Search Options

Display Count
Sort
Preferred Language
Label
Advanced Search

Results 71 - 80 of 738 for content_length:[500000 TO 999999] (0.03 seconds)

  1. Configure a kubelet image credential provider |...

    FEATURE STATE: Kubernetes v1.26 [stable] Starting from Kubernetes v1.20, the kubelet can dynamically retrieve credentials for a container image registry using exec plugins. The kubelet and the exec plugin communicate through stdio (stdin, stdout, and stderr) using Kubernetes versioned APIs. These plugins allow the kubelet to request credentials for a container registry dynamically as opposed to storing static credentials on disk. For example, the plugin may talk to a local metadata server to retrieve short-lived credentials for an image that is being pulled by the kubelet.
    kubernetes.io/docs/tasks/administer-cluster/kubelet-credential-provider/
    Fri Feb 06 08:02:21 GMT 2026
      503.1K bytes
  2. Debugging DNS Resolution | Kubernetes

    This page provides hints on diagnosing DNS problems. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube or you can use one of these Kubernetes playgrounds:
    kubernetes.io/docs/tasks/administer-cluster/dns-debugging-resolution/
    Fri Feb 06 08:01:19 GMT 2026
      492K bytes
  3. Assign Pod-level CPU and memory resources | Kub...

    FEATURE STATE: Kubernetes v1.34 [beta](enabled by default) This page shows how to specify CPU and memory resources for a Pod at pod-level in addition to container-level resource specifications. A Kubernetes node allocates resources to a pod based on the pod's resource requests. These requests can be defined at the pod level or individually for containers within the pod. When both are present, the pod-level requests take precedence. Similarly, a pod's resource usage is restricted by limits, which can also be set at the pod-level or individually for containers within the pod.
    kubernetes.io/docs/tasks/configure-pod-container/assign-pod-level-resources/
    Fri Feb 06 08:02:32 GMT 2026
      505.5K bytes
  4. Customizing components with the kubeadm API | K...

    This page covers how to customize the components that kubeadm deploys. For control plane components you can use flags in the ClusterConfiguration structure or patches per-node. For the kubelet and kube-proxy you can use KubeletConfiguration and KubeProxyConfiguration, accordingly. All of these options are possible via the kubeadm configuration API. For more details on each field in the configuration you can navigate to our API reference pages. Note:To reconfigure a cluster that has already been created see Reconfiguring a kubeadm cluster.
    kubernetes.io/docs/setup/production-environment/tools/kubeadm/control-plane-flags/
    Fri Feb 06 07:40:59 GMT 2026
      492.5K bytes
  5. Assigning Pods to Nodes | Kubernetes

    You can constrain a Pod so that it is restricted to run on particular node(s), or to prefer to run on particular nodes. There are several ways to do this and the recommended approaches all use label selectors to facilitate the selection. Often, you do not need to set any such constraints; the scheduler will automatically do a reasonable placement (for example, spreading your Pods across nodes so as not place Pods on a node with insufficient free resources).
    kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/
    Fri Feb 06 07:48:36 GMT 2026
      554.2K bytes
  6. Access Clusters Using the Kubernetes API | Kube...

    This page shows how to access clusters using the Kubernetes API. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube or you can use one of these Kubernetes playgrounds:
    kubernetes.io/docs/tasks/administer-cluster/access-cluster-api/
    Fri Feb 06 07:57:18 GMT 2026
      507.4K bytes
  7. Windows containers in Kubernetes | Kubernetes

    Windows applications constitute a large portion of the services and applications that run in many organizations. Windows containers provide a way to encapsulate processes and package dependencies, making it easier to use DevOps practices and follow cloud native patterns for Windows applications. Organizations with investments in Windows-based applications and Linux-based applications don't have to look for separate orchestrators to manage their workloads, leading to increased operational efficiencies across their deployments, regardless of operating system.
    kubernetes.io/docs/concepts/windows/intro/
    Fri Feb 06 07:57:02 GMT 2026
      496.6K bytes
  8. Cloud Controller Manager Administration | Kuber...

    FEATURE STATE: Kubernetes v1.11 [beta] Since cloud providers develop and release at a different pace compared to the Kubernetes project, abstracting the provider-specific code to the cloud-controller-manager binary allows cloud vendors to evolve independently from the core Kubernetes code. The cloud-controller-manager can be linked to any cloud provider that satisfies cloudprovider.Interface. For backwards compatibility, the cloud-controller-manager provided in the core Kubernetes project uses the same cloud libraries as kube-controller-manager. Cloud providers already supported in Kubernetes core are expected to use the in-tree cloud-controller-manager to transition out of Kubernetes core.
    kubernetes.io/docs/tasks/administer-cluster/running-cloud-controller/
    Fri Feb 06 08:03:22 GMT 2026
      492.8K bytes
  9. Configure a Security Context for a Pod or Conta...

    A security context defines privilege and access control settings for a Pod or Container. Security context settings include, but are not limited to: Discretionary Access Control: Permission to access an object, like a file, is based on user ID (UID) and group ID (GID). Security Enhanced Linux (SELinux): Objects are assigned security labels. Running as privileged or unprivileged. Linux Capabilities: Give a process some privileges, but not all the privileges of the root user.
    kubernetes.io/docs/tasks/configure-pod-container/security-context/
    Fri Feb 06 08:02:42 GMT 2026
      549.3K bytes
  10. Troubleshooting kubeadm | Kubernetes

    As with any program, you might run into an error installing or running kubeadm. This page lists some common failure scenarios and have provided steps that can help you understand and fix the problem. If your problem is not listed below, please follow the following steps: If you think your problem is a bug with kubeadm: Go to github.com/kubernetes/kubeadm and search for existing issues. If no issue exists, please open one and follow the issue template.
    kubernetes.io/docs/setup/production-environment/tools/kubeadm/troubleshooting-kubeadm/
    Fri Feb 06 07:38:47 GMT 2026
      514.6K bytes
Back to Top