tasks/administer-cluster/topology-manager/Registered: Wed Oct 15 07:59:21 UTC 2025 - 490.3K bytes - Viewed (0) -
Set up Konnectivity service | Kubernetes
The Konnectivity service provides a TCP level proxy for the control plane to cluster communication. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube.kubernetes.io/docs/tasks/extend-kubernetes/setup-konnectivity/Registered: Wed Oct 15 08:14:46 UTC 2025 - 504K bytes - Viewed (0) -
Admission Control in Kubernetes | Kubernetes
This page provides an overview of admission controllers. An admission controller is a piece of code that intercepts requests to the Kubernetes API server prior to persistence of the resource, but after the request is authenticated and authorized. Several important features of Kubernetes require an admission controller to be enabled in order to properly support the feature. As a result, a Kubernetes API server that is not properly configured with the right set of admission controllers is an incomplete server that will not support all the features you expect.kubernetes.io/docs/reference/access-authn-authz/admission-controllers/Registered: Wed Oct 15 08:23:43 UTC 2025 - 525.1K bytes - Viewed (0) -
Common Expression Language in Kubernetes | Kube...
The Common Expression Language (CEL) is used in the Kubernetes API to declare validation rules, policy rules, and other constraints or conditions. CEL expressions are evaluated directly in the API server, making CEL a convenient alternative to out-of-process mechanisms, such as webhooks, for many extensibility use cases. Your CEL expressions continue to execute so long as the control plane's API server component remains available. Language overview The CEL language has a straightforward syntax that is similar to the expressions in C, C++, Java, JavaScript and Go.kubernetes.io/docs/reference/using-api/cel/Registered: Wed Oct 15 08:23:30 UTC 2025 - 503.4K bytes - Viewed (0) -
HorizontalPodAutoscaler Walkthrough | Kubernetes
A HorizontalPodAutoscaler (HPA for short) automatically updates a workload resource (such as a Deployment or StatefulSet), with the aim of automatically scaling the workload to match demand. Horizontal scaling means that the response to increased load is to deploy more Pods. This is different from vertical scaling, which for Kubernetes would mean assigning more resources (for example: memory or CPU) to the Pods that are already running for the workload.kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale-walkthrough/Registered: Wed Oct 15 08:10:49 UTC 2025 - 519.9K bytes - Viewed (0) -
Handling retriable and non-retriable pod failur...
FEATURE STATE: Kubernetes v1.31 [stable] (enabled by default: true) This document shows you how to use the Pod failure policy, in combination with the default Pod backoff failure policy, to improve the control over the handling of container- or Pod-level failure within a Job. The definition of Pod failure policy may help you to: better utilize the computational resources by avoiding unnecessary Pod retries. avoid Job failures due to Pod disruptions (such preemption, API-initiated eviction or taint-based eviction).kubernetes.io/docs/tasks/job/pod-failure-policy/Registered: Wed Oct 15 08:10:54 UTC 2025 - 502.9K bytes - Viewed (0) -
Declarative API Validation | Kubernetes
FEATURE STATE: Kubernetes v1.33 [beta] Kubernetes 1.34 includes optional declarative validation for APIs. When enabled, the Kubernetes API server can use this mechanism rather than the legacy approach that relies on hand-written Go code (validation.go files) to ensure that requests against the API are valid. Kubernetes developers, and people extending the Kubernetes API, can define validation rules directly alongside the API type definitions (types.go files). Code authors define pecial comment tags (e.kubernetes.io/docs/reference/using-api/declarative-validation/Registered: Wed Oct 15 08:25:03 UTC 2025 - 511K bytes - Viewed (0) -
Using RBAC Authorization | Kubernetes
Role-based access control (RBAC) is a method of regulating access to computer or network resources based on the roles of individual users within your organization. RBAC authorization uses the rbac.authorization.k8s.io API group to drive authorization decisions, allowing you to dynamically configure policies through the Kubernetes API. To enable RBAC, start the API server with the --authorization-config flag set to a file that includes the RBAC authorizer; for example: apiVersion: apiserver.kubernetes.io/docs/reference/access-authn-authz/rbac/Registered: Wed Oct 15 08:24:41 UTC 2025 - 589.1K bytes - Viewed (0)