Search Options

Results per page
Sort
Preferred Languages
Labels
Advance

Results 161 - 170 of 686 for host:kubernetes.io (0.05 sec)

  1. Assign Extended Resources to a Container | Kube...

    FEATURE STATE: Kubernetes v1.33 [stable] This page shows how to assign extended resources to a Container. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube or you can use one of these Kubernetes playgrounds:
    kubernetes.io/docs/tasks/configure-pod-container/extended-resource/
    Registered: Fri Jun 27 06:56:25 UTC 2025
    - 462K bytes
    - Viewed (0)
  2. Using sysctls in a Kubernetes Cluster | Kubernetes

    FEATURE STATE: Kubernetes v1.21 [stable] This document describes how to configure and use kernel parameters within a Kubernetes cluster using the sysctl interface. Note:Starting from Kubernetes version 1.23, the kubelet supports the use of either / or . as separators for sysctl names. Starting from Kubernetes version 1.25, setting Sysctls for a Pod supports setting sysctls with slashes. For example, you can represent the same sysctl name as kernel.shm_rmid_forced using a period as the separator, or as kernel/shm_rmid_forced using a slash as a separator.
    kubernetes.io/docs/tasks/administer-cluster/sysctl-cluster/
    Registered: Fri Jun 27 06:55:13 UTC 2025
    - 459.9K bytes
    - Viewed (0)
  3. Debug Init Containers | Kubernetes

    This page shows how to investigate problems related to the execution of Init Containers. The example command lines below refer to the Pod as <pod-name> and the Init Containers as <init-container-1> and <init-container-2>. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts.
    kubernetes.io/docs/tasks/debug/debug-application/debug-init-containers/
    Registered: Fri Jun 27 06:55:53 UTC 2025
    - 453.1K bytes
    - Viewed (0)
  4. Enforce Pod Security Standards by Configuring t...

    Kubernetes provides a built-in admission controller to enforce the Pod Security Standards. You can configure this admission controller to set cluster-wide defaults and exemptions. Before you begin Following an alpha release in Kubernetes v1.22, Pod Security Admission became available by default in Kubernetes v1.23, as a beta. From version 1.25 onwards, Pod Security Admission is generally available. To check the version, enter kubectl version. If you are not running Kubernetes 1.
    kubernetes.io/docs/tasks/configure-pod-container/enforce-standards-admission-controller/
    Registered: Fri Jun 27 06:55:35 UTC 2025
    - 455.6K bytes
    - Viewed (0)
  5. Mapping PodSecurityPolicies to Pod Security Sta...

    The tables below enumerate the configuration parameters on PodSecurityPolicy objects, whether the field mutates and/or validates pods, and how the configuration values map to the Pod Security Standards. For each applicable parameter, the allowed values for the Baseline and Restricted profiles are listed. Anything outside the allowed values for those profiles would fall under the Privileged profile. "No opinion" means all values are allowed under all Pod Security Standards.
    kubernetes.io/docs/reference/access-authn-authz/psp-to-pod-security-standards/
    Registered: Fri Jun 27 07:13:11 UTC 2025
    - 454.4K bytes
    - Viewed (0)
  6. Validating Admission Policy | Kubernetes

    FEATURE STATE: Kubernetes v1.30 [stable] This page provides an overview of Validating Admission Policy. What is Validating Admission Policy? Validating admission policies offer a declarative, in-process alternative to validating admission webhooks. Validating admission policies use the Common Expression Language (CEL) to declare the validation rules of a policy. Validation admission policies are highly configurable, enabling policy authors to define policies that can be parameterized and scoped to resources as needed by cluster administrators.
    kubernetes.io/docs/reference/access-authn-authz/validating-admission-policy/
    Registered: Fri Jun 27 07:13:20 UTC 2025
    - 543.3K bytes
    - Viewed (0)
  7. Webhook Mode | Kubernetes

    A WebHook is an HTTP callback: an HTTP POST that occurs when something happens; a simple event-notification via HTTP POST. A web application implementing WebHooks will POST a message to a URL when certain things happen. When specified, mode Webhook causes Kubernetes to query an outside REST service when determining user privileges. Configuration File Format Mode Webhook requires a file for HTTP configuration, specify by the --authorization-webhook-config-file=SOME_FILENAME flag. The configuration file uses the kubeconfig file format.
    kubernetes.io/docs/reference/access-authn-authz/webhook/
    Registered: Fri Jun 27 07:13:34 UTC 2025
    - 466.9K bytes
    - Viewed (0)
  8. Admission Control in Kubernetes | Kubernetes

    This page provides an overview of admission controllers. An admission controller is a piece of code that intercepts requests to the Kubernetes API server prior to persistence of the resource, but after the request is authenticated and authorized. Several important features of Kubernetes require an admission controller to be enabled in order to properly support the feature. As a result, a Kubernetes API server that is not properly configured with the right set of admission controllers is an incomplete server that will not support all the features you expect.
    kubernetes.io/docs/reference/access-authn-authz/admission-controllers/
    Registered: Fri Jun 27 07:12:54 UTC 2025
    - 513.1K bytes
    - Viewed (0)
  9. TLS bootstrapping | Kubernetes

    In a Kubernetes cluster, the components on the worker nodes - kubelet and kube-proxy - need to communicate with Kubernetes control plane components, specifically kube-apiserver. In order to ensure that communication is kept private, not interfered with, and ensure that each component of the cluster is talking to another trusted component, we strongly recommend using client TLS certificates on nodes. The normal process of bootstrapping these components, especially worker nodes that need certificates so they can communicate safely with kube-apiserver, can be a challenging process as it is often outside of the scope of Kubernetes and requires significant additional work.
    kubernetes.io/docs/reference/access-authn-authz/kubelet-tls-bootstrapping/
    Registered: Fri Jun 27 07:13:50 UTC 2025
    - 485K bytes
    - Viewed (0)
  10. Contributing to Kubernetes blogs | Kubernetes

    Production-Grade Container Orchestration
    kubernetes.io/docs/contribute/blog/
    Registered: Fri Jun 27 07:33:19 UTC 2025
    - 449.3K bytes
    - Viewed (0)
Back to top