Search Options

Results per page
Sort
Preferred Languages
Labels
Advance

Results 491 - 500 of 686 for host:kubernetes.io (0.07 sec)

  1. Using RBAC Authorization | Kubernetes

    Role-based access control (RBAC) is a method of regulating access to computer or network resources based on the roles of individual users within your organization. RBAC authorization uses the rbac.authorization.k8s.io API group to drive authorization decisions, allowing you to dynamically configure policies through the Kubernetes API. To enable RBAC, start the API server with the --authorization-config flag set to a file that includes the RBAC authorizer; for example: apiVersion: apiserver.
    kubernetes.io/docs/reference/access-authn-authz/rbac/
    Registered: Wed Jun 04 07:15:13 UTC 2025
    - 576.1K bytes
    - Viewed (0)
  2. TLS bootstrapping | Kubernetes

    In a Kubernetes cluster, the components on the worker nodes - kubelet and kube-proxy - need to communicate with Kubernetes control plane components, specifically kube-apiserver. In order to ensure that communication is kept private, not interfered with, and ensure that each component of the cluster is talking to another trusted component, we strongly recommend using client TLS certificates on nodes. The normal process of bootstrapping these components, especially worker nodes that need certificates so they can communicate safely with kube-apiserver, can be a challenging process as it is often outside of the scope of Kubernetes and requires significant additional work.
    kubernetes.io/docs/reference/access-authn-authz/kubelet-tls-bootstrapping/
    Registered: Wed Jun 04 07:14:48 UTC 2025
    - 484K bytes
    - Viewed (0)
  3. Authenticating with Bootstrap Tokens | Kubernetes

    FEATURE STATE: Kubernetes v1.18 [stable] Bootstrap tokens are a simple bearer token that is meant to be used when creating new clusters or joining new nodes to an existing cluster. It was built to support kubeadm, but can be used in other contexts for users that wish to start clusters without kubeadm. It is also built to work, via RBAC policy, with the kubelet TLS Bootstrapping system. Bootstrap Tokens Overview Bootstrap Tokens are defined with a specific type (bootstrap.
    kubernetes.io/docs/reference/access-authn-authz/bootstrap-tokens/
    Registered: Wed Jun 04 07:15:23 UTC 2025
    - 460.7K bytes
    - Viewed (0)
  4. Configure Access to Multiple Clusters | Kubernetes

    This page shows how to configure access to multiple clusters by using configuration files. After your clusters, users, and contexts are defined in one or more configuration files, you can quickly switch between clusters by using the kubectl config use-context command. Note:A file that is used to configure access to a cluster is sometimes called a kubeconfig file. This is a generic way of referring to configuration files. It does not mean that there is a file named kubeconfig.
    kubernetes.io/docs/tasks/access-application-cluster/configure-access-multiple-clusters/
    Registered: Wed Jun 04 07:01:00 UTC 2025
    - 489K bytes
    - Viewed (0)
  5. Use a User Namespace With a Pod | Kubernetes

    FEATURE STATE: Kubernetes v1.33 [beta] (enabled by default: true) This page shows how to configure a user namespace for pods. This allows you to isolate the user running inside the container from the one in the host. A process running as root in a container can run as a different (non-root) user in the host; in other words, the process has full privileges for operations inside the user namespace, but is unprivileged for operations outside the namespace.
    kubernetes.io/docs/tasks/configure-pod-container/user-namespaces/
    Registered: Wed Jun 04 07:00:35 UTC 2025
    - 456.6K bytes
    - Viewed (0)
  6. Connecting Applications with Services | Kubernetes

    The Kubernetes model for connecting containers Now that you have a continuously running, replicated application you can expose it on a network. Kubernetes assumes that pods can communicate with other pods, regardless of which host they land on. Kubernetes gives every pod its own cluster-private IP address, so you do not need to explicitly create links between pods or map container ports to host ports. This means that containers within a Pod can all reach each other's ports on localhost, and all pods in a cluster can see each other without NAT.
    kubernetes.io/docs/tutorials/services/connect-applications-service/
    Registered: Wed Jun 04 07:08:23 UTC 2025
    - 507K bytes
    - Viewed (0)
  7. Declarative API Validation | Kubernetes

    FEATURE STATE: Kubernetes v1.33 [beta] Kubernetes 1.33 includes optional declarative validation for APIs. When enabled, the Kubernetes API server can use this mechanism rather than the legacy approach that relies on hand-written Go code (validation.go files) to ensure that requests against the API are valid. Kubernetes developers, and people extending the Kubernetes API, can define validation rules directly alongside the API type definitions (types.go files). Code authors define pecial comment tags (e.
    kubernetes.io/docs/reference/using-api/declarative-validation/
    Registered: Wed Jun 04 07:13:14 UTC 2025
    - 450.8K bytes
    - Viewed (0)
  8. Webhook Mode | Kubernetes

    A WebHook is an HTTP callback: an HTTP POST that occurs when something happens; a simple event-notification via HTTP POST. A web application implementing WebHooks will POST a message to a URL when certain things happen. When specified, mode Webhook causes Kubernetes to query an outside REST service when determining user privileges. Configuration File Format Mode Webhook requires a file for HTTP configuration, specify by the --authorization-webhook-config-file=SOME_FILENAME flag. The configuration file uses the kubeconfig file format.
    kubernetes.io/docs/reference/access-authn-authz/webhook/
    Registered: Wed Jun 04 07:13:20 UTC 2025
    - 465.9K bytes
    - Viewed (0)
  9. Update Your App | Kubernetes

    Production-Grade Container Orchestration
    kubernetes.io/docs/tutorials/kubernetes-basics/update/
    Registered: Wed Jun 04 07:12:12 UTC 2025
    - 445.8K bytes
    - Viewed (0)
  10. Admission Control in Kubernetes | Kubernetes

    This page provides an overview of admission controllers. An admission controller is a piece of code that intercepts requests to the Kubernetes API server prior to persistence of the resource, but after the request is authenticated and authorized. Several important features of Kubernetes require an admission controller to be enabled in order to properly support the feature. As a result, a Kubernetes API server that is not properly configured with the right set of admission controllers is an incomplete server that will not support all the features you expect.
    kubernetes.io/docs/reference/access-authn-authz/admission-controllers/
    Registered: Wed Jun 04 07:13:43 UTC 2025
    - 512.2K bytes
    - Viewed (0)
Back to top