Search Options

Results per page
Sort
Preferred Languages
Labels
Advance

Results 581 - 590 of 673 for host:kubernetes.io (0.03 sec)

  1. Downward API | Kubernetes

    There are two ways to expose Pod and container fields to a running container: environment variables, and as files that are populated by a special volume type. Together, these two ways of exposing Pod and container fields are called the downward API.
    kubernetes.io/docs/concepts/workloads/pods/downward-api/
    Registered: Wed Feb 12 05:53:54 UTC 2025
    - 434.4K bytes
    - Viewed (0)
  2. DNS for Services and Pods | Kubernetes

    Your workload can discover Services within your cluster using DNS; this page explains how that works.
    kubernetes.io/docs/concepts/services-networking/dns-pod-service/
    Registered: Wed Feb 12 05:54:18 UTC 2025
    - 460.1K bytes
    - Viewed (0)
  3. ConfigMaps | Kubernetes

    A ConfigMap is an API object used to store non-confidential data in key-value pairs. Pods can consume ConfigMaps as environment variables, command-line arguments, or as configuration files in a volume. A ConfigMap allows you to decouple environment-specific configuration from your container images, so that your applications are easily portable. Caution:ConfigMap does not provide secrecy or encryption. If the data you want to store are confidential, use a Secret rather than a ConfigMap, or use additional (third party) tools to keep your data private.
    kubernetes.io/docs/concepts/configuration/configmap/
    Registered: Wed Feb 12 05:53:36 UTC 2025
    - 469.8K bytes
    - Viewed (0)
  4. Hardening Guide - Authentication Mechanisms | K...

    Information on authentication options in Kubernetes and their security properties.
    kubernetes.io/docs/concepts/security/hardening-guide/authentication-mechanisms/
    Registered: Wed Feb 12 05:53:17 UTC 2025
    - 436.4K bytes
    - Viewed (0)
  5. Application Security Checklist | Kubernetes

    Baseline guidelines around ensuring application security on Kubernetes, aimed at application developers
    kubernetes.io/docs/concepts/security/application-security-checklist/
    Registered: Wed Feb 12 05:53:32 UTC 2025
    - 436.3K bytes
    - Viewed (0)
  6. Change the default StorageClass | Kubernetes

    This page shows how to change the default Storage Class that is used to provision volumes for PersistentVolumeClaims that have no special requirements. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube or you can use one of these Kubernetes playgrounds:
    kubernetes.io/docs/tasks/administer-cluster/change-default-storage-class/
    Registered: Wed Feb 12 06:07:15 UTC 2025
    - 434.2K bytes
    - Viewed (0)
  7. Configure Quotas for API Objects | Kubernetes

    This page shows how to configure quotas for API objects, including PersistentVolumeClaims and Services. A quota restricts the number of objects, of a particular type, that can be created in a namespace. You specify quotas in a ResourceQuota object. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts.
    kubernetes.io/docs/tasks/administer-cluster/quota-api-object/
    Registered: Wed Feb 12 06:07:19 UTC 2025
    - 446K bytes
    - Viewed (0)
  8. Safely Drain a Node | Kubernetes

    This page shows how to safely drain a node, optionally respecting the PodDisruptionBudget you have defined. Before you begin This task assumes that you have met the following prerequisites: You do not require your applications to be highly available during the node drain, or You have read about the PodDisruptionBudget concept, and have configured PodDisruptionBudgets for applications that need them. (Optional) Configure a disruption budget To ensure that your workloads remain available during maintenance, you can configure a PodDisruptionBudget.
    kubernetes.io/docs/tasks/administer-cluster/safely-drain-node/
    Registered: Wed Feb 12 06:06:41 UTC 2025
    - 435.1K bytes
    - Viewed (0)
  9. Assign Memory Resources to Containers and Pods ...

    This page shows how to assign a memory request and a memory limit to a Container. A Container is guaranteed to have as much memory as it requests, but is not allowed to use more memory than its limit. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts.
    kubernetes.io/docs/tasks/configure-pod-container/assign-memory-resource/
    Registered: Wed Feb 12 06:06:46 UTC 2025
    - 463.3K bytes
    - Viewed (0)
  10. Use Cilium for NetworkPolicy | Kubernetes

    This page shows how to use Cilium for NetworkPolicy. For background on Cilium, read the Introduction to Cilium. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube or you can use one of these Kubernetes playgrounds:
    kubernetes.io/docs/tasks/administer-cluster/network-policy-provider/cilium-network-policy/
    Registered: Wed Feb 12 06:06:28 UTC 2025
    - 435K bytes
    - Viewed (0)
Back to top