- Sort Score
- Result 10 results
- Languages All
- Labels All
Results 381 - 390 of 685 for host:kubernetes.io (0.03 sec)
-
Secrets | Kubernetes
A Secret is an object that contains a small amount of sensitive data such as a password, a token, or a key. Such information might otherwise be put in a Pod specification or in a container image. Using a Secret means that you don't need to include confidential data in your application code. Because Secrets can be created independently of the Pods that use them, there is less risk of the Secret (and its data) being exposed during the workflow of creating, viewing, and editing Pods.kubernetes.io/docs/concepts/configuration/secret/Registered: Wed Apr 16 05:53:29 UTC 2025 - 508.3K bytes - Viewed (0) -
Recommended Labels | Kubernetes
You can visualize and manage Kubernetes objects with more tools than kubectl and the dashboard. A common set of labels allows tools to work interoperably, describing objects in a common manner that all tools can understand. In addition to supporting tooling, the recommended labels describe applications in a way that can be queried. The metadata is organized around the concept of an application. Kubernetes is not a platform as a service (PaaS) and doesn't have or enforce a formal notion of an application.kubernetes.io/docs/concepts/overview/working-with-objects/common-labels/Registered: Wed Apr 16 05:52:57 UTC 2025 - 453.4K bytes - Viewed (0) -
Policies | Kubernetes
Manage security and best-practices with policies.kubernetes.io/docs/concepts/policy/Registered: Wed Apr 16 05:57:13 UTC 2025 - 437.7K bytes - Viewed (0) -
Configuration | Kubernetes
Resources that Kubernetes provides for configuring Pods.kubernetes.io/docs/concepts/configuration/Registered: Wed Apr 16 05:55:59 UTC 2025 - 432.7K bytes - Viewed (0) -
Organizing Cluster Access Using kubeconfig File...
Use kubeconfig files to organize information about clusters, users, namespaces, and authentication mechanisms. The kubectl command-line tool uses kubeconfig files to find the information it needs to choose a cluster and communicate with the API server of a cluster. Note:A file that is used to configure access to clusters is called a kubeconfig file. This is a generic way of referring to configuration files. It does not mean that there is a file named kubeconfig.kubernetes.io/docs/concepts/configuration/organize-cluster-access-kubeconfig/Registered: Wed Apr 16 05:56:13 UTC 2025 - 444.3K bytes - Viewed (0) -
Kubelet Configuration (v1beta1) | Kubernetes
Resource Types CredentialProviderConfig KubeletConfiguration SerializedNodeConfigSource FormatOptions Appears in: LoggingConfiguration FormatOptions contains options for the different logging formats. FieldDescription text [Required] TextOptions [Alpha] Text contains options for logging format "text". Only available when the LoggingAlphaOptions feature gate is enabled. json [Required] JSONOptions [Alpha] JSON contains options for logging format "json". Only available when the LoggingAlphaOptions feature gate is enabled. JSONOptions Appears in: FormatOptions JSONOptions contains options for logging format "json". FieldDescription OutputRoutingOptions [Required] OutputRoutingOptions (Members of OutputRoutingOptions are embedded into this type.kubernetes.io/docs/reference/config-api/kubelet-config.v1beta1/Registered: Wed Apr 16 06:50:26 UTC 2025 - 498.5K bytes - Viewed (0) -
Authenticating with Bootstrap Tokens | Kubernetes
FEATURE STATE: Kubernetes v1.18 [stable] Bootstrap tokens are a simple bearer token that is meant to be used when creating new clusters or joining new nodes to an existing cluster. It was built to support kubeadm, but can be used in other contexts for users that wish to start clusters without kubeadm. It is also built to work, via RBAC policy, with the kubelet TLS Bootstrapping system. Bootstrap Tokens Overview Bootstrap Tokens are defined with a specific type (bootstrap.kubernetes.io/docs/reference/access-authn-authz/bootstrap-tokens/Registered: Wed Apr 16 06:25:50 UTC 2025 - 447.3K bytes - Viewed (0) -
Apply Pod Security Standards at the Namespace L...
Note This tutorial applies only for new clusters. Pod Security Admission is an admission controller that applies Pod Security Standards when pods are created. It is a feature GA'ed in v1.25. In this tutorial, you will enforce the baseline Pod Security Standard, one namespace at a time. You can also apply Pod Security Standards to multiple namespaces at once at the cluster level. For instructions, refer to Apply Pod Security Standards at the cluster level.kubernetes.io/docs/tutorials/security/ns-level-pss/Registered: Wed Apr 16 06:25:31 UTC 2025 - 441.8K bytes - Viewed (0) -
Common Expression Language in Kubernetes | Kube...
The Common Expression Language (CEL) is used in the Kubernetes API to declare validation rules, policy rules, and other constraints or conditions. CEL expressions are evaluated directly in the API server, making CEL a convenient alternative to out-of-process mechanisms, such as webhooks, for many extensibility use cases. Your CEL expressions continue to execute so long as the control plane's API server component remains available. Language overview The CEL language has a straightforward syntax that is similar to the expressions in C, C++, Java, JavaScript and Go.kubernetes.io/docs/reference/using-api/cel/Registered: Wed Apr 16 06:25:12 UTC 2025 - 461.4K bytes - Viewed (0) -
Connecting Applications with Services | Kubernetes
The Kubernetes model for connecting containers Now that you have a continuously running, replicated application you can expose it on a network. Kubernetes assumes that pods can communicate with other pods, regardless of which host they land on. Kubernetes gives every pod its own cluster-private IP address, so you do not need to explicitly create links between pods or map container ports to host ports. This means that containers within a Pod can all reach each other's ports on localhost, and all pods in a cluster can see each other without NAT.kubernetes.io/docs/tutorials/services/connect-applications-service/Registered: Wed Apr 16 06:26:17 UTC 2025 - 493.7K bytes - Viewed (0)