Search Options

Display Count
Sort
Preferred Language
Label
Advanced Search

Results 511 - 520 of 738 for content_length:[500000 TO 999999] (0.13 seconds)

  1. Certificate Management with kubeadm | Kubernetes

    FEATURE STATE: Kubernetes v1.15 [stable] Client certificates generated by kubeadm expire after 1 year. This page explains how to manage certificate renewals with kubeadm. It also covers other tasks related to kubeadm certificate management. The Kubernetes project recommends upgrading to the latest patch releases promptly, and to ensure that you are running a supported minor release of Kubernetes. Following this recommendation helps you to stay secure. Before you begin You should be familiar with PKI certificates and requirements in Kubernetes.
    kubernetes.io/docs/tasks/administer-cluster/kubeadm/kubeadm-certs/
    Fri Feb 06 07:53:35 GMT 2026
      528.4K bytes
  2. Network Policies | Kubernetes

    If you want to control traffic flow at the IP address or port level (OSI layer 3 or 4), NetworkPolicies allow you to specify rules for traffic flow within your cluster, and also between Pods and the outside world. Your cluster must use a network plugin that supports NetworkPolicy enforcement.
    kubernetes.io/docs/concepts/services-networking/network-policies/
    Fri Feb 06 07:45:36 GMT 2026
      528.7K bytes
  3. Configure the Aggregation Layer | Kubernetes

    Configuring the aggregation layer allows the Kubernetes apiserver to be extended with additional APIs, which are not part of the core Kubernetes APIs. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube or you can use one of these Kubernetes playgrounds:
    kubernetes.io/docs/tasks/extend-kubernetes/configure-aggregation-layer/
    Fri Feb 06 08:07:52 GMT 2026
      490.6K bytes
  4. Auditing | Kubernetes

    Kubernetes auditing provides a security-relevant, chronological set of records documenting the sequence of actions in a cluster. The cluster audits the activities generated by users, by applications that use the Kubernetes API, and by the control plane itself. Auditing allows cluster administrators to answer the following questions: what happened? when did it happen? who initiated it? on what did it happen? where was it observed? from where was it initiated?
    kubernetes.io/docs/tasks/debug/debug-cluster/audit/
    Fri Feb 06 08:07:48 GMT 2026
      504.5K bytes
  5. Encrypting Confidential Data at Rest | Kubernetes

    All of the APIs in Kubernetes that let you write persistent API resource data support at-rest encryption. For example, you can enable at-rest encryption for Secrets. This at-rest encryption is additional to any system-level encryption for the etcd cluster or for the filesystem(s) on hosts where you are running the kube-apiserver. This page shows how to enable and configure encryption of API data at rest. Note:This task covers encryption for resource data stored using the Kubernetes API.
    kubernetes.io/docs/tasks/administer-cluster/encrypt-data/
    Fri Feb 06 08:02:36 GMT 2026
      534.2K bytes
  6. Volume Snapshots | Kubernetes

    In Kubernetes, a VolumeSnapshot represents a snapshot of a volume on a storage system. This document assumes that you are already familiar with Kubernetes persistent volumes. Introduction Similar to how API resources PersistentVolume and PersistentVolumeClaim are used to provision volumes for users and administrators, VolumeSnapshotContent and VolumeSnapshot API resources are provided to create volume snapshots for users and administrators. A VolumeSnapshotContent is a snapshot taken from a volume in the cluster that has been provisioned by an administrator.
    kubernetes.io/docs/concepts/storage/volume-snapshots/
    Fri Feb 06 07:47:25 GMT 2026
      492.4K bytes
  7. Operating etcd clusters for Kubernetes | Kubern...

    etcd is a consistent and highly-available key value store used as Kubernetes' backing store for all cluster data. If your Kubernetes cluster uses etcd as its backing store, make sure you have a back up plan for the data. You can find in-depth information about etcd in the official documentation. Before you begin Before you follow steps in this page to deploy, manage, back up or restore etcd, you need to understand the typical expectations for operating an etcd cluster.
    kubernetes.io/docs/tasks/administer-cluster/configure-upgrade-etcd/
    Fri Feb 06 08:04:20 GMT 2026
      501.2K bytes
  8. Resize CPU and Memory Resources assigned to Con...

    FEATURE STATE: Kubernetes v1.35 [stable](enabled by default) This page explains how to change the CPU and memory resource requests and limits assigned to a container without recreating the Pod. Traditionally, changing a Pod's resource requirements necessitated deleting the existing Pod and creating a replacement, often managed by a workload controller. In-place Pod Resize allows changing the CPU/memory allocation of container(s) within a running Pod while potentially avoiding application disruption. The process for resizing Pod resources is covered in Resize CPU and Memory Resources assigned to Pods.
    kubernetes.io/docs/tasks/configure-pod-container/resize-container-resources/
    Fri Feb 06 08:03:47 GMT 2026
      498.3K bytes
  9. Using a KMS provider for data encryption | Kube...

    This page shows how to configure a Key Management Service (KMS) provider and plugin to enable secret data encryption. In Kubernetes 1.35 there are two versions of KMS at-rest encryption. You should use KMS v2 if feasible because KMS v1 is deprecated (since Kubernetes v1.28) and disabled by default (since Kubernetes v1.29). KMS v2 offers significantly better performance characteristics than KMS v1. Caution:This documentation is for the generally available implementation of KMS v2 (and for the deprecated version 1 implementation).
    kubernetes.io/docs/tasks/administer-cluster/kms-provider/
    Fri Feb 06 08:04:30 GMT 2026
      502.6K bytes
  10. Horizontal Pod Autoscaling | Kubernetes

    In Kubernetes, a HorizontalPodAutoscaler automatically updates a workload resource (such as a Deployment or StatefulSet), with the aim of automatically scaling capacity to match demand. Horizontal scaling means that the response to increased load is to deploy more Pods. This is different from vertical scaling, which for Kubernetes would mean assigning more resources (for example: memory or CPU) to the Pods that are already running for the workload. If the load decreases, and the number of Pods is above the configured minimum, the HorizontalPodAutoscaler instructs the workload resource (the Deployment, StatefulSet, or other similar resource) to scale back down.
    kubernetes.io/docs/concepts/workloads/autoscaling/horizontal-pod-autoscale/
    Fri Feb 06 07:41:50 GMT 2026
      522.2K bytes
Back to Top