- Sort Score
- Result 10 results
- Languages All
- Labels All
Results 361 - 370 of 702 for host:kubernetes.io (0.03 sec)
-
Inject Data Into Applications | Kubernetes
Specify configuration and other data for the Pods that run your workload.kubernetes.io/docs/tasks/inject-data-application/Registered: Mon Oct 06 07:26:34 UTC 2025 - 458.8K bytes - Viewed (0) -
Certificates and Certificate Signing Requests |...
Kubernetes certificate and trust bundle APIs enable automation of X.509 credential provisioning by providing a programmatic interface for clients of the Kubernetes API to request and obtain X.509 certificates from a Certificate Authority (CA). There is also experimental (alpha) support for distributing trust bundles. Certificate signing requests FEATURE STATE: Kubernetes v1.19 [stable] A CertificateSigningRequest (CSR) resource is used to request that a certificate be signed by a denoted signer, after which the request may be approved or denied before finally being signed.kubernetes.io/docs/reference/access-authn-authz/certificate-signing-requests/Registered: Mon Oct 06 07:39:23 UTC 2025 - 517.4K bytes - Viewed (0) -
Kubernetes API health endpoints | Kubernetes
The Kubernetes API server provides API endpoints to indicate the current status of the API server. This page describes these API endpoints and explains how you can use them. API endpoints for health The Kubernetes API server provides 3 API endpoints (healthz, livez and readyz) to indicate the current status of the API server. The healthz endpoint is deprecated (since Kubernetes v1.16), and you should use the more specific livez and readyz endpoints instead.kubernetes.io/docs/reference/using-api/health-checks/Registered: Mon Oct 06 07:38:27 UTC 2025 - 464.4K bytes - Viewed (0) -
kubectl certificate approve | Kubernetes
Synopsis Approve a certificate signing request. kubectl certificate approve allows a cluster admin to approve a certificate signing request (CSR). This action tells a certificate signing controller to issue a certificate to the requester with the attributes requested in the CSR. SECURITY NOTICE: Depending on the requested attributes, the issued certificate can potentially grant a requester access to cluster resources or to authenticate as a requested identity. Before approving a CSR, ensure you understand what the signed certificate can do.kubernetes.io/docs/reference/kubectl/generated/kubectl_certificate/kubectl_certificate_approve/Registered: Mon Oct 06 07:55:21 UTC 2025 - 468.6K bytes - Viewed (0) -
Resource Management for Pods and Containers | K...
When you specify a Pod, you can optionally specify how much of each resource a container needs. The most common resources to specify are CPU and memory (RAM); there are others. When you specify the resource request for containers in a Pod, the kube-scheduler uses this information to decide which node to place the Pod on. When you specify a resource limit for a container, the kubelet enforces those limits so that the running container is not allowed to use more of that resource than the limit you set.kubernetes.io/docs/concepts/configuration/manage-resources-containers/Registered: Mon Oct 06 07:07:24 UTC 2025 - 533.4K bytes - Viewed (0) -
Pod Priority and Preemption | Kubernetes
FEATURE STATE: Kubernetes v1.14 [stable] Pods can have priority. Priority indicates the importance of a Pod relative to other Pods. If a Pod cannot be scheduled, the scheduler tries to preempt (evict) lower priority Pods to make scheduling of the pending Pod possible. Warning:In a cluster where not all users are trusted, a malicious user could create Pods at the highest possible priorities, causing other Pods to be evicted/not get scheduled.kubernetes.io/docs/concepts/scheduling-eviction/pod-priority-preemption/Registered: Mon Oct 06 07:08:51 UTC 2025 - 484.4K bytes - Viewed (0) -
Limit Ranges | Kubernetes
By default, containers run with unbounded compute resources on a Kubernetes cluster. Using Kubernetes resource quotas, administrators (also termed cluster operators) can restrict consumption and creation of cluster resources (such as CPU time, memory, and persistent storage) within a specified namespace. Within a namespace, a Pod can consume as much CPU and memory as is allowed by the ResourceQuotas that apply to that namespace. As a cluster operator, or as a namespace-level administrator, you might also be concerned about making sure that a single object cannot monopolize all available resources within a namespace.kubernetes.io/docs/concepts/policy/limit-range/Registered: Mon Oct 06 07:08:21 UTC 2025 - 478.6K bytes - Viewed (0) -
Verify Signed Kubernetes Artifacts | Kubernetes
FEATURE STATE: Kubernetes v1.26 [beta] Before you begin You will need to have the following tools installed: cosign (install guide) curl (often provided by your operating system) jq (download jq) Verifying binary signatures The Kubernetes release process signs all binary artifacts (tarballs, SPDX files, standalone binaries) by using cosign's keyless signing. To verify a particular binary, retrieve it together with its signature and certificate: URL=https://dl.k8s.io/release/v1.34.0/bin/linux/amd64 BINARY=kubectl FILES=( "$BINARY" "$BINARY.sig" "$BINARY.kubernetes.io/docs/tasks/administer-cluster/verify-signed-artifacts/Registered: Mon Oct 06 07:23:48 UTC 2025 - 473.8K bytes - Viewed (0) -
Change the Access Mode of a PersistentVolume to...
This page shows how to change the access mode on an existing PersistentVolume to use ReadWriteOncePod. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube or you can use one of these Kubernetes playgrounds:kubernetes.io/docs/tasks/administer-cluster/change-pv-access-mode-readwriteoncepod/Registered: Mon Oct 06 07:23:31 UTC 2025 - 475.7K bytes - Viewed (0) -
Operating etcd clusters for Kubernetes | Kubern...
etcd is a consistent and highly-available key value store used as Kubernetes' backing store for all cluster data. If your Kubernetes cluster uses etcd as its backing store, make sure you have a back up plan for the data. You can find in-depth information about etcd in the official documentation. Before you begin Before you follow steps in this page to deploy, manage, back up or restore etcd, you need to understand the typical expectations for operating an etcd cluster.kubernetes.io/docs/tasks/administer-cluster/configure-upgrade-etcd/Registered: Mon Oct 06 07:24:59 UTC 2025 - 491.4K bytes - Viewed (0)