Search Options

Results per page
Sort
Preferred Languages
Labels
Advance

Popular Words: ใƒ†ใ‚นใƒˆ test

Results 11 - 20 of 660 for filetype:html (0.04 sec)

  1. Security For Windows Nodes | Kubernetes

    This page describes security considerations and best practices specific to the Windows operating system. Protection for Secret data on nodes On Windows, data from Secrets are written out in clear text onto the node's local storage (as compared to using tmpfs / in-memory filesystems on Linux). As a cluster operator, you should take both of the following additional measures: Use file ACLs to secure the Secrets' file location. Apply volume-level encryption using BitLocker.
    kubernetes.io/docs/concepts/security/windows-security/
    Registered: Fri May 03 07:30:48 UTC 2024
    - 418.1K bytes
    - Viewed (0)
  2. Controlling Access to the Kubernetes API | Kube...

    This page provides an overview of controlling access to the Kubernetes API. Users access the Kubernetes API using kubectl, client libraries, or by making REST requests. Both human users and Kubernetes service accounts can be authorized for API access. When a request reaches the API, it goes through several stages, illustrated in the following diagram: Transport security By default, the Kubernetes API server listens on port 6443 on the first non-localhost network interface, protected by TLS.
    kubernetes.io/docs/concepts/security/controlling-access/
    Registered: Fri May 03 07:34:02 UTC 2024
    - 427.6K bytes
    - Viewed (0)
  3. Pod Topology Spread Constraints | Kubernetes

    You can use topology spread constraints to control how Pods are spread across your cluster among failure-domains such as regions, zones, nodes, and other user-defined topology domains. This can help to achieve high availability as well as efficient resource utilization. You can set cluster-level constraints as a default, or configure topology spread constraints for individual workloads. Motivation Imagine that you have a cluster of up to twenty nodes, and you want to run a workload that automatically scales how many replicas it uses.
    kubernetes.io/docs/concepts/scheduling-eviction/topology-spread-constraints/
    Registered: Fri May 03 07:34:54 UTC 2024
    - 473.6K bytes
    - Viewed (0)
  4. Configuration Best Practices | Kubernetes

    This document highlights and consolidates configuration best practices that are introduced throughout the user guide, Getting Started documentation, and examples. This is a living document. If you think of something that is not on this list but might be useful to others, please don't hesitate to file an issue or submit a PR. General Configuration Tips When defining configurations, specify the latest stable API version. Configuration files should be stored in version control before being pushed to the cluster.
    kubernetes.io/docs/concepts/configuration/overview/
    Registered: Fri May 03 07:34:45 UTC 2024
    - 426.5K bytes
    - Viewed (0)
  5. Limit Ranges | Kubernetes

    By default, containers run with unbounded compute resources on a Kubernetes cluster. Using Kubernetes resource quotas, administrators (also termed cluster operators) can restrict consumption and creation of cluster resources (such as CPU time, memory, and persistent storage) within a specified namespace. Within a namespace, a Pod can consume as much CPU and memory as is allowed by the ResourceQuotas that apply to that namespace. As a cluster operator, or as a namespace-level administrator, you might also be concerned about making sure that a single object cannot monopolize all available resources within a namespace.
    kubernetes.io/docs/concepts/policy/limit-range/
    Registered: Fri May 03 07:33:52 UTC 2024
    - 434.8K bytes
    - Viewed (0)
  6. Securing a Cluster | Kubernetes

    This document covers topics related to protecting a cluster from accidental or malicious access and provides recommendations on overall security. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube or you can use one of these Kubernetes playgrounds:
    kubernetes.io/docs/tasks/administer-cluster/securing-a-cluster/
    Registered: Fri May 03 07:41:18 UTC 2024
    - 435K bytes
    - Viewed (0)
  7. Configure a Pod to Use a Volume for Storage | K...

    This page shows how to configure a Pod to use a Volume for storage. A Container's file system lives only as long as the Container does. So when a Container terminates and restarts, filesystem changes are lost. For more consistent storage that is independent of the Container, you can use a Volume. This is especially important for stateful applications, such as key-value stores (such as Redis) and databases. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster.
    kubernetes.io/docs/tasks/configure-pod-container/configure-volume-storage/
    Registered: Fri May 03 07:41:40 UTC 2024
    - 428.9K bytes
    - Viewed (0)
  8. Upgrade A Cluster | Kubernetes

    This page provides an overview of the steps you should follow to upgrade a Kubernetes cluster. The way that you upgrade a cluster depends on how you initially deployed it and on any subsequent changes. At a high level, the steps you perform are: Upgrade the control plane Upgrade the nodes in your cluster Upgrade clients such as kubectl Adjust manifests and other resources based on the API changes that accompany the new Kubernetes version Before you begin You must have an existing cluster.
    kubernetes.io/docs/tasks/administer-cluster/cluster-upgrade/
    Registered: Fri May 03 07:40:43 UTC 2024
    - 420.7K bytes
    - Viewed (0)
  9. Resize CPU and Memory Resources assigned to Con...

    FEATURE STATE: Kubernetes v1.27 [alpha] This page assumes that you are familiar with Quality of Service for Kubernetes Pods. This page shows how to resize CPU and memory resources assigned to containers of a running pod without restarting the pod or its containers. A Kubernetes node allocates resources for a pod based on its requests, and restricts the pod's resource usage based on the limits specified in the pod's containers.
    kubernetes.io/docs/tasks/configure-pod-container/resize-container-resources/
    Registered: Fri May 03 07:42:19 UTC 2024
    - 445.4K bytes
    - Viewed (0)
  10. Change the Access Mode of a PersistentVolume to...

    This page shows how to change the access mode on an existing PersistentVolume to use ReadWriteOncePod. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube or you can use one of these Kubernetes playgrounds:
    kubernetes.io/docs/tasks/administer-cluster/change-pv-access-mode-readwriteoncepod/
    Registered: Fri May 03 07:41:54 UTC 2024
    - 433K bytes
    - Viewed (0)
Back to top