- Sort Score
- Result 10 results
- Languages All
- Labels All
Results 201 - 210 of 702 for host:kubernetes.io (0.07 sec)
-
Installing Addons | Kubernetes
Note: This section links to third party projects that provide functionality required by Kubernetes. The Kubernetes project authors aren't responsible for these projects, which are listed alphabetically. To add a project to this list, read the content guide before submitting a change. More information. Add-ons extend the functionality of Kubernetes. This page lists some of the available add-ons and links to their respective installation instructions. The list does not try to be exhaustive.kubernetes.io/docs/concepts/cluster-administration/addons/Registered: Fri Oct 24 09:14:43 UTC 2025 - 468.6K bytes - Viewed (0) -
Cluster Administration | Kubernetes
Lower-level detail relevant to creating or administering a Kubernetes cluster.kubernetes.io/docs/concepts/cluster-administration/Registered: Fri Oct 24 09:13:18 UTC 2025 - 463.8K bytes - Viewed (0) -
Use Calico for NetworkPolicy | Kubernetes
This page shows a couple of quick ways to create a Calico cluster on Kubernetes. Before you begin Decide whether you want to deploy a cloud or local cluster. Creating a Calico cluster with Google Kubernetes Engine (GKE) Prerequisite: gcloud. To launch a GKE cluster with Calico, include the --enable-network-policy flag. Syntax gcloud container clusters create [CLUSTER_NAME] --enable-network-policy Example gcloud container clusters create my-calico-cluster --enable-network-policy To verify the deployment, use the following command.kubernetes.io/docs/tasks/administer-cluster/network-policy-provider/calico-network-policy/Registered: Fri Oct 24 09:25:41 UTC 2025 - 462.6K bytes - Viewed (0) -
Configure a Pod Quota for a Namespace | Kubernetes
Restrict how many Pods you can create within a namespace.kubernetes.io/docs/tasks/administer-cluster/manage-resources/quota-pod-namespace/Registered: Fri Oct 24 09:25:18 UTC 2025 - 474.9K bytes - Viewed (0) -
Romana for NetworkPolicy | Kubernetes
This page shows how to use Romana for NetworkPolicy. Before you begin Complete steps 1, 2, and 3 of the kubeadm getting started guide. Installing Romana with kubeadm Follow the containerized installation guide for kubeadm. Applying network policies To apply network policies use one of the following: Romana network policies. Example of Romana network policy. The NetworkPolicy API. What's next Once you have installed Romana, you can follow the Declare Network Policy to try out Kubernetes NetworkPolicy.kubernetes.io/docs/tasks/administer-cluster/network-policy-provider/romana-network-policy/Registered: Fri Oct 24 09:26:16 UTC 2025 - 460.5K bytes - Viewed (0) -
Access Clusters Using the Kubernetes API | Kube...
This page shows how to access clusters using the Kubernetes API. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube or you can use one of these Kubernetes playgrounds:kubernetes.io/docs/tasks/administer-cluster/access-cluster-api/Registered: Fri Oct 24 09:26:21 UTC 2025 - 497.5K bytes - Viewed (0) -
Decrypt Confidential Data that is Already Encry...
All of the APIs in Kubernetes that let you write persistent API resource data support at-rest encryption. For example, you can enable at-rest encryption for Secrets. This at-rest encryption is additional to any system-level encryption for the etcd cluster or for the filesystem(s) on hosts where you are running the kube-apiserver. This page shows how to switch from encryption of API data at rest, so that API data are stored unencrypted.kubernetes.io/docs/tasks/administer-cluster/decrypt-data/Registered: Fri Oct 24 09:24:41 UTC 2025 - 471.7K bytes - Viewed (0) -
Ephemeral Volumes | Kubernetes
This document describes ephemeral volumes in Kubernetes. Familiarity with volumes is suggested, in particular PersistentVolumeClaim and PersistentVolume. Some applications need additional storage but don't care whether that data is stored persistently across restarts. For example, caching services are often limited by memory size and can move infrequently used data into storage that is slower than memory with little impact on overall performance. Other applications expect some read-only input data to be present in files, like configuration data or secret keys.kubernetes.io/docs/concepts/storage/ephemeral-volumes/Registered: Fri Oct 24 08:58:01 UTC 2025 - 480.5K bytes - Viewed (0) -
Kubernetes API Aggregation Layer | Kubernetes
The aggregation layer allows Kubernetes to be extended with additional APIs, beyond what is offered by the core Kubernetes APIs. The additional APIs can either be ready-made solutions such as a metrics server, or APIs that you develop yourself. The aggregation layer is different from Custom Resource Definitions, which are a way to make the kube-apiserver recognise new kinds of object. Aggregation layer The aggregation layer runs in-process with the kube-apiserver.kubernetes.io/docs/concepts/extend-kubernetes/api-extension/apiserver-aggregation/Registered: Fri Oct 24 09:15:03 UTC 2025 - 463.2K bytes - Viewed (0) -
Configure a Security Context for a Pod or Conta...
A security context defines privilege and access control settings for a Pod or Container. Security context settings include, but are not limited to: Discretionary Access Control: Permission to access an object, like a file, is based on user ID (UID) and group ID (GID). Security Enhanced Linux (SELinux): Objects are assigned security labels. Running as privileged or unprivileged. Linux Capabilities: Give a process some privileges, but not all the privileges of the root user.kubernetes.io/docs/tasks/configure-pod-container/security-context/Registered: Fri Oct 24 09:33:02 UTC 2025 - 539.6K bytes - Viewed (0)