- Sort Score
- Result 10 results
- Languages All
- Labels All
Results 371 - 380 of 669 for host:kubernetes.io (0.04 sec)
-
Authenticating with Bootstrap Tokens | Kubernetes
FEATURE STATE: Kubernetes v1.18 [stable] Bootstrap tokens are a simple bearer token that is meant to be used when creating new clusters or joining new nodes to an existing cluster. It was built to support kubeadm, but can be used in other contexts for users that wish to start clusters without kubeadm. It is also built to work, via RBAC policy, with the kubelet TLS Bootstrapping system. Bootstrap Tokens Overview Bootstrap Tokens are defined with a specific type (bootstrap.kubernetes.io/docs/reference/access-authn-authz/bootstrap-tokens/Registered: Fri Nov 15 07:09:37 UTC 2024 - 440K bytes - Viewed (0) -
Admission Controllers Reference | Kubernetes
This page provides an overview of Admission Controllers. What are they? An admission controller is a piece of code that intercepts requests to the Kubernetes API server prior to persistence of the object, but after the request is authenticated and authorized. Admission controllers may be validating, mutating, or both. Mutating controllers may modify objects related to the requests they admit; validating controllers may not. Admission controllers limit requests to create, delete, modify objects.kubernetes.io/docs/reference/access-authn-authz/admission-controllers/Registered: Fri Nov 15 07:09:51 UTC 2024 - 488.3K bytes - Viewed (0) -
Using RBAC Authorization | Kubernetes
Role-based access control (RBAC) is a method of regulating access to computer or network resources based on the roles of individual users within your organization. RBAC authorization uses the rbac.authorization.k8s.io API group to drive authorization decisions, allowing you to dynamically configure policies through the Kubernetes API. To enable RBAC, start the API server with the --authorization-mode flag set to a comma-separated list that includes RBAC; for example: kube-apiserver --authorization-mode=Example,RBAC --other-options --more-options API objects The RBAC API declares four kinds of Kubernetes object: Role, ClusterRole, RoleBinding and ClusterRoleBinding.kubernetes.io/docs/reference/access-authn-authz/rbac/Registered: Fri Nov 15 07:08:27 UTC 2024 - 552.1K bytes - Viewed (0) -
Mapping PodSecurityPolicies to Pod Security Sta...
The tables below enumerate the configuration parameters on PodSecurityPolicy objects, whether the field mutates and/or validates pods, and how the configuration values map to the Pod Security Standards. For each applicable parameter, the allowed values for the Baseline and Restricted profiles are listed. Anything outside the allowed values for those profiles would fall under the Privileged profile. "No opinion" means all values are allowed under all Pod Security Standards.kubernetes.io/docs/reference/access-authn-authz/psp-to-pod-security-standards/Registered: Fri Nov 15 07:08:33 UTC 2024 - 432.9K bytes - Viewed (0) -
Webhook Mode | Kubernetes
A WebHook is an HTTP callback: an HTTP POST that occurs when something happens; a simple event-notification via HTTP POST. A web application implementing WebHooks will POST a message to a URL when certain things happen. When specified, mode Webhook causes Kubernetes to query an outside REST service when determining user privileges. Configuration File Format Mode Webhook requires a file for HTTP configuration, specify by the --authorization-webhook-config-file=SOME_FILENAME flag. The configuration file uses the kubeconfig file format.kubernetes.io/docs/reference/access-authn-authz/webhook/Registered: Fri Nov 15 07:08:40 UTC 2024 - 445.4K bytes - Viewed (0) -
Client Libraries | Kubernetes
This page contains an overview of the client libraries for using the Kubernetes API from various programming languages. To write applications using the Kubernetes REST API, you do not need to implement the API calls and request/response types yourself. You can use a client library for the programming language you are using. Client libraries often handle common tasks such as authentication for you. Most client libraries can discover and use the Kubernetes Service Account to authenticate if the API client is running inside the Kubernetes cluster, or can understand the kubeconfig file format to read the credentials and the API Server address.kubernetes.io/docs/reference/using-api/client-libraries/Registered: Fri Nov 15 07:09:27 UTC 2024 - 434.4K bytes - Viewed (0) -
kubectl auth reconcile | Kubernetes
Synopsis Reconciles rules for RBAC role, role binding, cluster role, and cluster role binding objects. Missing objects are created, and the containing namespace is created for namespaced objects, if required. Existing roles are updated to include the permissions in the input objects, and remove extra permissions if --remove-extra-permissions is specified. Existing bindings are updated to include the subjects in the input objects, and remove extra subjects if --remove-extra-subjects is specified.kubernetes.io/docs/reference/kubectl/generated/kubectl_auth/kubectl_auth_reconcile/Registered: Fri Nov 15 07:14:36 UTC 2024 - 435.7K bytes - Viewed (0) -
kubectl config set-credentials | Kubernetes
Synopsis Set a user entry in kubeconfig. Specifying a name that already exists will merge new fields on top of existing values. Client-certificate flags: --client-certificate=certfile --client-key=keyfile Bearer token flags: --token=bearer_token Basic auth flags: --username=basic_user --password=basic_password Bearer token and basic auth are mutually exclusive. kubectl config set-credentials NAME [--client-certificate=path/to/certfile] [--client-key=path/to/keyfile] [--token=bearer_token] [--username=basic_user] [--password=basic_password] [--auth-provider=provider_name] [--auth-provider-arg=key=value] [--exec-command=exec_command] [--exec-api-version=exec_api_version] [--exec-arg=arg] [--exec-env=key=value] Examples # Set only the "client-key" field on the "cluster-admin" # entry, without touching other values kubectl config set-credentials cluster-admin --client-key=~/.kubernetes.io/docs/reference/kubectl/generated/kubectl_config/kubectl_config_set-credentials/Registered: Fri Nov 15 07:13:17 UTC 2024 - 439.6K bytes - Viewed (0) -
kubectl config unset | Kubernetes
Synopsis Unset an individual value in a kubeconfig file. PROPERTY_NAME is a dot delimited name where each token represents either an attribute name or a map key. Map keys may not contain dots. kubectl config unset PROPERTY_NAME Examples # Unset the current-context kubectl config unset current-context # Unset namespace in foo context kubectl config unset contexts.foo.namespace Options -h, --help help for unset --as string Username to impersonate for the operation.kubernetes.io/docs/reference/kubectl/generated/kubectl_config/kubectl_config_unset/Registered: Fri Nov 15 07:13:25 UTC 2024 - 432.7K bytes - Viewed (0) -
IP Masquerade Agent User Guide | Kubernetes
This page shows how to configure and enable the ip-masq-agent. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube or you can use one of these Kubernetes playgrounds:kubernetes.io/docs/tasks/administer-cluster/ip-masq-agent/Registered: Fri Nov 15 06:43:24 UTC 2024 - 436.3K bytes - Viewed (0)