- Sort Score
- Num 10 results
- Language All
- Labels All
Results 511 - 520 of 738 for content_length:[500000 TO 999999] (0.14 seconds)
-
Certificate Management with kubeadm | Kubernetes
FEATURE STATE: Kubernetes v1.15 [stable] Client certificates generated by kubeadm expire after 1 year. This page explains how to manage certificate renewals with kubeadm. It also covers other tasks related to kubeadm certificate management. The Kubernetes project recommends upgrading to the latest patch releases promptly, and to ensure that you are running a supported minor release of Kubernetes. Following this recommendation helps you to stay secure. Before you begin You should be familiar with PKI certificates and requirements in Kubernetes.kubernetes.io/docs/tasks/administer-cluster/kubeadm/kubeadm-certs/Fri Feb 06 07:53:35 GMT 2026 528.4K bytes -
Network Policies | Kubernetes
If you want to control traffic flow at the IP address or port level (OSI layer 3 or 4), NetworkPolicies allow you to specify rules for traffic flow within your cluster, and also between Pods and the outside world. Your cluster must use a network plugin that supports NetworkPolicy enforcement.kubernetes.io/docs/concepts/services-networking/network-policies/Fri Feb 06 07:45:36 GMT 2026 528.7K bytes -
Configure the Aggregation Layer | Kubernetes
Configuring the aggregation layer allows the Kubernetes apiserver to be extended with additional APIs, which are not part of the core Kubernetes APIs. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube or you can use one of these Kubernetes playgrounds:kubernetes.io/docs/tasks/extend-kubernetes/configure-aggregation-layer/Fri Feb 06 08:07:52 GMT 2026 490.6K bytes -
Auditing | Kubernetes
Kubernetes auditing provides a security-relevant, chronological set of records documenting the sequence of actions in a cluster. The cluster audits the activities generated by users, by applications that use the Kubernetes API, and by the control plane itself. Auditing allows cluster administrators to answer the following questions: what happened? when did it happen? who initiated it? on what did it happen? where was it observed? from where was it initiated?kubernetes.io/docs/tasks/debug/debug-cluster/audit/Fri Feb 06 08:07:48 GMT 2026 504.5K bytes -
Encrypting Confidential Data at Rest | Kubernetes
All of the APIs in Kubernetes that let you write persistent API resource data support at-rest encryption. For example, you can enable at-rest encryption for Secrets. This at-rest encryption is additional to any system-level encryption for the etcd cluster or for the filesystem(s) on hosts where you are running the kube-apiserver. This page shows how to enable and configure encryption of API data at rest. Note:This task covers encryption for resource data stored using the Kubernetes API.kubernetes.io/docs/tasks/administer-cluster/encrypt-data/Fri Feb 06 08:02:36 GMT 2026 534.2K bytes -
Volume Snapshots | Kubernetes
In Kubernetes, a VolumeSnapshot represents a snapshot of a volume on a storage system. This document assumes that you are already familiar with Kubernetes persistent volumes. Introduction Similar to how API resources PersistentVolume and PersistentVolumeClaim are used to provision volumes for users and administrators, VolumeSnapshotContent and VolumeSnapshot API resources are provided to create volume snapshots for users and administrators. A VolumeSnapshotContent is a snapshot taken from a volume in the cluster that has been provisioned by an administrator.kubernetes.io/docs/concepts/storage/volume-snapshots/Fri Feb 06 07:47:25 GMT 2026 492.4K bytes -
Operating etcd clusters for Kubernetes | Kubern...
etcd is a consistent and highly-available key value store used as Kubernetes' backing store for all cluster data. If your Kubernetes cluster uses etcd as its backing store, make sure you have a back up plan for the data. You can find in-depth information about etcd in the official documentation. Before you begin Before you follow steps in this page to deploy, manage, back up or restore etcd, you need to understand the typical expectations for operating an etcd cluster.kubernetes.io/docs/tasks/administer-cluster/configure-upgrade-etcd/Fri Feb 06 08:04:20 GMT 2026 501.2K bytes -
Resize CPU and Memory Resources assigned to Con...
FEATURE STATE: Kubernetes v1.35 [stable](enabled by default) This page explains how to change the CPU and memory resource requests and limits assigned to a container without recreating the Pod. Traditionally, changing a Pod's resource requirements necessitated deleting the existing Pod and creating a replacement, often managed by a workload controller. In-place Pod Resize allows changing the CPU/memory allocation of container(s) within a running Pod while potentially avoiding application disruption. The process for resizing Pod resources is covered in Resize CPU and Memory Resources assigned to Pods.kubernetes.io/docs/tasks/configure-pod-container/resize-container-resources/Fri Feb 06 08:03:47 GMT 2026 498.3K bytes -
Using a KMS provider for data encryption | Kube...
This page shows how to configure a Key Management Service (KMS) provider and plugin to enable secret data encryption. In Kubernetes 1.35 there are two versions of KMS at-rest encryption. You should use KMS v2 if feasible because KMS v1 is deprecated (since Kubernetes v1.28) and disabled by default (since Kubernetes v1.29). KMS v2 offers significantly better performance characteristics than KMS v1. Caution:This documentation is for the generally available implementation of KMS v2 (and for the deprecated version 1 implementation).kubernetes.io/docs/tasks/administer-cluster/kms-provider/Fri Feb 06 08:04:30 GMT 2026 502.6K bytes -
Horizontal Pod Autoscaling | Kubernetes
In Kubernetes, a HorizontalPodAutoscaler automatically updates a workload resource (such as a Deployment or StatefulSet), with the aim of automatically scaling capacity to match demand. Horizontal scaling means that the response to increased load is to deploy more Pods. This is different from vertical scaling, which for Kubernetes would mean assigning more resources (for example: memory or CPU) to the Pods that are already running for the workload. If the load decreases, and the number of Pods is above the configured minimum, the HorizontalPodAutoscaler instructs the workload resource (the Deployment, StatefulSet, or other similar resource) to scale back down.kubernetes.io/docs/concepts/workloads/autoscaling/horizontal-pod-autoscale/Fri Feb 06 07:41:50 GMT 2026 522.2K bytes