Search Options

Results per page
Sort
Preferred Languages
Labels
Advance

Results 361 - 370 of 663 for content_length:[500000 TO 999999] (0.81 sec)

  1. Jobs | Kubernetes

    Jobs represent one-off tasks that run to completion and then stop.
    kubernetes.io/docs/concepts/workloads/controllers/job/
    Registered: Fri Dec 12 08:13:03 UTC 2025
    - 573.3K bytes
    - Viewed (0)
  2. Multi-tenancy | Kubernetes

    This page provides an overview of available configuration options and best practices for cluster multi-tenancy. Sharing clusters saves costs and simplifies administration. However, sharing clusters also presents challenges such as security, fairness, and managing noisy neighbors. Clusters can be shared in many ways. In some cases, different applications may run in the same cluster. In other cases, multiple instances of the same application may run in the same cluster, one for each end user.
    kubernetes.io/docs/concepts/security/multi-tenancy/
    Registered: Fri Dec 12 08:13:27 UTC 2025
    - 489.6K bytes
    - Viewed (0)
  3. Configure Service Accounts for Pods | Kubernetes

    Kubernetes offers two distinct ways for clients that run within your cluster, or that otherwise have a relationship to your cluster's control plane to authenticate to the API server. A service account provides an identity for processes that run in a Pod, and maps to a ServiceAccount object. When you authenticate to the API server, you identify yourself as a particular user. Kubernetes recognises the concept of a user, however, Kubernetes itself does not have a User API.
    kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/
    Registered: Fri Dec 12 08:35:48 UTC 2025
    - 506.9K bytes
    - Viewed (0)
  4. Authorization | Kubernetes

    Details of Kubernetes authorization mechanisms and supported authorization modes.
    kubernetes.io/docs/reference/access-authn-authz/authorization/
    Registered: Fri Dec 12 08:58:13 UTC 2025
    - 507.1K bytes
    - Viewed (0)
  5. Restrict a Container's Syscalls with seccomp | ...

    FEATURE STATE: Kubernetes v1.19 [stable] Seccomp stands for secure computing mode and has been a feature of the Linux kernel since version 2.6.12. It can be used to sandbox the privileges of a process, restricting the calls it is able to make from userspace into the kernel. Kubernetes lets you automatically apply seccomp profiles loaded onto a node to your Pods and containers. Identifying the privileges required for your workloads can be difficult.
    kubernetes.io/docs/tutorials/security/seccomp/
    Registered: Fri Dec 12 08:58:19 UTC 2025
    - 521.2K bytes
    - Viewed (0)
  6. Virtual IPs and Service Proxies | Kubernetes

    Every node in a Kubernetes cluster runs a kube-proxy (unless you have deployed your own alternative component in place of kube-proxy). The kube-proxy component is responsible for implementing a virtual IP mechanism for Services of type other than ExternalName. Each instance of kube-proxy watches the Kubernetes control plane for the addition and removal of Service and EndpointSlice objects. For each Service, kube-proxy calls appropriate APIs (depending on the kube-proxy mode) to configure the node to capture traffic to the Service's clusterIP and port, and redirect that traffic to one of the Service's endpoints (usually a Pod, but possibly an arbitrary user-provided IP address).
    kubernetes.io/docs/reference/networking/virtual-ips/
    Registered: Fri Dec 12 09:03:59 UTC 2025
    - 513.9K bytes
    - Viewed (0)
  7. kubeadm init | Kubernetes

