Search Options

Results per page
Sort
Preferred Languages
Labels
Advance

Results 591 - 600 of 702 for host:kubernetes.io (0.03 sec)

  1. Projected Volumes | Kubernetes

    This document describes projected volumes in Kubernetes. Familiarity with volumes is suggested. Introduction A projected volume maps several existing volume sources into the same directory. Currently, the following types of volume sources can be projected: secret downwardAPI configMap serviceAccountToken clusterTrustBundle podCertificate All sources are required to be in the same namespace as the Pod. For more details, see the all-in-one volume design document. Example configuration with a secret, a downwardAPI, and a configMap pods/storage/projected-secret-downwardapi-configmap.
    kubernetes.io/docs/concepts/storage/projected-volumes/
    Registered: Fri Oct 24 08:57:49 UTC 2025
    - 506.1K bytes
    - Viewed (0)
  2. Taints and Tolerations | Kubernetes

    Node affinity is a property of Pods that attracts them to a set of nodes (either as a preference or a hard requirement). Taints are the opposite -- they allow a node to repel a set of pods. Tolerations are applied to pods. Tolerations allow the scheduler to schedule pods with matching taints. Tolerations allow scheduling but don't guarantee scheduling: the scheduler also evaluates other parameters as part of its function.
    kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/
    Registered: Fri Oct 24 09:08:54 UTC 2025
    - 489.6K bytes
    - Viewed (0)
  3. Pod Security Policies | Kubernetes

    Removed feature PodSecurityPolicy was deprecated in Kubernetes v1.21, and removed from Kubernetes in v1.25. Instead of using PodSecurityPolicy, you can enforce similar restrictions on Pods using either or both: Pod Security Admission a 3rd party admission plugin, that you deploy and configure yourself For a migration guide, see Migrate from PodSecurityPolicy to the Built-In PodSecurity Admission Controller. For more information on the removal of this API, see PodSecurityPolicy Deprecation: Past, Present, and Future.
    kubernetes.io/docs/concepts/security/pod-security-policy/
    Registered: Fri Oct 24 09:09:20 UTC 2025
    - 460.1K bytes
    - Viewed (0)
  4. Kubernetes API Server Bypass Risks | Kubernetes

    Security architecture information relating to the API server and other components
    kubernetes.io/docs/concepts/security/api-server-bypass-risks/
    Registered: Fri Oct 24 09:06:51 UTC 2025
    - 466.5K bytes
    - Viewed (0)
  5. Resource Quotas | Kubernetes

    When several users or teams share a cluster with a fixed number of nodes, there is a concern that one team could use more than its fair share of resources. Resource quotas are a tool for administrators to address this concern. A resource quota, defined by a ResourceQuota object, provides constraints that limit aggregate resource consumption per namespace. A ResourceQuota can also limit the quantity of objects that can be created in a namespace by API kind, as well as the total amount of infrastructure resources that may be consumed by API objects found in that namespace.
    kubernetes.io/docs/concepts/policy/resource-quotas/
    Registered: Fri Oct 24 09:07:15 UTC 2025
    - 548K bytes
    - Viewed (0)
  6. Secrets | Kubernetes

    A Secret is an object that contains a small amount of sensitive data such as a password, a token, or a key. Such information might otherwise be put in a Pod specification or in a container image. Using a Secret means that you don't need to include confidential data in your application code. Because Secrets can be created independently of the Pods that use them, there is less risk of the Secret (and its data) being exposed during the workflow of creating, viewing, and editing Pods.
    kubernetes.io/docs/concepts/configuration/secret/
    Registered: Fri Oct 24 09:07:46 UTC 2025
    - 531.8K bytes
    - Viewed (0)
  7. Organizing Cluster Access Using kubeconfig File...

    Use kubeconfig files to organize information about clusters, users, namespaces, and authentication mechanisms. The kubectl command-line tool uses kubeconfig files to find the information it needs to choose a cluster and communicate with the API server of a cluster. Note:A file that is used to configure access to clusters is called a kubeconfig file. This is a generic way of referring to configuration files. It does not mean that there is a file named kubeconfig.
    kubernetes.io/docs/concepts/configuration/organize-cluster-access-kubeconfig/
    Registered: Fri Oct 24 09:07:28 UTC 2025
    - 470.5K bytes
    - Viewed (0)
  8. Pod Hostname | Kubernetes

    This page explains how to set a Pod's hostname, potential side effects after configuration, and the underlying mechanics. Default Pod hostname When a Pod is created, its hostname (as observed from within the Pod) is derived from the Pod's metadata.name value. Both the hostname and its corresponding fully qualified domain name (FQDN) are set to the metadata.name value (from the Pod's perspective) apiVersion: v1 kind: Pod metadata: name: busybox-1 spec: containers: - image: busybox:1.
    kubernetes.io/docs/concepts/workloads/pods/pod-hostname/
    Registered: Fri Oct 24 09:03:30 UTC 2025
    - 468.6K bytes
    - Viewed (0)
  9. Cloud Controller Manager | Kubernetes

    FEATURE STATE: Kubernetes v1.11 [beta] Cloud infrastructure technologies let you run Kubernetes on public, private, and hybrid clouds. Kubernetes believes in automated, API-driven infrastructure without tight coupling between components. The cloud-controller-manager is a Kubernetes control plane component that embeds cloud-specific control logic. The cloud controller manager lets you link your cluster into your cloud provider's API, and separates out the components that interact with that cloud platform from components that only interact with your cluster.
    kubernetes.io/docs/concepts/architecture/cloud-controller/
    Registered: Fri Oct 24 09:02:25 UTC 2025
    - 477.4K bytes
    - Viewed (0)
  10. Policies | Kubernetes

    Manage security and best-practices with policies.
    kubernetes.io/docs/concepts/policy/
    Registered: Fri Oct 24 09:10:34 UTC 2025
    - 464.2K bytes
    - Viewed (0)
Back to top