- Sort Score
- Result 10 results
- Languages All
- Labels All
Results 581 - 590 of 705 for host:kubernetes.io (0.62 sec)
-
Configuring Redis using a ConfigMap | Kubernetes
This page provides a real world example of how to configure Redis using a ConfigMap and builds upon the Configure a Pod to Use a ConfigMap task. Objectives Create a ConfigMap with Redis configuration values Create a Redis Pod that mounts and uses the created ConfigMap Verify that the configuration was correctly applied. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster.kubernetes.io/docs/tutorials/configuration/configure-redis-using-configmap/Registered: Fri Dec 12 08:48:51 UTC 2025 - 483.2K bytes - Viewed (0) -
Well-Known Labels, Annotations and Taints | Kub...
Production-Grade Container Orchestrationkubernetes.io/docs/reference/labels-annotations-taints/Registered: Fri Dec 12 08:49:03 UTC 2025 - 615.4K bytes - Viewed (0) -
Kubernetes API Concepts | Kubernetes
The Kubernetes API is a resource-based (RESTful) programmatic interface provided via HTTP. It supports retrieving, creating, updating, and deleting primary resources via the standard HTTP verbs (POST, PUT, PATCH, DELETE, GET). For some resources, the API includes additional subresources that allow fine-grained authorization (such as separate views for Pod details and log retrievals), and can accept and serve those resources in different representations for convenience or efficiency. Kubernetes supports efficient change notifications on resources via watches: in the Kubernetes API, watch is a verb that is used to track changes to an object in Kubernetes as a stream.kubernetes.io/docs/reference/using-api/api-concepts/Registered: Fri Dec 12 08:48:32 UTC 2025 - 566.5K bytes - Viewed (0) -
Restrict a Container's Access to Resources with...
FEATURE STATE: Kubernetes v1.31 [stable](enabled by default) This page shows you how to load AppArmor profiles on your nodes and enforce those profiles in Pods. To learn more about how Kubernetes can confine Pods using AppArmor, see Linux kernel security constraints for Pods and containers. Objectives See an example of how to load a profile on a Node Learn how to enforce the profile on a Pod Learn how to check that the profile is loaded See what happens when a profile is violated See what happens when a profile cannot be loaded Before you begin AppArmor is an optional kernel module and Kubernetes feature, so verify it is supported on your Nodes before proceeding:kubernetes.io/docs/tutorials/security/apparmor/Registered: Fri Dec 12 08:49:27 UTC 2025 - 481.1K bytes - Viewed (0) -
Cluster Management | Kubernetes
Production-Grade Container Orchestrationkubernetes.io/docs/tutorials/cluster-management/Registered: Fri Dec 12 08:50:14 UTC 2025 - 456.4K bytes - Viewed (0) -
Running ZooKeeper, A Distributed System Coordin...
This tutorial demonstrates running Apache Zookeeper on Kubernetes using StatefulSets, PodDisruptionBudgets, and PodAntiAffinity. Before you begin Before starting this tutorial, you should be familiar with the following Kubernetes concepts: Pods Cluster DNS Headless Services PersistentVolumes StatefulSets PodDisruptionBudgets PodAntiAffinity kubectl CLI You must have a cluster with at least four nodes, and each node requires at least 2 CPUs and 4 GiB of memory. In this tutorial you will cordon and drain the cluster's nodes.kubernetes.io/docs/tutorials/stateful-application/zookeeper/Registered: Fri Dec 12 08:55:14 UTC 2025 - 553.6K bytes - Viewed (0) -
kubectl create service nodeport | Kubernetes
Synopsis Create a NodePort service with the specified name. kubectl create service nodeport NAME [--tcp=port:targetPort] [--dry-run=server|client|none] Examples # Create a new NodePort service named my-ns kubectl create service nodeport my-ns --tcp=5678:8080 Options --allow-missing-template-keys Default: true If true, ignore any errors in templates when a field or map key is missing in the template. Only applies to golang and jsonpath output formats. --dry-run string[="unchanged"] Default: "none" Must be "none", "server", or "client". If client strategy, only print the object that would be sent, without sending it.kubernetes.io/docs/reference/kubectl/generated/kubectl_create/kubectl_create_service_nodeport/Registered: Fri Dec 12 09:10:41 UTC 2025 - 469.5K bytes - Viewed (0) -
kubectl create secret tls | Kubernetes
Synopsis Create a TLS secret from the given public/private key pair. The public/private key pair must exist beforehand. The public key certificate must be .PEM encoded and match the given private key. kubectl create secret tls NAME --cert=path/to/cert/file --key=path/to/key/file [--dry-run=server|client|none] Examples # Create a new TLS secret named tls-secret with the given key pair kubectl create secret tls tls-secret --cert=path/to/tls.crt --key=path/to/tls.key Options --allow-missing-template-keys Default: true If true, ignore any errors in templates when a field or map key is missing in the template.kubernetes.io/docs/reference/kubectl/generated/kubectl_create/kubectl_create_secret_tls/Registered: Fri Dec 12 09:10:28 UTC 2025 - 469.6K bytes - Viewed (0) -
Implementation details | Kubernetes
FEATURE STATE: Kubernetes v1.10 [stable] kubeadm init and kubeadm join together provide a nice user experience for creating a bare Kubernetes cluster from scratch, that aligns with the best-practices. However, it might not be obvious how kubeadm does that. This document provides additional details on what happens under the hood, with the aim of sharing knowledge on the best practices for a Kubernetes cluster. Core design principles The cluster that kubeadm init and kubeadm join set up should be:kubernetes.io/docs/reference/setup-tools/kubeadm/implementation-details/Registered: Fri Dec 12 08:58:57 UTC 2025 - 505.3K bytes - Viewed (0) -
Ports and Protocols | Kubernetes
When running Kubernetes in an environment with strict network boundaries, such as on-premises datacenter with physical network firewalls or Virtual Networks in Public Cloud, it is useful to be aware of the ports and protocols used by Kubernetes components. Control plane Protocol Direction Port Range Purpose Used By TCP Inbound 6443 Kubernetes API server All TCP Inbound 2379-2380 etcd server client API kube-apiserver, etcd TCP Inbound 10250 Kubelet API Self, Control plane TCP Inbound 10259 kube-scheduler Self TCP Inbound 10257 kube-controller-manager Self Although etcd ports are included in control plane section, you can also host your own etcd cluster externally or on custom ports.kubernetes.io/docs/reference/networking/ports-and-protocols/Registered: Fri Dec 12 08:59:48 UTC 2025 - 461.5K bytes - Viewed (0)