- Sort Score
- Result 10 results
- Languages All
- Labels All
Results 501 - 510 of 685 for host:kubernetes.io (0.09 sec)
-
Configure Default CPU Requests and Limits for a...
Define a default CPU resource limits for a namespace, so that every new Pod in that namespace has a CPU resource limit configured.kubernetes.io/docs/tasks/administer-cluster/manage-resources/cpu-default-namespace/Registered: Wed Apr 16 06:03:32 UTC 2025 - 454.7K bytes - Viewed (0) -
Configuring a cgroup driver | Kubernetes
This page explains how to configure the kubelet's cgroup driver to match the container runtime cgroup driver for kubeadm clusters. Before you begin You should be familiar with the Kubernetes container runtime requirements. Configuring the container runtime cgroup driver The Container runtimes page explains that the systemd driver is recommended for kubeadm based setups instead of the kubelet's default cgroupfs driver, because kubeadm manages the kubelet as a systemd service.kubernetes.io/docs/tasks/administer-cluster/kubeadm/configure-cgroup-driver/Registered: Wed Apr 16 06:03:37 UTC 2025 - 440.8K bytes - Viewed (0) -
Node Shutdowns | Kubernetes
In a Kubernetes cluster, a node can be shut down in a planned graceful way or unexpectedly because of reasons such as a power outage or something else external. A node shutdown could lead to workload failure if the node is not drained before the shutdown. A node shutdown can be either graceful or non-graceful. Graceful node shutdown FEATURE STATE: Kubernetes v1.21 [beta] (enabled by default: true) The kubelet attempts to detect node system shutdown and terminates pods running on the node.kubernetes.io/docs/concepts/cluster-administration/node-shutdown/Registered: Wed Apr 16 06:02:42 UTC 2025 - 451.3K bytes - Viewed (0) -
Node metrics data | Kubernetes
Mechanisms for accessing metrics at node, volume, pod and container level, as seen by the kubelet.kubernetes.io/docs/reference/instrumentation/node-metrics/Registered: Wed Apr 16 06:29:27 UTC 2025 - 433.7K bytes - Viewed (0) -
Seccomp and Kubernetes | Kubernetes
Seccomp stands for secure computing mode and has been a feature of the Linux kernel since version 2.6.12. It can be used to sandbox the privileges of a process, restricting the calls it is able to make from userspace into the kernel. Kubernetes lets you automatically apply seccomp profiles loaded onto a node to your Pods and containers. Seccomp fields FEATURE STATE: Kubernetes v1.19 [stable] There are four ways to specify a seccomp profile for a pod:kubernetes.io/docs/reference/node/seccomp/Registered: Wed Apr 16 06:29:36 UTC 2025 - 447.9K bytes - Viewed (0) -
kubectl cluster-info dump | Kubernetes
Synopsis Dump cluster information out suitable for debugging and diagnosing cluster problems. By default, dumps everything to stdout. You can optionally specify a directory with --output-directory. If you specify a directory, Kubernetes will build a set of files in that directory. By default, only dumps things in the current namespace and 'kube-system' namespace, but you can switch to a different namespace with the --namespaces flag, or specify --all-namespaces to dump all namespaces.kubernetes.io/docs/reference/kubectl/generated/kubectl_cluster-info/kubectl_cluster-info_dump/Registered: Wed Apr 16 06:29:22 UTC 2025 - 443K bytes - Viewed (0) -
kubectl config set-context | Kubernetes
Synopsis Set a context entry in kubeconfig. Specifying a name that already exists will merge new fields on top of existing values for those fields. kubectl config set-context [NAME | --current] [--cluster=cluster_nickname] [--user=user_nickname] [--namespace=namespace] Examples # Set the user field on the gce context entry without touching other values kubectl config set-context gce --user=cluster-admin Options --cluster string cluster for the context entry in kubeconfig --current Modify the current contextkubernetes.io/docs/reference/kubectl/generated/kubectl_config/kubectl_config_set-context/Registered: Wed Apr 16 06:28:37 UTC 2025 - 440.4K bytes - Viewed (0) -
kubectl config set-credentials | Kubernetes
Synopsis Set a user entry in kubeconfig. Specifying a name that already exists will merge new fields on top of existing values. Client-certificate flags: --client-certificate=certfile --client-key=keyfile Bearer token flags: --token=bearer_token Basic auth flags: --username=basic_user --password=basic_password Bearer token and basic auth are mutually exclusive. kubectl config set-credentials NAME [--client-certificate=path/to/certfile] [--client-key=path/to/keyfile] [--token=bearer_token] [--username=basic_user] [--password=basic_password] [--auth-provider=provider_name] [--auth-provider-arg=key=value] [--exec-command=exec_command] [--exec-api-version=exec_api_version] [--exec-arg=arg] [--exec-env=key=value] Examples # Set only the "client-key" field on the "cluster-admin" # entry, without touching other values kubectl config set-credentials cluster-admin --client-key=~/.kubernetes.io/docs/reference/kubectl/generated/kubectl_config/kubectl_config_set-credentials/Registered: Wed Apr 16 06:32:03 UTC 2025 - 446.1K bytes - Viewed (0) -
Kubelet Device Manager API Versions | Kubernetes
This page provides details of version compatibility between the Kubernetes device plugin API, and different versions of Kubernetes itself. Compatibility matrix v1alpha1 v1beta1 Kubernetes 1.21 - ✓ Kubernetes 1.22 - ✓ Kubernetes 1.23 - ✓ Kubernetes 1.24 - ✓ Kubernetes 1.25 - ✓ Kubernetes 1.26 - ✓ Key: ✓ Exactly the same features / API objects in both device plugin API and the Kubernetes version. + The device plugin API has features or API objects that may not be present in the Kubernetes cluster, either because the device plugin API has added additional new API calls, or that the server has removed an old API call.kubernetes.io/docs/reference/node/device-plugin-api-versions/Registered: Wed Apr 16 06:32:39 UTC 2025 - 434.3K bytes - Viewed (0) -
kubectl label | Kubernetes
Production-Grade Container Orchestrationkubernetes.io/docs/reference/kubectl/generated/kubectl_label/Registered: Wed Apr 16 06:41:36 UTC 2025 - 444.2K bytes - Viewed (0)