- Sort Score
- Result 10 results
- Languages All
- Labels All
Results 71 - 80 of 477 for content_length:[500000 TO 999999] (0.03 sec)
-
Configure a Security Context for a Pod or Conta...
A security context defines privilege and access control settings for a Pod or Container. Security context settings include, but are not limited to: Discretionary Access Control: Permission to access an object, like a file, is based on user ID (UID) and group ID (GID). Security Enhanced Linux (SELinux): Objects are assigned security labels. Running as privileged or unprivileged. Linux Capabilities: Give a process some privileges, but not all the privileges of the root user.kubernetes.io/docs/tasks/configure-pod-container/security-context/Registered: Mon May 26 05:54:00 UTC 2025 - 526.7K bytes - Viewed (0) -
Managing Service Accounts | Kubernetes
A ServiceAccount provides an identity for processes that run in a Pod. A process inside a Pod can use the identity of its associated service account to authenticate to the cluster's API server. For an introduction to service accounts, read configure service accounts. This task guide explains some of the concepts behind ServiceAccounts. The guide also explains how to obtain or revoke tokens that represent ServiceAccounts, and how to (optionally) bind a ServiceAccount's validity to the lifetime of an API object.kubernetes.io/docs/reference/access-authn-authz/service-accounts-admin/Registered: Mon May 26 06:09:37 UTC 2025 - 504K bytes - Viewed (0) -
StatefulSet Basics | Kubernetes
This tutorial provides an introduction to managing applications with StatefulSets. It demonstrates how to create, delete, scale, and update the Pods of StatefulSets. Before you begin Before you begin this tutorial, you should familiarize yourself with the following Kubernetes concepts: Pods Cluster DNS Headless Services PersistentVolumes PersistentVolume Provisioning The kubectl command line tool You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster.kubernetes.io/docs/tutorials/stateful-application/basic-stateful-set/Registered: Mon May 26 06:09:19 UTC 2025 - 541.7K bytes - Viewed (0) -
Authenticating | Kubernetes
This page provides an overview of authentication. Users in Kubernetes All Kubernetes clusters have two categories of users: service accounts managed by Kubernetes, and normal users. It is assumed that a cluster-independent service manages normal users in the following ways: an administrator distributing private keys a user store like Keystone or Google Accounts a file with a list of usernames and passwords In this regard, Kubernetes does not have objects which represent normal user accounts.kubernetes.io/docs/reference/access-authn-authz/authentication/Registered: Mon May 26 06:04:42 UTC 2025 - 662.8K bytes - Viewed (0) -
Assigning Pods to Nodes | Kubernetes
You can constrain a Pod so that it is restricted to run on particular node(s), or to prefer to run on particular nodes. There are several ways to do this and the recommended approaches all use label selectors to facilitate the selection. Often, you do not need to set any such constraints; the scheduler will automatically do a reasonable placement (for example, spreading your Pods across nodes so as not place Pods on a node with insufficient free resources).kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/Registered: Mon May 26 05:41:46 UTC 2025 - 523.2K bytes - Viewed (0) -
Server-Side Apply | Kubernetes
FEATURE STATE: Kubernetes v1.22 [stable] (enabled by default: true) Kubernetes supports multiple appliers collaborating to manage the fields of a single object. Server-Side Apply provides an optional mechanism for your cluster's control plane to track changes to an object's fields. At the level of a specific resource, Server-Side Apply records and tracks information about control over the fields of that object. Server-Side Apply helps users and controllers manage their resources through declarative configuration.kubernetes.io/docs/reference/using-api/server-side-apply/Registered: Mon May 26 06:05:11 UTC 2025 - 505.8K bytes - Viewed (0) -
Simples OAuth2 com senha e Bearer - FastAPI
fastapi.tiangolo.com/pt/tutorial/security/simple-oauth2/Registered: Mon May 26 05:20:28 UTC 2025 - 497.8K bytes - Viewed (0) -
Redis - The Real-time Data Platform
Developers love Redis. Unlock the full potential of the Redis database with Redis Enterprise and start building blazing fast apps.redis.io/Registered: Mon May 26 08:45:19 UTC 2025 - 530.6K bytes - Viewed (0) -
IO tools (text, CSV, HDF5, …) — pandas 2.2.3 do...
Skip to main content Back to top Ctrl + K GitHub Twitter Mastodon IO tools (text, CSV, HDF5, …) # The pandas I/O API ...pandas.pydata.org/pandas-docs/stable/user_guide/io.htmlRegistered: Mon May 26 09:46:33 UTC 2025 - Last Modified: Fri Sep 20 12:34:02 UTC 2024 - 864.1K bytes - Viewed (0) -
class Prism::InspectVisitor - Documentation for...
class Prism::InspectVisitor: This visitor is responsible for composing the strings that get returned by the various #inspect methods defined on each of the nodes.docs.ruby-lang.org/en/master/Prism/InspectVisitor.htmlRegistered: Mon May 19 04:25:42 UTC 2025 - Last Modified: Mon Mar 31 13:20:12 UTC 2025 - 613.2K bytes - Viewed (0)