Search Options

Results per page
Sort
Preferred Languages
Labels
Advance

Popular Words: テスト [xss] %27 test

Results 371 - 380 of 705 for host:kubernetes.io (0.06 sec)

  1. Auditing | Kubernetes

    Kubernetes auditing provides a security-relevant, chronological set of records documenting the sequence of actions in a cluster. The cluster audits the activities generated by users, by applications that use the Kubernetes API, and by the control plane itself. Auditing allows cluster administrators to answer the following questions: what happened? when did it happen? who initiated it? on what did it happen? where was it observed? from where was it initiated?
    kubernetes.io/docs/tasks/debug/debug-cluster/audit/
    Registered: Fri Dec 12 08:44:35 UTC 2025
    - 494.5K bytes
    - Viewed (0)
  2. Declarative Management of Kubernetes Objects Us...

    Kubernetes objects can be created, updated, and deleted by storing multiple object configuration files in a directory and using kubectl apply to recursively create and update those objects as needed. This method retains writes made to live objects without merging the changes back into the object configuration files. kubectl diff also gives you a preview of what changes apply will make. Before you begin Install kubectl. You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster.
    kubernetes.io/docs/tasks/manage-kubernetes-objects/declarative-config/
    Registered: Fri Dec 12 08:46:00 UTC 2025
    - 593K bytes
    - Viewed (0)
  3. Use a SOCKS5 Proxy to Access the Kubernetes API...

    FEATURE STATE: Kubernetes v1.24 [stable] This page shows how to use a SOCKS5 proxy to access the API of a remote Kubernetes cluster. This is useful when the cluster you want to access does not expose its API directly on the public internet. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts.
    kubernetes.io/docs/tasks/extend-kubernetes/socks5-proxy-access-api/
    Registered: Fri Dec 12 08:47:14 UTC 2025
    - 471.9K bytes
    - Viewed (0)
  4. Configure the Aggregation Layer | Kubernetes

    Configuring the aggregation layer allows the Kubernetes apiserver to be extended with additional APIs, which are not part of the core Kubernetes APIs. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube or you can use one of these Kubernetes playgrounds:
    kubernetes.io/docs/tasks/extend-kubernetes/configure-aggregation-layer/
    Registered: Fri Dec 12 08:48:23 UTC 2025
    - 480.5K bytes
    - Viewed (0)
  5. Limit Ranges | Kubernetes

    By default, containers run with unbounded compute resources on a Kubernetes cluster. Using Kubernetes resource quotas, administrators (also termed cluster operators) can restrict consumption and creation of cluster resources (such as CPU time, memory, and persistent storage) within a specified namespace. Within a namespace, a Pod can consume as much CPU and memory as is allowed by the ResourceQuotas that apply to that namespace. As a cluster operator, or as a namespace-level administrator, you might also be concerned about making sure that a single object cannot monopolize all available resources within a namespace.
    kubernetes.io/docs/concepts/policy/limit-range/
    Registered: Fri Dec 12 08:13:40 UTC 2025
    - 478.3K bytes
    - Viewed (0)
  6. Network Policies | Kubernetes

    If you want to control traffic flow at the IP address or port level (OSI layer 3 or 4), NetworkPolicies allow you to specify rules for traffic flow within your cluster, and also between Pods and the outside world. Your cluster must use a network plugin that supports NetworkPolicy enforcement.
    kubernetes.io/docs/concepts/services-networking/network-policies/
    Registered: Fri Dec 12 08:12:44 UTC 2025
    - 518.7K bytes
    - Viewed (0)
  7. Pod Security Standards | Kubernetes

    A detailed look at the different policy levels defined in the Pod Security Standards.
    kubernetes.io/docs/concepts/security/pod-security-standards/
    Registered: Fri Dec 12 08:12:55 UTC 2025
    - 482.6K bytes
    - Viewed (0)
  8. Good practices for Dynamic Resource Allocation ...

    This page describes good practices when configuring a Kubernetes cluster utilizing Dynamic Resource Allocation (DRA). These instructions are for cluster administrators. Separate permissions to DRA related APIs DRA is orchestrated through a number of different APIs. Use authorization tools (like RBAC, or another solution) to control access to the right APIs depending on the persona of your user. In general, DeviceClasses and ResourceSlices should be restricted to admins and the DRA drivers.
    kubernetes.io/docs/concepts/cluster-administration/dra/
    Registered: Fri Dec 12 08:29:02 UTC 2025
    - 476.5K bytes
    - Viewed (0)
  9. Migrating telemetry and security agents from do...

    Note: This section links to third party projects that provide functionality required by Kubernetes. The Kubernetes project authors aren't responsible for these projects, which are listed alphabetically. To add a project to this list, read the content guide before submitting a change. More information. Kubernetes' support for direct integration with Docker Engine is deprecated and has been removed. Most apps do not have a direct dependency on runtime hosting containers. However, there are still a lot of telemetry and monitoring agents that have a dependency on Docker to collect containers metadata, logs, and metrics.
    kubernetes.io/docs/tasks/administer-cluster/migrating-from-dockershim/migrating-telemetry-and-sec...
    Registered: Fri Dec 12 08:30:16 UTC 2025
    - 472.4K bytes
    - Viewed (0)
  10. Pod Topology Spread Constraints | Kubernetes

    You can use topology spread constraints to control how Pods are spread across your cluster among failure-domains such as regions, zones, nodes, and other user-defined topology domains. This can help to achieve high availability as well as efficient resource utilization. You can set cluster-level constraints as a default, or configure topology spread constraints for individual workloads. Motivation Imagine that you have a cluster of up to twenty nodes, and you want to run a workload that automatically scales how many replicas it uses.
    kubernetes.io/docs/concepts/scheduling-eviction/topology-spread-constraints/
    Registered: Fri Dec 12 08:29:53 UTC 2025
    - 519.3K bytes
    - Viewed (0)
Back to top