- Sort Score
- Result 10 results
- Languages All
- Labels All
Results 241 - 250 of 705 for host:kubernetes.io (0.03 sec)
-
Using NodeLocal DNSCache in Kubernetes Clusters...
FEATURE STATE: Kubernetes v1.18 [stable] This page provides an overview of NodeLocal DNSCache feature in Kubernetes. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube or you can use one of these Kubernetes playgrounds:kubernetes.io/docs/tasks/administer-cluster/nodelocaldns/Registered: Fri Dec 05 09:03:03 UTC 2025 - 469.1K bytes - Viewed (0) -
Cloud Controller Manager Administration | Kuber...
FEATURE STATE: Kubernetes v1.11 [beta] Since cloud providers develop and release at a different pace compared to the Kubernetes project, abstracting the provider-specific code to the cloud-controller-manager binary allows cloud vendors to evolve independently from the core Kubernetes code. The cloud-controller-manager can be linked to any cloud provider that satisfies cloudprovider.Interface. For backwards compatibility, the cloud-controller-manager provided in the core Kubernetes project uses the same cloud libraries as kube-controller-manager. Cloud providers already supported in Kubernetes core are expected to use the in-tree cloud-controller-manager to transition out of Kubernetes core.kubernetes.io/docs/tasks/administer-cluster/running-cloud-controller/Registered: Fri Dec 05 09:03:22 UTC 2025 - 481.6K bytes - Viewed (0) -
Utilizing the NUMA-aware Memory Manager | Kuber...
FEATURE STATE: Kubernetes v1.32 [stable](enabled by default) The Kubernetes Memory Manager enables the feature of guaranteed memory (and hugepages) allocation for pods in the Guaranteed QoS class. The Memory Manager employs hint generation protocol to yield the most suitable NUMA affinity for a pod. The Memory Manager feeds the central manager (Topology Manager) with these affinity hints. Based on both the hints and Topology Manager policy, the pod is rejected or admitted to the node.kubernetes.io/docs/tasks/administer-cluster/memory-manager/Registered: Fri Dec 05 09:03:26 UTC 2025 - 498.7K bytes - Viewed (0) -
Debugging DNS Resolution | Kubernetes
This page provides hints on diagnosing DNS problems. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube or you can use one of these Kubernetes playgrounds:kubernetes.io/docs/tasks/administer-cluster/dns-debugging-resolution/Registered: Fri Dec 05 09:02:36 UTC 2025 - 480.8K bytes - Viewed (0) -
Security | Kubernetes
Production-Grade Container Orchestrationkubernetes.io/docs/tutorials/security/Registered: Fri Dec 05 09:27:38 UTC 2025 - 456.8K bytes - Viewed (0) -
Kubernetes Deprecation Policy | Kubernetes
This document details the deprecation policy for various facets of the system. Kubernetes is a large system with many components and many contributors. As with any such software, the feature set naturally evolves over time, and sometimes a feature may need to be removed. This could include an API, a flag, or even an entire feature. To avoid breaking existing users, Kubernetes follows a deprecation policy for aspects of the system that are slated to be removed.kubernetes.io/docs/reference/using-api/deprecation-policy/Registered: Fri Dec 05 09:29:49 UTC 2025 - 479K bytes - Viewed (0) -
Kubelet authentication/authorization | Kubernetes
Overview A kubelet's HTTPS endpoint exposes APIs which give access to data of varying sensitivity, and allow you to perform operations with varying levels of power on the node and within containers. This document describes how to authenticate and authorize access to the kubelet's HTTPS endpoint. Kubelet authentication By default, requests to the kubelet's HTTPS endpoint that are not rejected by other configured authentication methods are treated as anonymous requests, and given a username of system:anonymous and a group of system:unauthenticated.kubernetes.io/docs/reference/access-authn-authz/kubelet-authn-authz/Registered: Fri Dec 05 09:30:15 UTC 2025 - 464.4K bytes - Viewed (0) -
kubeadm init phase | Kubernetes
kubeadm init phase enables you to invoke atomic steps of the bootstrap process. Hence, you can let kubeadm do some of the work and you can fill in the gaps if you wish to apply customization. kubeadm init phase is consistent with the kubeadm init workflow, and behind the scene both use the same code. kubeadm init phase preflight Using this command you can execute preflight checks on a control-plane node.kubernetes.io/docs/reference/setup-tools/kubeadm/kubeadm-init-phase/Registered: Fri Dec 05 09:32:00 UTC 2025 - 565K bytes - Viewed (0) -
kubectl create configmap | Kubernetes
Synopsis Create a config map based on a file, directory, or specified literal value. A single config map may package one or more key/value pairs. When creating a config map based on a file, the key will default to the basename of the file, and the value will default to the file content. If the basename is an invalid key, you may specify an alternate key. When creating a config map based on a directory, each file whose basename is a valid key in the directory will be packaged into the config map.kubernetes.io/docs/reference/kubectl/generated/kubectl_create/kubectl_create_configmap/Registered: Fri Dec 05 09:40:32 UTC 2025 - 469.5K bytes - Viewed (0) -
kubectl create rolebinding | Kubernetes
Synopsis Create a role binding for a particular role or cluster role. kubectl create rolebinding NAME --clusterrole=NAME|--role=NAME [--user=username] [--group=groupname] [--serviceaccount=namespace:serviceaccountname] [--dry-run=server|client|none] Examples # Create a role binding for user1, user2, and group1 using the admin cluster role kubectl create rolebinding admin --clusterrole=admin --user=user1 --user=user2 --group=group1 # Create a role binding for service account monitoring:sa-dev using the admin role kubectl create rolebinding admin-binding --role=admin --serviceaccount=monitoring:sa-dev Options --allow-missing-template-keys Default: true If true, ignore any errors in templates when a field or map key is missing in the template.kubernetes.io/docs/reference/kubectl/generated/kubectl_create/kubectl_create_rolebinding/ Similar Results (1)Registered: Fri Dec 05 09:40:41 UTC 2025 - 469.5K bytes - Viewed (0)