content large_stringlengths 3 20.5k | url large_stringlengths 54 193 | branch large_stringclasses 4
values | source large_stringclasses 42
values | embeddings listlengths 384 384 | score float64 -0.21 0.65 |
|---|---|---|---|---|---|
point out any required changes. Once the Markdown and other content (such as images) look right, you provide a formal [review](#pull-request-review). {{% /tab %}} {{< /tabs >}} ## Pull request review Follow the [blog](/docs/contribute/review/reviewing-prs/#blog) section of \_Reviewing pull requests\_. When you think th... | https://github.com/kubernetes/website/blob/main//content/en/docs/contribute/blog/buddying.md | main | kubernetes | [
-0.010351738892495632,
-0.0023609742056578398,
0.026423480361700058,
0.04839671030640602,
0.07564367353916168,
0.037674255669116974,
0.019260160624980927,
0.014492029324173927,
0.04174397513270378,
0.08938279002904892,
-0.02725686877965927,
0.027486003935337067,
-0.0061302692629396915,
0.0... | 0.053299 |
There are two official Kubernetes blogs, and the CNCF has its own blog where you can cover Kubernetes too. For the main Kubernetes blog, we (the Kubernetes project) like to publish articles with different perspectives and special focuses, that have a link to Kubernetes. Some articles appear on both blogs: there is a pr... | https://github.com/kubernetes/website/blob/main//content/en/docs/contribute/blog/mirroring.md | main | kubernetes | [
0.007403557654470205,
-0.09427256882190704,
0.0472894012928009,
0.015010824427008629,
0.008158935233950615,
0.008059289306402206,
-0.05343475937843323,
-0.032411232590675354,
0.04248589277267456,
0.05533050373196602,
-0.057085417211055756,
-0.038719918578863144,
0.0087623605504632,
0.01890... | 0.078155 |
actual publication). Use the `canonicalUrl` field in [front matter](https://gohugo.io/content-management/front-matter/) for this. | https://github.com/kubernetes/website/blob/main//content/en/docs/contribute/blog/mirroring.md | main | kubernetes | [
0.038233764469623566,
0.032925479114055634,
-0.07352153956890106,
0.01048820186406374,
0.03172437101602554,
-0.0376906618475914,
-0.13976377248764038,
0.021287305280566216,
-0.00196583173237741,
0.03303319215774536,
-0.02666321210563183,
0.03956348076462746,
0.011434008367359638,
0.0091957... | 0.029042 |
There are two official Kubernetes blogs, and the CNCF has its own blog where you can cover Kubernetes too. For the [main Kubernetes blog](/docs/contribute/blog/), we (the Kubernetes project) like to publish articles with different perspectives and special focuses, that have a link to Kubernetes. With only a few special... | https://github.com/kubernetes/website/blob/main//content/en/docs/contribute/blog/submission.md | main | kubernetes | [
0.0279129296541214,
-0.049079783260822296,
-0.008533064275979996,
0.040084358304739,
0.00820984411984682,
0.03582441061735153,
-0.04710506647825241,
0.0014603129820898175,
0.08623664081096649,
0.1014997735619545,
-0.048793528228998184,
-0.03755661100149155,
0.06040992587804794,
0.040588580... | 0.091159 |
small follow-up PR that marks it for publication. Merging that second PR releases the previously-draft article so that it can automatically publish. On the day the article is scheduled to publish, automation triggers a website build and your article becomes visible. ## Authoring an article {#authoring} After you've pit... | https://github.com/kubernetes/website/blob/main//content/en/docs/contribute/blog/submission.md | main | kubernetes | [
-0.049187418073415756,
0.010059342719614506,
-0.0039025102742016315,
0.08005417883396149,
0.04280306026339531,
0.015849942341446877,
-0.047086670994758606,
0.06477978080511093,
0.016664398834109306,
0.009010318666696548,
0.0010019645560532808,
0.07921864092350006,
0.07585059106349945,
0.00... | 0.010652 |
the pull request process. 1. Your writing buddy can review your submission and work with you on feedback and final details. A blog editor approves your pull request to merge, as a draft that is not yet scheduled. #### Front matter The Markdown file you write should use YAML-format Hugo [front matter](https://gohugo.io/... | https://github.com/kubernetes/website/blob/main//content/en/docs/contribute/blog/submission.md | main | kubernetes | [
-0.04264041781425476,
0.05184989795088768,
0.02883613109588623,
0.07916901260614395,
0.04846309497952461,
0.04316394403576851,
-0.12719877064228058,
0.02059808000922203,
0.030327005311846733,
0.06789138168096542,
-0.03454015403985977,
0.05830835923552513,
-0.002720252377912402,
-0.06535620... | 0.03848 |
