- Sort Score
- Result 10 results
- Languages All
- Labels All
Results 351 - 360 of 699 for host:kubernetes.io (0.04 sec)
-
Example: Deploying Cassandra with a StatefulSet...
This tutorial shows you how to run Apache Cassandra on Kubernetes. Cassandra, a database, needs persistent storage to provide data durability (application state). In this example, a custom Cassandra seed provider lets the database discover new Cassandra instances as they join the Cassandra cluster. StatefulSets make it easier to deploy stateful applications into your Kubernetes cluster. For more information on the features used in this tutorial, see StatefulSet. Note:Cassandra and Kubernetes both use the term node to mean a member of a cluster.kubernetes.io/docs/tutorials/stateful-application/cassandra/Registered: Mon Sep 08 23:24:31 UTC 2025 - 502K bytes - Viewed (0) -
kubeadm join | Kubernetes
This command initializes a new Kubernetes node and joins it to the existing cluster. Run this on any machine you wish to join an existing cluster Synopsis When joining a kubeadm initialized cluster, we need to establish bidirectional trust. This is split into discovery (having the Node trust the Kubernetes Control Plane) and TLS bootstrap (having the Kubernetes Control Plane trust the Node). There are 2 main schemes for discovery.kubernetes.io/docs/reference/setup-tools/kubeadm/kubeadm-join/Registered: Mon Sep 08 23:39:22 UTC 2025 - 484K bytes - Viewed (0) -
kubectl api-versions | Kubernetes
Production-Grade Container Orchestrationkubernetes.io/docs/reference/kubectl/generated/kubectl_api-versions/Registered: Mon Sep 08 23:42:16 UTC 2025 - 462.1K bytes - Viewed (0) -
kubeadm certs | Kubernetes
kubeadm certs provides utilities for managing certificates. For more details on how these commands can be used, see Certificate Management with kubeadm. kubeadm certs A collection of operations for operating Kubernetes certificates. overview Synopsis Commands related to handling Kubernetes certificates kubeadm certs [flags] Options -h, --help help for certs Options inherited from parent commands --rootfs string The path to the 'real' host root filesystem. This will cause kubeadm to chroot into the provided path.kubernetes.io/docs/reference/setup-tools/kubeadm/kubeadm-certs/Registered: Mon Sep 08 23:47:30 UTC 2025 - 496.5K bytes - Viewed (0) -
kubectl certificate approve | Kubernetes
Synopsis Approve a certificate signing request. kubectl certificate approve allows a cluster admin to approve a certificate signing request (CSR). This action tells a certificate signing controller to issue a certificate to the requester with the attributes requested in the CSR. SECURITY NOTICE: Depending on the requested attributes, the issued certificate can potentially grant a requester access to cluster resources or to authenticate as a requested identity. Before approving a CSR, ensure you understand what the signed certificate can do.kubernetes.io/docs/reference/kubectl/generated/kubectl_certificate/kubectl_certificate_approve/Registered: Mon Sep 08 23:46:18 UTC 2025 - 465.7K bytes - Viewed (0) -
kubeadm reset phase | Kubernetes
kubeadm reset phase enables you to invoke atomic steps of the node reset process. Hence, you can let kubeadm do some of the work and you can fill in the gaps if you wish to apply customization. kubeadm reset phase is consistent with the kubeadm reset workflow, and behind the scene both use the same code. kubeadm reset phase phase Synopsis Use this command to invoke single phase of the "reset" workflowkubernetes.io/docs/reference/setup-tools/kubeadm/kubeadm-reset-phase/Registered: Mon Sep 08 23:47:01 UTC 2025 - 464K bytes - Viewed (0) -
kubeadm join phase | Kubernetes
kubeadm join phase enables you to invoke atomic steps of the join process. Hence, you can let kubeadm do some of the work and you can fill in the gaps if you wish to apply customization. kubeadm join phase is consistent with the kubeadm join workflow, and behind the scene both use the same code. kubeadm join phase phase Synopsis Use this command to invoke single phase of the "join" workflowkubernetes.io/docs/reference/setup-tools/kubeadm/kubeadm-join-phase/Registered: Mon Sep 08 23:48:55 UTC 2025 - 495.1K bytes - Viewed (0) -
kubectl certificate deny | Kubernetes
Synopsis Deny a certificate signing request. kubectl certificate deny allows a cluster admin to deny a certificate signing request (CSR). This action tells a certificate signing controller to not to issue a certificate to the requester. kubectl certificate deny (-f FILENAME | NAME) Examples # Deny CSR 'csr-sqgzp' kubectl certificate deny csr-sqgzp Options --allow-missing-template-keys Default: true If true, ignore any errors in templates when a field or map key is missing in the template.kubernetes.io/docs/reference/kubectl/generated/kubectl_certificate/kubectl_certificate_deny/Registered: Mon Sep 08 23:49:26 UTC 2025 - 465.2K bytes - Viewed (0) -
Install and Set Up kubectl on macOS | Kubernetes
Before you begin You must use a kubectl version that is within one minor version difference of your cluster. For example, a v1.34 client can communicate with v1.33, v1.34, and v1.35 control planes. Using the latest compatible version of kubectl helps avoid unforeseen issues. Install kubectl on macOS The following methods exist for installing kubectl on macOS: Install kubectl on macOS Install kubectl binary with curl on macOS Install with Homebrew on macOS Install with Macports on macOS Verify kubectl configuration Optional kubectl configurations and plugins Enable shell autocompletion Install kubectl convert plugin Install kubectl binary with curl on macOS Download the latest release:kubernetes.io/docs/tasks/tools/install-kubectl-macos/Registered: Mon Sep 08 22:15:33 UTC 2025 - 492.2K bytes - Viewed (0) -
Controlling Access to the Kubernetes API | Kube...
This page provides an overview of controlling access to the Kubernetes API. Users access the Kubernetes API using kubectl, client libraries, or by making REST requests. Both human users and Kubernetes service accounts can be authorized for API access. When a request reaches the API, it goes through several stages, illustrated in the following diagram: Transport security By default, the Kubernetes API server listens on port 6443 on the first non-localhost network interface, protected by TLS.kubernetes.io/docs/concepts/security/controlling-access/Registered: Mon Sep 08 22:14:23 UTC 2025 - 468.5K bytes - Viewed (0)