Search Options

Results per page
Sort
Preferred Languages
Labels
Advance

Results 181 - 190 of 673 for host:kubernetes.io (0.04 sec)

  1. ReplicationController | Kubernetes

    Legacy API for managing workloads that can scale horizontally. Superseded by the Deployment and ReplicaSet APIs.
    kubernetes.io/docs/concepts/workloads/controllers/replicationcontroller/
    Registered: Wed Feb 12 05:52:49 UTC 2025
    - 455.9K bytes
    - Viewed (0)
  2. Pod Security Standards | Kubernetes

    A detailed look at the different policy levels defined in the Pod Security Standards.
    kubernetes.io/docs/concepts/security/pod-security-standards/
    Registered: Wed Feb 12 05:50:41 UTC 2025
    - 450.4K bytes
    - Viewed (0)
  3. Volume Snapshots | Kubernetes

    In Kubernetes, a VolumeSnapshot represents a snapshot of a volume on a storage system. This document assumes that you are already familiar with Kubernetes persistent volumes. Introduction Similar to how API resources PersistentVolume and PersistentVolumeClaim are used to provision volumes for users and administrators, VolumeSnapshotContent and VolumeSnapshot API resources are provided to create volume snapshots for users and administrators. A VolumeSnapshotContent is a snapshot taken from a volume in the cluster that has been provisioned by an administrator.
    kubernetes.io/docs/concepts/storage/volume-snapshots/
    Registered: Wed Feb 12 05:52:25 UTC 2025
    - 451.8K bytes
    - Viewed (0)
  4. Encrypting Confidential Data at Rest | Kubernetes

    All of the APIs in Kubernetes that let you write persistent API resource data support at-rest encryption. For example, you can enable at-rest encryption for Secrets. This at-rest encryption is additional to any system-level encryption for the etcd cluster or for the filesystem(s) on hosts where you are running the kube-apiserver. This page shows how to enable and configure encryption of API data at rest. Note:This task covers encryption for resource data stored using the Kubernetes API.
    kubernetes.io/docs/tasks/administer-cluster/encrypt-data/
    Registered: Wed Feb 12 06:05:33 UTC 2025
    - 493.5K bytes
    - Viewed (0)
  5. Using a KMS provider for data encryption | Kube...

    This page shows how to configure a Key Management Service (KMS) provider and plugin to enable secret data encryption. In Kubernetes 1.32 there are two versions of KMS at-rest encryption. You should use KMS v2 if feasible because KMS v1 is deprecated (since Kubernetes v1.28) and disabled by default (since Kubernetes v1.29). KMS v2 offers significantly better performance characteristics than KMS v1. Caution:This documentation is for the generally available implementation of KMS v2 (and for the deprecated version 1 implementation).
    kubernetes.io/docs/tasks/administer-cluster/kms-provider/
    Registered: Wed Feb 12 06:04:53 UTC 2025
    - 461.7K bytes
    - Viewed (0)
  6. Apply Pod Security Standards at the Cluster Lev...

    Note This tutorial applies only for new clusters. Pod Security is an admission controller that carries out checks against the Kubernetes Pod Security Standards when new pods are created. It is a feature GA'ed in v1.25. This tutorial shows you how to enforce the baseline Pod Security Standard at the cluster level which applies a standard configuration to all namespaces in a cluster. To apply Pod Security Standards to specific namespaces, refer to Apply Pod Security Standards at the namespace level.
    kubernetes.io/docs/tutorials/security/cluster-level-pss/
    Registered: Wed Feb 12 06:18:37 UTC 2025
    - 447.7K bytes
    - Viewed (0)
  7. Using Minikube to Create a Cluster | Kubernetes

    Learn what a Kubernetes cluster is. Learn what Minikube is. Start a Kubernetes cluster.
    kubernetes.io/docs/tutorials/kubernetes-basics/create-cluster/cluster-intro/
    Registered: Wed Feb 12 06:18:46 UTC 2025
    - 434.1K bytes
    - Viewed (0)
  8. About cgroup v2 | Kubernetes

    On Linux, control groups constrain resources that are allocated to processes. The kubelet and the underlying container runtime need to interface with cgroups to enforce resource management for pods and containers which includes cpu/memory requests and limits for containerized workloads. There are two versions of cgroups in Linux: cgroup v1 and cgroup v2. cgroup v2 is the new generation of the cgroup API. What is cgroup v2? FEATURE STATE: Kubernetes v1.
    kubernetes.io/docs/concepts/architecture/cgroups/
    Registered: Wed Feb 12 05:45:37 UTC 2025
    - 435.1K bytes
    - Viewed (0)
  9. Configuring each kubelet in your cluster using ...

    Note: Dockershim has been removed from the Kubernetes project as of release 1.24. Read the Dockershim Removal FAQ for further details. FEATURE STATE: Kubernetes v1.11 [stable] The lifecycle of the kubeadm CLI tool is decoupled from the kubelet, which is a daemon that runs on each node within the Kubernetes cluster. The kubeadm CLI tool is executed by the user when Kubernetes is initialized or upgraded, whereas the kubelet is always running in the background.
    kubernetes.io/docs/setup/production-environment/tools/kubeadm/kubelet-integration/
    Registered: Wed Feb 12 05:44:29 UTC 2025
    - 444.2K bytes
    - Viewed (0)
  10. Finalizers | Kubernetes

    Finalizers are namespaced keys that tell Kubernetes to wait until specific conditions are met before it fully deletes resources marked for deletion. Finalizers alert controllers to clean up resources the deleted object owned. When you tell Kubernetes to delete an object that has finalizers specified for it, the Kubernetes API marks the object for deletion by populating .metadata.deletionTimestamp, and returns a 202 status code (HTTP "Accepted"). The target object remains in a terminating state while the control plane, or other components, take the actions defined by the finalizers.
    kubernetes.io/docs/concepts/overview/working-with-objects/finalizers/
    Registered: Wed Feb 12 05:44:41 UTC 2025
    - 437.1K bytes
    - Viewed (0)
Back to top