Search Options

Results per page
Sort
Preferred Languages
Labels
Advance

Results 341 - 350 of 699 for host:kubernetes.io (0.05 sec)

  1. Pod Topology Spread Constraints | Kubernetes

    You can use topology spread constraints to control how Pods are spread across your cluster among failure-domains such as regions, zones, nodes, and other user-defined topology domains. This can help to achieve high availability as well as efficient resource utilization. You can set cluster-level constraints as a default, or configure topology spread constraints for individual workloads. Motivation Imagine that you have a cluster of up to twenty nodes, and you want to run a workload that automatically scales how many replicas it uses.
    kubernetes.io/docs/concepts/scheduling-eviction/topology-spread-constraints/
    Registered: Mon Sep 08 22:16:54 UTC 2025
    - 516.1K bytes
    - Viewed (0)
  2. Security For Linux Nodes | Kubernetes

    This page describes security considerations and best practices specific to the Linux operating system. Protection for Secret data on nodes On Linux nodes, memory-backed volumes (such as secret volume mounts, or emptyDir with medium: Memory) are implemented with a tmpfs filesystem. If you have swap configured and use an older Linux kernel (or a current kernel and an unsupported configuration of Kubernetes), memory backed volumes can have data written to persistent storage.
    kubernetes.io/docs/concepts/security/linux-security/
    Registered: Mon Sep 08 22:19:35 UTC 2025
    - 457K bytes
    - Viewed (0)
  3. Use an Image Volume With a Pod | Kubernetes

    FEATURE STATE: Kubernetes v1.33 [beta] (enabled by default: false) This page shows how to configure a pod using image volumes. This allows you to mount content from OCI registries inside containers. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts.
    kubernetes.io/docs/tasks/configure-pod-container/image-volumes/
    Registered: Mon Sep 08 22:53:41 UTC 2025
    - 470K bytes
    - Viewed (0)
  4. Logging in Kubernetes | Kubernetes

    Logging architecture and system logs.
    kubernetes.io/docs/tasks/debug/logging/
    Registered: Mon Sep 08 22:53:57 UTC 2025
    - 454.4K bytes
    - Viewed (0)
  5. Share Process Namespace between Containers in a...

    This page shows how to configure process namespace sharing for a pod. When process namespace sharing is enabled, processes in a container are visible to all other containers in the same pod. You can use this feature to configure cooperating containers, such as a log handler sidecar container, or to troubleshoot container images that don't include debugging utilities like a shell. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster.
    kubernetes.io/docs/tasks/configure-pod-container/share-process-namespace/
    Registered: Mon Sep 08 22:54:23 UTC 2025
    - 468.9K bytes
    - Viewed (0)
  6. Auditing | Kubernetes

    Kubernetes auditing provides a security-relevant, chronological set of records documenting the sequence of actions in a cluster. The cluster audits the activities generated by users, by applications that use the Kubernetes API, and by the control plane itself. Auditing allows cluster administrators to answer the following questions: what happened? when did it happen? who initiated it? on what did it happen? where was it observed? from where was it initiated?
    kubernetes.io/docs/tasks/debug/debug-cluster/audit/
    Registered: Mon Sep 08 22:51:34 UTC 2025
    - 492.5K bytes
    - Viewed (0)
  7. Translate a Docker Compose File to Kubernetes R...

    What's Kompose? It's a conversion tool for all things compose (namely Docker Compose) to container orchestrators (Kubernetes or OpenShift). More information can be found on the Kompose website at https://kompose.io/. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts.
    kubernetes.io/docs/tasks/configure-pod-container/translate-compose-kubernetes/
    Registered: Mon Sep 08 22:51:44 UTC 2025
    - 492.1K bytes
    - Viewed (0)
  8. Monitoring, Logging, and Debugging | Kubernetes

    Set up monitoring and logging to troubleshoot a cluster, or debug a containerized application.
    kubernetes.io/docs/tasks/debug/
    Registered: Mon Sep 08 22:50:53 UTC 2025
    - 463.8K bytes
    - Viewed (0)
  9. Monitoring in Kubernetes | Kubernetes

    Monitoring kubernetes system components.
    kubernetes.io/docs/tasks/debug/monitoring/
    Registered: Mon Sep 08 22:54:51 UTC 2025
    - 454.4K bytes
    - Viewed (0)
  10. Certificates and Certificate Signing Requests |...

    Kubernetes certificate and trust bundle APIs enable automation of X.509 credential provisioning by providing a programmatic interface for clients of the Kubernetes API to request and obtain X.509 certificates from a Certificate Authority (CA). There is also experimental (alpha) support for distributing trust bundles. Certificate signing requests FEATURE STATE: Kubernetes v1.19 [stable] A CertificateSigningRequest (CSR) resource is used to request that a certificate be signed by a denoted signer, after which the request may be approved or denied before finally being signed.
    kubernetes.io/docs/reference/access-authn-authz/certificate-signing-requests/
    Registered: Mon Sep 08 23:25:42 UTC 2025
    - 515.1K bytes
    - Viewed (0)
Back to top