- Sort Score
- Result 10 results
- Languages All
- Labels All
Results 361 - 370 of 724 for host:kubernetes.io (0.04 sec)
-
Access Services Running on Clusters | Kubernetes
This page shows how to connect to services running on the Kubernetes cluster. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube or you can use one of these Kubernetes playgrounds:kubernetes.io/docs/tasks/access-application-cluster/access-cluster-services/Registered: Fri Jan 16 11:52:02 UTC 2026 - 478.7K bytes - Viewed (0) -
Pod Topology Spread Constraints | Kubernetes
You can use topology spread constraints to control how Pods are spread across your cluster among failure-domains such as regions, zones, nodes, and other user-defined topology domains. This can help to achieve high availability as well as efficient resource utilization. You can set cluster-level constraints as a default, or configure topology spread constraints for individual workloads. Motivation Imagine that you have a cluster of up to twenty nodes, and you want to run a workload that automatically scales how many replicas it uses.kubernetes.io/docs/concepts/scheduling-eviction/topology-spread-constraints/Registered: Fri Jan 16 11:03:59 UTC 2026 - 528.6K bytes - Viewed (0) -
Limit Ranges | Kubernetes
By default, containers run with unbounded compute resources on a Kubernetes cluster. Using Kubernetes resource quotas, administrators (also termed cluster operators) can restrict consumption and creation of cluster resources (such as CPU time, memory, and persistent storage) within a specified namespace. Within a namespace, a Pod can consume as much CPU and memory as is allowed by the ResourceQuotas that apply to that namespace. As a cluster operator, or as a namespace-level administrator, you might also be concerned about making sure that a single object cannot monopolize all available resources within a namespace.kubernetes.io/docs/concepts/policy/limit-range/Registered: Fri Jan 16 11:04:27 UTC 2026 - 487.6K bytes - Viewed (0) -
About cgroup v2 | Kubernetes
On Linux, control groups constrain resources that are allocated to processes. The kubelet and the underlying container runtime need to interface with cgroups to enforce resource management for pods and containers which includes cpu/memory requests and limits for containerized workloads. There are two versions of cgroups in Linux: cgroup v1 and cgroup v2. cgroup v2 is the new generation of the cgroup API. What is cgroup v2? FEATURE STATE: Kubernetes v1.kubernetes.io/docs/concepts/architecture/cgroups/Registered: Fri Jan 16 11:02:21 UTC 2026 - 475.6K bytes - Viewed (0) -
Set Up DRA in a Cluster | Kubernetes
FEATURE STATE: Kubernetes v1.35 [stable](enabled by default) This page shows you how to configure dynamic resource allocation (DRA) in a Kubernetes cluster by enabling API groups and configuring classes of devices. These instructions are for cluster administrators. About DRA A Kubernetes feature that lets you request and share resources among Pods. These resources are often attached devices like hardware accelerators. With DRA, device drivers and cluster admins define device classes that are available to claim in workloads.kubernetes.io/docs/tasks/configure-pod-container/assign-resources/set-up-dra-cluster/Registered: Fri Jan 16 11:33:39 UTC 2026 - 485.8K bytes - Viewed (0) -
Securing a Cluster | Kubernetes
This document covers topics related to protecting a cluster from accidental or malicious access and provides recommendations on overall security. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube or you can use one of these Kubernetes playgrounds:kubernetes.io/docs/tasks/administer-cluster/securing-a-cluster/Registered: Fri Jan 16 11:33:43 UTC 2026 - 487.4K bytes - Viewed (0) -
Share Process Namespace between Containers in a...
This page shows how to configure process namespace sharing for a pod. When process namespace sharing is enabled, processes in a container are visible to all other containers in the same pod. You can use this feature to configure cooperating containers, such as a log handler sidecar container, or to troubleshoot container images that don't include debugging utilities like a shell. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster.kubernetes.io/docs/tasks/configure-pod-container/share-process-namespace/Registered: Fri Jan 16 11:32:44 UTC 2026 - 480.2K bytes - Viewed (0) -
Auditing | Kubernetes
Kubernetes auditing provides a security-relevant, chronological set of records documenting the sequence of actions in a cluster. The cluster audits the activities generated by users, by applications that use the Kubernetes API, and by the control plane itself. Auditing allows cluster administrators to answer the following questions: what happened? when did it happen? who initiated it? on what did it happen? where was it observed? from where was it initiated?kubernetes.io/docs/tasks/debug/debug-cluster/audit/Registered: Fri Jan 16 11:32:55 UTC 2026 - 503.8K bytes - Viewed (0) -
Cluster Architecture | Kubernetes
The architectural concepts behind Kubernetes.kubernetes.io/docs/concepts/architecture/Registered: Fri Jan 16 10:57:27 UTC 2026 - 487.4K bytes - Viewed (0) -
Security For Linux Nodes | Kubernetes
This page describes security considerations and best practices specific to the Linux operating system. Protection for Secret data on nodes On Linux nodes, memory-backed volumes (such as secret volume mounts, or emptyDir with medium: Memory) are implemented with a tmpfs filesystem. If you have swap configured and use an older Linux kernel (or a current kernel and an unsupported configuration of Kubernetes), memory backed volumes can have data written to persistent storage.kubernetes.io/docs/concepts/security/linux-security/Registered: Fri Jan 16 11:15:04 UTC 2026 - 468.4K bytes - Viewed (0)