At the point you mark your pull request ready for review, each commit message should be a short summary of the work being done. The first commit message should make sense as an overall description of the blog post. Examples of a good commit message: - \_Add blog post on the foo kubernetes feature\_ - \_blog: foobar ann... | https://github.com/kubernetes/website/blob/main//content/en/docs/contribute/blog/submission.md | main | kubernetes | [
0.001988691044971347,
0.02286016196012497,
0.0706605464220047,
0.04533841460943222,
0.005597028415650129,
0.03654484078288078,
-0.023913143202662468,
0.0052526346407830715,
0.08388456702232361,
0.06555870920419693,
-0.012891202233731747,
-0.028792621567845345,
-0.010505764745175838,
0.0259... | 0.061753 |
There are two official Kubernetes blogs, and the CNCF has [its own blog](https://www.cncf.io/blog/) where you can cover Kubernetes too. For the main Kubernetes blog, we (the Kubernetes project) like to publish articles with different perspectives and special focuses, that have a link to Kubernetes. With only a few spec... | https://github.com/kubernetes/website/blob/main//content/en/docs/contribute/blog/_index.md | main | kubernetes | [
0.032496560364961624,
-0.07858504354953766,
0.0385541208088398,
0.020503953099250793,
0.03639496862888336,
0.005783420521765947,
-0.06664304435253143,
-0.01651776023209095,
0.07892518490552902,
0.10293722152709961,
-0.05453955754637718,
-0.009885231964290142,
0.03796640783548355,
0.0293270... | 0.135541 |
Anyone can review a documentation pull request. Visit the [pull requests](https://github.com/kubernetes/website/pulls) section in the Kubernetes website repository to see open pull requests. Reviewing documentation pull requests is a great way to introduce yourself to the Kubernetes community. It helps you learn the co... | https://github.com/kubernetes/website/blob/main//content/en/docs/contribute/review/reviewing-prs.md | main | kubernetes | [
-0.022967709228396416,
0.00885935127735138,
0.05275876075029373,
0.012689975090324879,
0.003907120320945978,
0.03226914629340172,
-0.01775246299803257,
0.01576875150203705,
0.030476780608296394,
0.08291792124509811,
-0.056851014494895935,
-0.030097005888819695,
-0.026871459558606148,
-0.02... | 0.096028 |
to make) or \*\*Start a review\*\* (if you have multiple comments to make). 1. When finished, click \*\*Review changes\*\* at the top of the page. Here, you can add a summary of your review (and leave some positive comments for the contributor!). Please always use the "Comment" - Avoid clicking the "Request changes" bu... | https://github.com/kubernetes/website/blob/main//content/en/docs/contribute/review/reviewing-prs.md | main | kubernetes | [
-0.11110781878232956,
0.013136240653693676,
-0.01322984416037798,
0.04538383707404137,
0.0068349530920386314,
0.055021319538354874,
0.07563301175832748,
-0.04814273491501808,
0.00005460616375785321,
0.06688205897808075,
0.004180929157882929,
-0.020630158483982086,
-0.008979291655123234,
-0... | 0.016487 |
Before reviewing blog PRs, be familiar with the [blog guidelines](/docs/contribute/blog/guidelines/) and with [submitting blog posts and case studies](/docs/contribute/new-content/blogs-case-studies/). Make sure you also know about [evergreen](/docs/contribute/blog/#maintenance-evergreen) articles and how to decide if ... | https://github.com/kubernetes/website/blob/main//content/en/docs/contribute/review/reviewing-prs.md | main | kubernetes | [
-0.005327248014509678,
0.039474647492170334,
0.05665217339992523,
0.024359717965126038,
0.06320027261972427,
0.02670920081436634,
0.010675547644495964,
-0.028829677030444145,
0.06388777494430542,
0.046147387474775314,
-0.05542842298746109,
0.0021500808652490377,
-0.02085890807211399,
0.059... | 0.065199 |
SIG Docs [Reviewers](/docs/contribute/participate/#reviewers) and [Approvers](/docs/contribute/participate/#approvers) do a few extra things when reviewing a change. Every week a specific docs approver volunteers to triage and review pull requests. This person is the "PR Wrangler" for the week. See the [PR Wrangler sch... | https://github.com/kubernetes/website/blob/main//content/en/docs/contribute/review/for-approvers.md | main | kubernetes | [
-0.0869574323296547,
-0.013060224242508411,
0.025606274604797363,
0.0548386424779892,
0.024299656972289085,
-0.03815676271915436,
-0.01929234154522419,
0.01934617944061756,
0.05676029250025749,
0.05300948768854141,
-0.010072571225464344,
-0.02312420681118965,
-0.05121169239282608,
-0.05101... | 0.091706 |
