- Sort Score
- Result 10 results
- Languages All
- Labels All
Results 101 - 110 of 692 for host:kubernetes.io (0.05 sec)
-
Enforcing Pod Security Standards | Kubernetes
This page provides an overview of best practices when it comes to enforcing Pod Security Standards. Using the built-in Pod Security Admission Controller FEATURE STATE: Kubernetes v1.25 [stable] The Pod Security Admission Controller intends to replace the deprecated PodSecurityPolicies. Configure all cluster namespaces Namespaces that lack any configuration at all should be considered significant gaps in your cluster security model. We recommend taking the time to analyze the types of workloads occurring in each namespace, and by referencing the Pod Security Standards, decide on an appropriate level for each of them.kubernetes.io/docs/setup/best-practices/enforcing-pod-security-standards/Registered: Wed Jul 16 07:46:12 UTC 2025 - 458.2K bytes - Viewed (0) -
Kubernetes Scheduler | Kubernetes
In Kubernetes, scheduling refers to making sure that Pods are matched to Nodes so that Kubelet can run them. Scheduling overview A scheduler watches for newly created Pods that have no Node assigned. For every Pod that the scheduler discovers, the scheduler becomes responsible for finding the best Node for that Pod to run on. The scheduler reaches this placement decision taking into account the scheduling principles described below.kubernetes.io/docs/concepts/scheduling-eviction/kube-scheduler/Registered: Wed Jul 16 07:59:25 UTC 2025 - 457.6K bytes - Viewed (0) -
Security | Kubernetes
Concepts for keeping your cloud-native workload secure.kubernetes.io/docs/concepts/security/Registered: Wed Jul 16 07:59:31 UTC 2025 - 460.7K bytes - Viewed (0) -
CSI Volume Cloning | Kubernetes
This document describes the concept of cloning existing CSI Volumes in Kubernetes. Familiarity with Volumes is suggested. Introduction The CSI Volume Cloning feature adds support for specifying existing PVCs in the dataSource field to indicate a user would like to clone a Volume. A Clone is defined as a duplicate of an existing Kubernetes Volume that can be consumed as any standard Volume would be. The only difference is that upon provisioning, rather than creating a "new" empty Volume, the back end device creates an exact duplicate of the specified Volume.kubernetes.io/docs/concepts/storage/volume-pvc-datasource/Registered: Wed Jul 16 07:59:43 UTC 2025 - 458.2K bytes - Viewed (0) -
Multi-tenancy | Kubernetes
This page provides an overview of available configuration options and best practices for cluster multi-tenancy. Sharing clusters saves costs and simplifies administration. However, sharing clusters also presents challenges such as security, fairness, and managing noisy neighbors. Clusters can be shared in many ways. In some cases, different applications may run in the same cluster. In other cases, multiple instances of the same application may run in the same cluster, one for each end user.kubernetes.io/docs/concepts/security/multi-tenancy/Registered: Wed Jul 16 07:58:24 UTC 2025 - 482.4K bytes - Viewed (0) -
Swap memory management | Kubernetes
Kubernetes can be configured to use swap memory on a node, allowing the kernel to free up physical memory by swapping out pages to backing storage. This is useful for multiple use-cases. For example, nodes running workloads that can benefit from using swap, such as those that have large memory footprints but only access a portion of that memory at any given time. It also helps prevent Pods from being terminated during memory pressure spikes, shields nodes from system-level memory spikes that might compromise its stability, allows for more flexible memory management on the node, and much more.kubernetes.io/docs/concepts/cluster-administration/swap-memory-management/Registered: Wed Jul 16 07:59:51 UTC 2025 - 478.3K bytes - Viewed (0) -
Cloud Native Security and Kubernetes | Kubernetes
Concepts for keeping your cloud-native workload secure.kubernetes.io/docs/concepts/security/cloud-native-security/Registered: Wed Jul 16 07:58:41 UTC 2025 - 463.1K bytes - Viewed (0) -
Deployments | Kubernetes
A Deployment manages a set of Pods to run an application workload, usually one that doesn't maintain state.kubernetes.io/docs/concepts/workloads/controllers/deployment/Registered: Wed Jul 16 07:53:17 UTC 2025 - 546K bytes - Viewed (0) -
Field Selectors | Kubernetes
Field selectors let you select Kubernetes objects based on the value of one or more resource fields. Here are some examples of field selector queries: metadata.name=my-service metadata.namespace!=default status.phase=Pending This kubectl command selects all Pods for which the value of the status.phase field is Running: kubectl get pods --field-selector status.phase=Running Note:Field selectors are essentially resource filters. By default, no selectors/filters are applied, meaning that all resources of the specified type are selected.kubernetes.io/docs/concepts/overview/working-with-objects/field-selectors/Registered: Wed Jul 16 07:53:21 UTC 2025 - 460.3K bytes - Viewed (0) -
Pod Lifecycle | Kubernetes
This page describes the lifecycle of a Pod. Pods follow a defined lifecycle, starting in the Pending phase, moving through Running if at least one of its primary containers starts OK, and then through either the Succeeded or Failed phases depending on whether any container in the Pod terminated in failure. Like individual application containers, Pods are considered to be relatively ephemeral (rather than durable) entities. Pods are created, assigned a unique ID (UID), and scheduled to run on nodes where they remain until termination (according to restart policy) or deletion.kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/Registered: Wed Jul 16 07:52:54 UTC 2025 - 511.8K bytes - Viewed (0)