    This command initializes a Kubernetes control plane node. Synopsis Run this command in order to set up the Kubernetes control plane The "init" command executes the following phases: preflight Run pre-flight checks certs Certificate generation /ca Generate the self-signed Kubernetes CA to provision identities for other Kubernetes components /apiserver Generate the certificate for serving the Kubernetes API /apiserver-kubelet-client Generate the certificate for the API server to connect to kubelet /front-proxy-ca Generate the self-signed CA to provision identities for front proxy /front-proxy-client Generate the certificate for the front proxy client /etcd-ca Generate the self-signed CA to provision identities for etcd /etcd-server Generate the certificate for serving etcd /etcd-peer Generate the certificate for etcd nodes to communicate with each other /etcd-healthcheck-client Generate the certificate for liveness probes to healthcheck etcd /apiserver-etcd-client Generate the certificate the apiserver uses to access etcd /sa Generate a private key for signing service account tokens along with its public key kubeconfig Generate all kubeconfig files necessary to establish the control plane and the admin kubeconfig file /admin Generate a kubeconfig file for the admin to use and for kubeadm itself /super-admin Generate a kubeconfig file for the super-admin /kubelet Generate a kubeconfig file for the kubelet to use *only* for cluster bootstrapping purposes /controller-manager Generate a kubeconfig file for the controller manager to use /scheduler Generate a kubeconfig file for the scheduler to use etcd Generate static Pod manifest file for local etcd /local Generate the static Pod manifest file for a local, single-node local etcd instance control-plane Generate all static Pod manifest files necessary to establish the control plane /apiserver Generates the kube-apiserver static Pod manifest /controller-manager Generates the kube-controller-manager static Pod manifest /scheduler Generates the kube-scheduler static Pod manifest kubelet-start Write kubelet settings and (re)start the kubelet wait-control-plane Wait for the control plane to start upload-config Upload the kubeadm and kubelet configuration to a ConfigMap /kubeadm Upload the kubeadm ClusterConfiguration to a ConfigMap /kubelet Upload the kubelet component config to a ConfigMap upload-certs Upload certificates to kubeadm-certs mark-control-plane Mark a node as a control-plane bootstrap-token Generates bootstrap tokens used to join a node to a cluster kubelet-finalize Updates settings relevant to the kubelet after TLS bootstrap /enable-client-cert-rotation Enable kubelet client certificate rotation addon Install required addons for passing conformance tests /coredns Install the CoreDNS addon to a Kubernetes cluster /kube-proxy Install the kube-proxy addon to a Kubernetes cluster show-join-command Show the join command for control-plane and worker node kubeadm init [flags] Options --apiserver-advertise-address string The IP address the API Server will advertise it's listening on.
    kubernetes.io/docs/reference/setup-tools/kubeadm/kubeadm-init/
    Registered: Fri Dec 12 09:04:24 UTC 2025
    - 507.8K bytes
    - Viewed (0)
  8. Declarative Management of Kubernetes Objects Us...

    Kustomize is a standalone tool to customize Kubernetes objects through a kustomization file. Since 1.14, kubectl also supports the management of Kubernetes objects using a kustomization file. To view resources found in a directory containing a kustomization file, run the following command: kubectl kustomize <kustomization_directory> To apply those resources, run kubectl apply with --kustomize or -k flag: kubectl apply -k <kustomization_directory> Before you begin Install kubectl. You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster.
    kubernetes.io/docs/tasks/manage-kubernetes-objects/kustomization/
    Registered: Fri Dec 12 08:47:29 UTC 2025
    - 562.7K bytes
    - Viewed (0)
  9. Perform a Rolling Update on a DaemonSet | Kuber...

    This page shows how to perform a rolling update on a DaemonSet. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube or you can use one of these Kubernetes playgrounds:
    kubernetes.io/docs/tasks/manage-daemon/update-daemon-set/
    Registered: Fri Dec 12 08:49:43 UTC 2025
    - 490.6K bytes
    - Viewed (0)
  10. Validate IPv4/IPv6 dual-stack | Kubernetes

    This document shares how to validate IPv4/IPv6 dual-stack enabled Kubernetes clusters. Before you begin Provider support for dual-stack networking (Cloud provider or otherwise must be able to provide Kubernetes nodes with routable IPv4/IPv6 network interfaces) A network plugin that supports dual-stack networking. Dual-stack enabled cluster Your Kubernetes server must be at or later than version v1.23. To check the version, enter kubectl version. Note:While you can validate with an earlier version, the feature is only GA and officially supported since v1.
    kubernetes.io/docs/tasks/network/validate-dual-stack/
    Registered: Fri Dec 12 08:50:56 UTC 2025
    - 492.3K bytes
    - Viewed (0)
Back to top