- Sort Score
- Result 10 results
- Languages All
- Labels All
Results 181 - 190 of 721 for host:kubernetes.io (0.03 sec)
-
Pod Lifecycle | Kubernetes
This page describes the lifecycle of a Pod. Pods follow a defined lifecycle, starting in the Pending phase, moving through Running if at least one of its primary containers starts OK, and then through either the Succeeded or Failed phases depending on whether any container in the Pod terminated in failure. Like individual application containers, Pods are considered to be relatively ephemeral (rather than durable) entities. Pods are created, assigned a unique ID (UID), and scheduled to run on nodes where they remain until termination (according to restart policy) or deletion.kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/Registered: Mon Jan 05 08:08:26 UTC 2026 - 557.3K bytes - Viewed (0) -
Production environment | Kubernetes
Create a production-quality Kubernetes clusterkubernetes.io/docs/setup/production-environment/Registered: Mon Jan 05 08:07:31 UTC 2026 - 485K bytes - Viewed (0) -
Enforcing Pod Security Standards | Kubernetes
This page provides an overview of best practices when it comes to enforcing Pod Security Standards. Using the built-in Pod Security Admission Controller FEATURE STATE: Kubernetes v1.25 [stable] The Pod Security Admission Controller intends to replace the deprecated PodSecurityPolicies. Configure all cluster namespaces Namespaces that lack any configuration at all should be considered significant gaps in your cluster security model. We recommend taking the time to analyze the types of workloads occurring in each namespace, and by referencing the Pod Security Standards, decide on an appropriate level for each of them.kubernetes.io/docs/setup/best-practices/enforcing-pod-security-standards/Registered: Mon Jan 05 08:07:36 UTC 2026 - 472.8K bytes - Viewed (0) -
PKI certificates and requirements | Kubernetes
Kubernetes requires PKI certificates for authentication over TLS. If you install Kubernetes with kubeadm, the certificates that your cluster requires are automatically generated. You can also generate your own certificates -- for example, to keep your private keys more secure by not storing them on the API server. This page explains the certificates that your cluster requires. How certificates are used by your cluster Kubernetes requires PKI for the following operations:kubernetes.io/docs/setup/best-practices/certificates/Registered: Mon Jan 05 08:07:16 UTC 2026 - 483.1K bytes - Viewed (0) -
Automatic Cleanup for Finished Jobs | Kubernetes
A time-to-live mechanism to clean up old Jobs that have finished execution.kubernetes.io/docs/concepts/workloads/controllers/ttlafterfinished/Registered: Mon Jan 05 08:06:45 UTC 2026 - 469.9K bytes - Viewed (0) -
Install Tools | Kubernetes
Set up Kubernetes tools on your computer.kubernetes.io/docs/tasks/tools/Registered: Mon Jan 05 08:31:22 UTC 2026 - 467.9K bytes - Viewed (0) -
Define Environment Variables for a Container | ...
This page shows how to define environment variables for a container in a Kubernetes Pod. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube or you can use one of these Kubernetes playgrounds:kubernetes.io/docs/tasks/inject-data-application/define-environment-variable-container/Registered: Mon Jan 05 08:44:01 UTC 2026 - 481.6K bytes - Viewed (0) -
Distribute Credentials Securely Using Secrets |...
This page shows how to securely inject sensitive data, such as passwords and encryption keys, into Pods. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube or you can use one of these Kubernetes playgrounds:kubernetes.io/docs/tasks/inject-data-application/distribute-credentials-secure/Registered: Mon Jan 05 08:44:15 UTC 2026 - 518.3K bytes - Viewed (0) -
Set Kubelet Parameters Via A Configuration File...
Before you begin Some steps in this page use the jq tool. If you don't have jq, you can install it via your operating system's software sources, or fetch it from https://jqlang.github.io/jq/. Some steps also involve installing curl, which can be installed via your operating system's software sources. A subset of the kubelet's configuration parameters may be set via an on-disk config file, as a substitute for command-line flags. Providing parameters via a config file is the recommended approach because it simplifies node deployment and configuration management.kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/Registered: Mon Jan 05 08:44:48 UTC 2026 - 495.4K bytes - Viewed (0) -
User Impersonation | Kubernetes
User impersonation is a method of allowing authenticated users to act as another user, group, or service account through HTTP headers. A user can act as another user through impersonation headers. These let requests manually override the user info a request authenticates as. For example, an admin could use this feature to debug an authorization policy by temporarily impersonating another user and seeing if a request was denied. Impersonation requests first authenticate as the requesting user, then switch to the impersonated user info.kubernetes.io/docs/reference/access-authn-authz/user-impersonation/Registered: Mon Jan 05 08:59:15 UTC 2026 - 533.7K bytes - Viewed (0)