- Sort Score
- Result 10 results
- Languages All
- Labels All
Results 341 - 350 of 669 for host:kubernetes.io (0.06 sec)
-
Network Policies | Kubernetes
If you want to control traffic flow at the IP address or port level (OSI layer 3 or 4), NetworkPolicies allow you to specify rules for traffic flow within your cluster, and also between Pods and the outside world. Your cluster must use a network plugin that supports NetworkPolicy enforcement.kubernetes.io/docs/concepts/services-networking/network-policies/Registered: Fri Nov 15 06:28:39 UTC 2024 - 484.7K bytes - Viewed (0) -
Pod Security Standards | Kubernetes
A detailed look at the different policy levels defined in the Pod Security Standards.kubernetes.io/docs/concepts/security/pod-security-standards/Registered: Fri Nov 15 06:35:53 UTC 2024 - 447K bytes - Viewed (0) -
Dynamic Volume Provisioning | Kubernetes
Dynamic volume provisioning allows storage volumes to be created on-demand. Without dynamic provisioning, cluster administrators have to manually make calls to their cloud or storage provider to create new storage volumes, and then create PersistentVolume objects to represent them in Kubernetes. The dynamic provisioning feature eliminates the need for cluster administrators to pre-provision storage. Instead, it automatically provisions storage when users create PersistentVolumeClaim objects. Background The implementation of dynamic volume provisioning is based on the API object StorageClass from the API group storage.kubernetes.io/docs/concepts/storage/dynamic-provisioning/Registered: Fri Nov 15 06:38:01 UTC 2024 - 436.6K bytes - Viewed (0) -
Finalizers | Kubernetes
Finalizers are namespaced keys that tell Kubernetes to wait until specific conditions are met before it fully deletes resources marked for deletion. Finalizers alert controllers to clean up resources the deleted object owned. When you tell Kubernetes to delete an object that has finalizers specified for it, the Kubernetes API marks the object for deletion by populating .metadata.deletionTimestamp, and returns a 202 status code (HTTP "Accepted"). The target object remains in a terminating state while the control plane, or other components, take the actions defined by the finalizers.kubernetes.io/docs/concepts/overview/working-with-objects/finalizers/Registered: Fri Nov 15 06:24:24 UTC 2024 - 434.6K bytes - Viewed (0) -
Cluster Architecture | Kubernetes
The architectural concepts behind Kubernetes.kubernetes.io/docs/concepts/architecture/Registered: Fri Nov 15 06:24:55 UTC 2024 - 443.8K bytes - Viewed (0) -
Workloads | Kubernetes
Understand Pods, the smallest deployable compute object in Kubernetes, and the higher-level abstractions that help you to run them.kubernetes.io/docs/concepts/workloads/Registered: Fri Nov 15 06:24:59 UTC 2024 - 430K bytes - Viewed (0) -
Persistent Volumes | Kubernetes
This document describes persistent volumes in Kubernetes. Familiarity with volumes, StorageClasses and VolumeAttributesClasses is suggested. Introduction Managing storage is a distinct problem from managing compute instances. The PersistentVolume subsystem provides an API for users and administrators that abstracts details of how storage is provided from how it is consumed. To do this, we introduce two new API resources: PersistentVolume and PersistentVolumeClaim. A PersistentVolume (PV) is a piece of storage in the cluster that has been provisioned by an administrator or dynamically provisioned using Storage Classes.kubernetes.io/docs/concepts/storage/persistent-volumes/Registered: Fri Nov 15 06:35:39 UTC 2024 - 534.7K bytes - Viewed (0) -
Security For Windows Nodes | Kubernetes
This page describes security considerations and best practices specific to the Windows operating system. Protection for Secret data on nodes On Windows, data from Secrets are written out in clear text onto the node's local storage (as compared to using tmpfs / in-memory filesystems on Linux). As a cluster operator, you should take both of the following additional measures: Use file ACLs to secure the Secrets' file location. Apply volume-level encryption using BitLocker.kubernetes.io/docs/concepts/security/windows-security/Registered: Fri Nov 15 06:35:01 UTC 2024 - 427.9K bytes - Viewed (0) -
Controlling Access to the Kubernetes API | Kube...
This page provides an overview of controlling access to the Kubernetes API. Users access the Kubernetes API using kubectl, client libraries, or by making REST requests. Both human users and Kubernetes service accounts can be authorized for API access. When a request reaches the API, it goes through several stages, illustrated in the following diagram: Transport security By default, the Kubernetes API server listens on port 6443 on the first non-localhost network interface, protected by TLS.kubernetes.io/docs/concepts/security/controlling-access/Registered: Fri Nov 15 06:34:17 UTC 2024 - 437.3K bytes - Viewed (0) -
Operating etcd clusters for Kubernetes | Kubern...
etcd is a consistent and highly-available key value store used as Kubernetes' backing store for all cluster data. If your Kubernetes cluster uses etcd as its backing store, make sure you have a back up plan for the data. You can find in-depth information about etcd in the official documentation. Before you begin Before you follow steps in this page to deploy, manage, back up or restore etcd, you need to understand the typical expectations for operating an etcd cluster.kubernetes.io/docs/tasks/administer-cluster/configure-upgrade-etcd/Registered: Fri Nov 15 06:46:00 UTC 2024 - 458K bytes - Viewed (0)