Search Options

Results per page
Sort
Preferred Languages
Labels
Advance

Results 531 - 540 of 705 for host:kubernetes.io (1.37 sec)

  1. kubectl config set-credentials | Kubernetes

    Synopsis Set a user entry in kubeconfig. Specifying a name that already exists will merge new fields on top of existing values. Client-certificate flags: --client-certificate=certfile --client-key=keyfile Bearer token flags: --token=bearer_token Basic auth flags: --username=basic_user --password=basic_password Bearer token and basic auth are mutually exclusive. kubectl config set-credentials NAME [--client-certificate=path/to/certfile] [--client-key=path/to/keyfile] [--token=bearer_token] [--username=basic_user] [--password=basic_password] [--auth-provider=provider_name] [--auth-provider-arg=key=value] [--exec-command=exec_command] [--exec-api-version=exec_api_version] [--exec-arg=arg] [--exec-env=key=value] Examples # Set only the "client-key" field on the "cluster-admin" # entry, without touching other values kubectl config set-credentials cluster-admin --client-key=~/.
    kubernetes.io/docs/reference/kubectl/generated/kubectl_config/kubectl_config_set-credentials/
    Registered: Fri Dec 12 09:07:58 UTC 2025
    - 471.6K bytes
    - Viewed (0)
  2. Scheduling Policies | Kubernetes

    In Kubernetes versions before v1.23, a scheduling policy can be used to specify the predicates and priorities process. For example, you can set a scheduling policy by running kube-scheduler --policy-config-file <filename> or kube-scheduler --policy-configmap <ConfigMap>. This scheduling policy is not supported since Kubernetes v1.23. Associated flags policy-config-file, policy-configmap, policy-configmap-namespace and use-legacy-policy-config are also not supported. Instead, use the Scheduler Configuration to achieve similar behavior. What's next Learn about scheduling Learn about kube-scheduler Configuration Read the kube-scheduler configuration reference (v1)
    kubernetes.io/docs/reference/scheduling/policies/
    Registered: Fri Dec 12 09:19:54 UTC 2025
    - 459.9K bytes
    - Viewed (0)
  3. Mapping PodSecurityPolicies to Pod Security Sta...

    The tables below enumerate the configuration parameters on PodSecurityPolicy objects, whether the field mutates and/or validates pods, and how the configuration values map to the Pod Security Standards. For each applicable parameter, the allowed values for the Baseline and Restricted profiles are listed. Anything outside the allowed values for those profiles would fall under the Privileged profile. "No opinion" means all values are allowed under all Pod Security Standards.
    kubernetes.io/docs/reference/access-authn-authz/psp-to-pod-security-standards/
    Registered: Fri Dec 12 08:54:01 UTC 2025
    - 466K bytes
    - Viewed (0)
  4. Adding entries to Pod /etc/hosts with HostAlias...

    Adding entries to a Pod's /etc/hosts file provides Pod-level override of hostname resolution when DNS and other options are not applicable. You can add these custom entries with the HostAliases field in PodSpec. The Kubernetes project recommends modifying DNS configuration using the hostAliases field (part of the .spec for a Pod), and not by using an init container or other means to edit /etc/hosts directly. Change made in other ways may be overwritten by the kubelet during Pod creation or restart.
    kubernetes.io/docs/tasks/network/customize-hosts-file-for-pods/
    Registered: Fri Dec 12 08:54:28 UTC 2025
    - 469.5K bytes
    - Viewed (0)
  5. Set up Ingress on Minikube with the NGINX Ingre...

    An Ingress is an API object that defines rules which allow external access to services in a cluster. An Ingress controller fulfills the rules set in the Ingress. This page shows you how to set up a simple Ingress which routes requests to Service 'web' or 'web2' depending on the HTTP URI. Before you begin This tutorial assumes that you are using minikube to run a local Kubernetes cluster. Visit Install tools to learn how to install minikube.
    kubernetes.io/docs/tasks/access-application-cluster/ingress-minikube/
    Registered: Wed Nov 05 11:06:15 UTC 2025
    - 487.5K bytes
    - Viewed (0)
  6. Pods | Kubernetes

    Production-Grade Container Orchestration
    kubernetes.io/docs/concepts/workloads/pods/
    Registered: Fri Dec 12 08:14:16 UTC 2025
    - 499.1K bytes
    - Viewed (0)
  7. Hardening Guide - Authentication Mechanisms | K...

    Information on authentication options in Kubernetes and their security properties.
    kubernetes.io/docs/concepts/security/hardening-guide/authentication-mechanisms/
    Registered: Fri Dec 12 08:14:21 UTC 2025
    - 467.2K bytes
    - Viewed (0)
  8. Application Security Checklist | Kubernetes

    Baseline guidelines around ensuring application security on Kubernetes, aimed at application developers
    kubernetes.io/docs/concepts/security/application-security-checklist/
    Registered: Fri Dec 12 08:14:29 UTC 2025
    - 467.3K bytes
    - Viewed (0)
  9. CronJob | Kubernetes

    A CronJob starts one-time Jobs on a repeating schedule.
    kubernetes.io/docs/concepts/workloads/controllers/cron-jobs/
    Registered: Fri Dec 12 08:13:15 UTC 2025
    - 479.7K bytes
    - Viewed (0)
  10. Role Based Access Control Good Practices | Kube...

    Principles and practices for good RBAC design for cluster operators.
    kubernetes.io/docs/concepts/security/rbac-good-practices/
    Registered: Fri Dec 12 08:13:20 UTC 2025
    - 470.5K bytes
    - Viewed (0)
Back to top