Search Options

Results per page
Sort
Preferred Languages
Labels
Advance

Results 431 - 440 of 685 for host:kubernetes.io (0.02 sec)

  1. Event Rate Limit Configuration (v1alpha1) | Kub...

    Resource Types Configuration Configuration Configuration provides configuration for the EventRateLimit admission controller. FieldDescription apiVersionstringeventratelimit.admission.k8s.io/v1alpha1 kindstringConfiguration limits [Required] []Limit limits are the limits to place on event queries received. Limits can be placed on events received server-wide, per namespace, per user, and per source+object. At least one limit is required. Limit Appears in: Configuration Limit is the configuration for a particular limit type FieldDescription type [Required] LimitType type is the type of limit to which this configuration applies
    kubernetes.io/docs/reference/config-api/apiserver-eventratelimit.v1alpha1/
    Registered: Wed Apr 16 06:48:51 UTC 2025
    - 435.8K bytes
    - Viewed (0)
  2. TLS bootstrapping | Kubernetes

    In a Kubernetes cluster, the components on the worker nodes - kubelet and kube-proxy - need to communicate with Kubernetes control plane components, specifically kube-apiserver. In order to ensure that communication is kept private, not interfered with, and ensure that each component of the cluster is talking to another trusted component, we strongly recommend using client TLS certificates on nodes. The normal process of bootstrapping these components, especially worker nodes that need certificates so they can communicate safely with kube-apiserver, can be a challenging process as it is often outside of the scope of Kubernetes and requires significant additional work.
    kubernetes.io/docs/reference/access-authn-authz/kubelet-tls-bootstrapping/
    Registered: Wed Apr 16 06:23:11 UTC 2025
    - 470.6K bytes
    - Viewed (0)
  3. Client Libraries | Kubernetes

    This page contains an overview of the client libraries for using the Kubernetes API from various programming languages. To write applications using the Kubernetes REST API, you do not need to implement the API calls and request/response types yourself. You can use a client library for the programming language you are using. Client libraries often handle common tasks such as authentication for you. Most client libraries can discover and use the Kubernetes Service Account to authenticate if the API client is running inside the Kubernetes cluster, or can understand the kubeconfig file format to read the credentials and the API Server address.
    kubernetes.io/docs/reference/using-api/client-libraries/
    Registered: Wed Apr 16 06:24:37 UTC 2025
    - 441.5K bytes
    - Viewed (0)
  4. Using RBAC Authorization | Kubernetes

    Role-based access control (RBAC) is a method of regulating access to computer or network resources based on the roles of individual users within your organization. RBAC authorization uses the rbac.authorization.k8s.io API group to drive authorization decisions, allowing you to dynamically configure policies through the Kubernetes API. To enable RBAC, start the API server with the --authorization-config flag set to a file that includes the RBAC authorizer; for example: apiVersion: apiserver.
    kubernetes.io/docs/reference/access-authn-authz/rbac/
    Registered: Wed Apr 16 06:24:41 UTC 2025
    - 562.7K bytes
    - Viewed (0)
  5. Handling retriable and non-retriable pod failur...

    FEATURE STATE: Kubernetes v1.31 [stable] (enabled by default: true) This document shows you how to use the Pod failure policy, in combination with the default Pod backoff failure policy, to improve the control over the handling of container- or Pod-level failure within a Job. The definition of Pod failure policy may help you to: better utilize the computational resources by avoiding unnecessary Pod retries. avoid Job failures due to Pod disruptions (such preemption, API-initiated eviction or taint-based eviction).
    kubernetes.io/docs/tasks/job/pod-failure-policy/
    Registered: Wed Apr 16 06:22:23 UTC 2025
    - 465.2K bytes
    - Viewed (0)
  6. Webhook Mode | Kubernetes

    A WebHook is an HTTP callback: an HTTP POST that occurs when something happens; a simple event-notification via HTTP POST. A web application implementing WebHooks will POST a message to a URL when certain things happen. When specified, mode Webhook causes Kubernetes to query an outside REST service when determining user privileges. Configuration File Format Mode Webhook requires a file for HTTP configuration, specify by the --authorization-webhook-config-file=SOME_FILENAME flag. The configuration file uses the kubeconfig file format.
    kubernetes.io/docs/reference/access-authn-authz/webhook/
    Registered: Wed Apr 16 06:23:55 UTC 2025
    - 452.5K bytes
    - Viewed (0)
  7. Mapping PodSecurityPolicies to Pod Security Sta...

    The tables below enumerate the configuration parameters on PodSecurityPolicy objects, whether the field mutates and/or validates pods, and how the configuration values map to the Pod Security Standards. For each applicable parameter, the allowed values for the Baseline and Restricted profiles are listed. Anything outside the allowed values for those profiles would fall under the Privileged profile. "No opinion" means all values are allowed under all Pod Security Standards.
    kubernetes.io/docs/reference/access-authn-authz/psp-to-pod-security-standards/
    Registered: Wed Apr 16 06:24:56 UTC 2025
    - 440.1K bytes
    - Viewed (0)
  8. kubectl cluster-info | Kubernetes

    Production-Grade Container Orchestration
    kubernetes.io/docs/reference/kubectl/generated/kubectl_cluster-info/
    Registered: Wed Apr 16 06:30:41 UTC 2025
    - 439.5K bytes
    - Viewed (0)
  9. kubectl reference | Kubernetes

    Production-Grade Container Orchestration
    kubernetes.io/docs/reference/kubectl/generated/
    Registered: Wed Apr 16 06:30:32 UTC 2025
    - 434.9K bytes
    - Viewed (0)
  10. kubectl Quick Reference | Kubernetes

    This page contains a list of commonly used kubectl commands and flags. Note:These instructions are for Kubernetes v1.32. To check the version, use the kubectl version command. Kubectl autocomplete BASH source <(kubectl completion bash) # set up autocomplete in bash into the current shell, bash-completion package should be installed first. echo "source <(kubectl completion bash)" >> ~/.bashrc # add autocomplete permanently to your bash shell. You can also use a shorthand alias for kubectl that also works with completion:
    kubernetes.io/docs/reference/kubectl/quick-reference/
    Registered: Wed Apr 16 06:30:13 UTC 2025
    - 493.6K bytes
    - Viewed (0)
Back to top