- Sort Score
- Result 10 results
- Languages All
- Labels All
Results 451 - 460 of 685 for host:kubernetes.io (0.04 sec)
-
Upgrading Linux nodes | Kubernetes
This page explains how to upgrade a Linux Worker Nodes created with kubeadm. Before you begin You need to have shell access to all the nodes, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. To check the version, enter kubectl version.kubernetes.io/docs/tasks/administer-cluster/kubeadm/upgrading-linux-nodes/Registered: Wed Apr 16 06:07:11 UTC 2025 - 441.7K bytes - Viewed (0) -
Switching from Polling to CRI Event-based Updat...
FEATURE STATE: Kubernetes v1.26 [alpha] (enabled by default: false) This page shows how to migrate nodes to use event based updates for container status. The event-based implementation reduces node resource consumption by the kubelet, compared to the legacy approach that relies on polling. You may know this feature as evented Pod lifecycle event generator (PLEG). That's the name used internally within the Kubernetes project for a key implementation detail.kubernetes.io/docs/tasks/administer-cluster/switch-to-evented-pleg/Registered: Wed Apr 16 06:07:38 UTC 2025 - 438.9K bytes - Viewed (0) -
Migrate from PodSecurityPolicy to the Built-In ...
This page describes the process of migrating from PodSecurityPolicies to the built-in PodSecurity admission controller. This can be done effectively using a combination of dry-run and audit and warn modes, although this becomes harder if mutating PSPs are used. Before you begin Your Kubernetes server must be at or later than version v1.22. To check the version, enter kubectl version. If you are currently running a version of Kubernetes other than 1.kubernetes.io/docs/tasks/configure-pod-container/migrate-from-psp/Registered: Wed Apr 16 06:08:24 UTC 2025 - 456.4K bytes - Viewed (0) -
Declare Network Policy | Kubernetes
This document helps you get started using the Kubernetes NetworkPolicy API to declare network policies that govern how pods communicate with each other. Note: This section links to third party projects that provide functionality required by Kubernetes. The Kubernetes project authors aren't responsible for these projects, which are listed alphabetically. To add a project to this list, read the content guide before submitting a change. More information. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster.kubernetes.io/docs/tasks/administer-cluster/declare-network-policy/Registered: Wed Apr 16 06:08:03 UTC 2025 - 447.4K bytes - Viewed (0) -
Attach Handlers to Container Lifecycle Events |...
This page shows how to attach handlers to Container lifecycle events. Kubernetes supports the postStart and preStop events. Kubernetes sends the postStart event immediately after a Container is started, and it sends the preStop event immediately before the Container is terminated. A Container may specify one handler per event. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster.kubernetes.io/docs/tasks/configure-pod-container/attach-handler-lifecycle-event/Registered: Wed Apr 16 06:08:20 UTC 2025 - 441.8K bytes - Viewed (0) -
Use a User Namespace With a Pod | Kubernetes
FEATURE STATE: Kubernetes v1.30 [beta] (enabled by default: false) This page shows how to configure a user namespace for pods. This allows you to isolate the user running inside the container from the one in the host. A process running as root in a container can run as a different (non-root) user in the host; in other words, the process has full privileges for operations inside the user namespace, but is unprivileged for operations outside the namespace.kubernetes.io/docs/tasks/configure-pod-container/user-namespaces/Registered: Wed Apr 16 06:14:26 UTC 2025 - 443.3K bytes - Viewed (0) -
Managing Secrets using kubectl | Kubernetes
Creating Secret objects using kubectl command line.kubernetes.io/docs/tasks/configmap-secret/managing-secret-using-kubectl/Registered: Wed Apr 16 06:13:28 UTC 2025 - 445.7K bytes - Viewed (0) -
Managing Secrets using Configuration File | Kub...
Creating Secret objects using resource configuration file.kubernetes.io/docs/tasks/configmap-secret/managing-secret-using-config-file/Registered: Wed Apr 16 06:13:32 UTC 2025 - 452.7K bytes - Viewed (0) -
Debugging Kubernetes Nodes With Kubectl | Kuber...
This page shows how to debug a node running on the Kubernetes cluster using kubectl debug command. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube or you can use one of these Kubernetes playgrounds:kubernetes.io/docs/tasks/debug/debug-cluster/kubectl-node-debug/Registered: Wed Apr 16 06:13:47 UTC 2025 - 438.9K bytes - Viewed (0) -
Debugging Kubernetes nodes with crictl | Kubern...
FEATURE STATE: Kubernetes v1.11 [stable] crictl is a command-line interface for CRI-compatible container runtimes. You can use it to inspect and debug container runtimes and applications on a Kubernetes node. crictl and its source are hosted in the cri-tools repository. Before you begin crictl requires a Linux operating system with a CRI runtime. Installing crictl You can download a compressed archive crictl from the cri-tools release page, for several different architectures.kubernetes.io/docs/tasks/debug/debug-cluster/crictl/Registered: Wed Apr 16 06:13:42 UTC 2025 - 444.3K bytes - Viewed (0)