- Sort Score
- Result 10 results
- Languages All
- Labels All
Results 331 - 340 of 670 for host:kubernetes.io (0.04 sec)
-
Fine Parallel Processing Using a Work Queue | K...
In this example, you will run a Kubernetes Job that runs multiple parallel tasks as worker processes, each running as a separate Pod. In this example, as each pod is created, it picks up one unit of work from a task queue, processes it, and repeats until the end of the queue is reached. Here is an overview of the steps in this example: Start a storage service to hold the work queue.kubernetes.io/docs/tasks/job/fine-parallel-processing-work-queue/Registered: Tue Nov 26 04:54:48 UTC 2024 - 445.2K bytes - Viewed (0) -
Set up Konnectivity service | Kubernetes
The Konnectivity service provides a TCP level proxy for the control plane to cluster communication. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube.kubernetes.io/docs/tasks/extend-kubernetes/setup-konnectivity/Registered: Tue Nov 26 04:53:48 UTC 2024 - 468K bytes - Viewed (0) -
Authenticating with Bootstrap Tokens | Kubernetes
FEATURE STATE: Kubernetes v1.18 [stable] Bootstrap tokens are a simple bearer token that is meant to be used when creating new clusters or joining new nodes to an existing cluster. It was built to support kubeadm, but can be used in other contexts for users that wish to start clusters without kubeadm. It is also built to work, via RBAC policy, with the kubelet TLS Bootstrapping system. Bootstrap Tokens Overview Bootstrap Tokens are defined with a specific type (bootstrap.kubernetes.io/docs/reference/access-authn-authz/bootstrap-tokens/Registered: Tue Nov 26 05:05:40 UTC 2024 - 438K bytes - Viewed (0) -
Mapping PodSecurityPolicies to Pod Security Sta...
The tables below enumerate the configuration parameters on PodSecurityPolicy objects, whether the field mutates and/or validates pods, and how the configuration values map to the Pod Security Standards. For each applicable parameter, the allowed values for the Baseline and Restricted profiles are listed. Anything outside the allowed values for those profiles would fall under the Privileged profile. "No opinion" means all values are allowed under all Pod Security Standards.kubernetes.io/docs/reference/access-authn-authz/psp-to-pod-security-standards/Registered: Tue Nov 26 05:06:12 UTC 2024 - 430.9K bytes - Viewed (0) -
Client Libraries | Kubernetes
This page contains an overview of the client libraries for using the Kubernetes API from various programming languages. To write applications using the Kubernetes REST API, you do not need to implement the API calls and request/response types yourself. You can use a client library for the programming language you are using. Client libraries often handle common tasks such as authentication for you. Most client libraries can discover and use the Kubernetes Service Account to authenticate if the API client is running inside the Kubernetes cluster, or can understand the kubeconfig file format to read the credentials and the API Server address.kubernetes.io/docs/reference/using-api/client-libraries/Registered: Tue Nov 26 05:05:26 UTC 2024 - 432.4K bytes - Viewed (0) -
kubeadm upgrade phase | Kubernetes
In v1.15.0, kubeadm introduced preliminary support for kubeadm upgrade node phases. Phases for other kubeadm upgrade sub-commands such as apply, could be added in the following releases. kubeadm upgrade node phase Using this phase you can choose to execute the separate steps of the upgrade of secondary control-plane or worker nodes. Please note that kubeadm upgrade apply still has to be called on a primary control-plane node. phase preflight control-plane kubelet-config Use this command to invoke single phase of the node workflowkubernetes.io/docs/reference/setup-tools/kubeadm/kubeadm-upgrade-phase/Registered: Tue Nov 26 05:06:52 UTC 2024 - 432.5K bytes - Viewed (0) -
TLS | Kubernetes
Understand how to protect traffic within your cluster using Transport Layer Security (TLS).kubernetes.io/docs/tasks/tls/Registered: Tue Nov 26 04:55:51 UTC 2024 - 420.9K bytes - Viewed (0) -
HorizontalPodAutoscaler Walkthrough | Kubernetes
A HorizontalPodAutoscaler (HPA for short) automatically updates a workload resource (such as a Deployment or StatefulSet), with the aim of automatically scaling the workload to match demand. Horizontal scaling means that the response to increased load is to deploy more Pods. This is different from vertical scaling, which for Kubernetes would mean assigning more resources (for example: memory or CPU) to the Pods that are already running for the workload.kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale-walkthrough/Registered: Tue Nov 26 04:56:14 UTC 2024 - 483.8K bytes - Viewed (0) -
TLS bootstrapping | Kubernetes
In a Kubernetes cluster, the components on the worker nodes - kubelet and kube-proxy - need to communicate with Kubernetes control plane components, specifically kube-apiserver. In order to ensure that communication is kept private, not interfered with, and ensure that each component of the cluster is talking to another trusted component, we strongly recommend using client TLS certificates on nodes. The normal process of bootstrapping these components, especially worker nodes that need certificates so they can communicate safely with kube-apiserver, can be a challenging process as it is often outside of the scope of Kubernetes and requires significant additional work.kubernetes.io/docs/reference/access-authn-authz/kubelet-tls-bootstrapping/Registered: Tue Nov 26 05:02:38 UTC 2024 - 461.8K bytes - Viewed (0) -
Admission Controllers Reference | Kubernetes
This page provides an overview of Admission Controllers. What are they? An admission controller is a piece of code that intercepts requests to the Kubernetes API server prior to persistence of the object, but after the request is authenticated and authorized. Admission controllers may be validating, mutating, or both. Mutating controllers may modify objects related to the requests they admit; validating controllers may not. Admission controllers limit requests to create, delete, modify objects.kubernetes.io/docs/reference/access-authn-authz/admission-controllers/Registered: Tue Nov 26 05:02:45 UTC 2024 - 486.3K bytes - Viewed (0)