the `do-not-merge/hold` label, indicating the PR cannot be automatically merged. `/hold cancel` | Anyone | Removes the `do-not-merge/hold` label. {{< /table >}} To view the commands that you can use in a PR, see the [Prow Command Reference](https://prow.k8s.io/command-help?repo=kubernetes%2Fwebsite). ## Triage and cate... | https://github.com/kubernetes/website/blob/main//content/en/docs/contribute/review/for-approvers.md | main | kubernetes | [
-0.039815597236156464,
0.011694013141095638,
-0.03696378692984581,
-0.03931393101811409,
0.013537799939513206,
0.02902279980480671,
0.06334839016199112,
0.0069268858060240746,
0.08356526494026184,
0.011433297768235207,
0.10921582579612732,
-0.04389173537492752,
-0.04133221134543419,
-0.094... | 0.135376 |
or more issues open for it, combine them into a single issue. You should decide which issue to keep open (or open a new issue), then move over all relevant information and link related issues. Finally, label all other issues that describe the same problem with `triage/duplicate` and close them. Only having a single iss... | https://github.com/kubernetes/website/blob/main//content/en/docs/contribute/review/for-approvers.md | main | kubernetes | [
-0.017647190019488335,
0.006351380608975887,
0.04708075895905495,
-0.007883606478571892,
0.014389682561159134,
-0.019233813509345055,
-0.03210582956671715,
-0.024641022086143494,
0.030610613524913788,
0.08987875282764435,
0.017158618196845055,
-0.05185817927122116,
-0.009777411818504333,
-... | 0.117485 |
commits and update their fork with the result. Before you squash, advise them to save and push their latest changes to the PR. After you squash, advise them to pull the squashed commit to their local clone. - You can get GitHub to squash the commits by using a label so that Tide / GitHub performs the squash or by click... | https://github.com/kubernetes/website/blob/main//content/en/docs/contribute/review/for-approvers.md | main | kubernetes | [
0.014987863600254059,
0.02074645645916462,
0.03226726874709129,
0.010450397618114948,
0.06079808995127678,
-0.023150276392698288,
-0.06362183392047882,
0.02669031359255314,
0.009452282451093197,
0.006240667775273323,
0.10570397973060608,
-0.020161869004368782,
0.03807273879647255,
-0.02879... | 0.038506 |
This page demonstrates the generation of metrics reference documentation. ## {{% heading "prerequisites" %}} {{< include "prerequisites-ref-docs.md" >}} ## Clone the Kubernetes repository The metric generation happens in the Kubernetes repository. To clone the repository, change directories to where you want the clone ... | https://github.com/kubernetes/website/blob/main//content/en/docs/contribute/generate-ref-docs/metrics-reference.md | main | kubernetes | [
-0.039417482912540436,
-0.06597419828176498,
0.013302560895681381,
0.020391220226883888,
-0.06356187909841537,
-0.01588384062051773,
-0.0188087597489357,
0.009538544341921806,
0.07889480143785477,
0.031221235170960426,
-0.010600804351270199,
-0.09772980213165283,
0.03714985027909279,
-0.06... | 0.105404 |
This page shows how to update the Kubernetes API reference documentation. The Kubernetes API reference documentation is built from the [Kubernetes OpenAPI spec](https://github.com/kubernetes/kubernetes/blob/master/api/openapi-spec/swagger.json) using the [kubernetes-sigs/reference-docs](https://github.com/kubernetes-si... | https://github.com/kubernetes/website/blob/main//content/en/docs/contribute/generate-ref-docs/kubernetes-api.md | main | kubernetes | [
-0.04103539511561394,
0.004150730557739735,
0.07216871529817581,
0.04830511286854744,
0.02347712591290474,
-0.042266521602869034,
-0.11445517092943192,
-0.01069235522300005,
0.04434552788734436,
0.03022296540439129,
-0.005488699767738581,
-0.07108315080404282,
-0.003032123437151313,
-0.038... | 0.051327 |
Markdown version of the API reference located at `/content/en/docs/reference/kubernetes-api/` is generated separately using the [gen-resourcesdocs](https://github.com/kubernetes-sigs/reference-docs/tree/master/gen-resourcesdocs) generator. {{< /note >}} ## Locally test the API reference Publish a local version of the A... | https://github.com/kubernetes/website/blob/main//content/en/docs/contribute/generate-ref-docs/kubernetes-api.md | main | kubernetes | [
-0.011819690465927124,
0.0221082903444767,
0.06777547299861908,
0.015406819060444832,
0.042168617248535156,
0.018503980711102486,
-0.059139978140592575,
0.02168870158493519,
0.0980563536286354,
0.0757843628525734,
-0.00757533498108387,
-0.05128238722681999,
-0.02111712098121643,
-0.0418951... | 0.078114 |
This page shows how to generate the `kubectl` command reference. {{< note >}} This topic shows how to generate reference documentation for [kubectl commands](/docs/reference/generated/kubectl/kubectl-commands) like [kubectl apply](/docs/reference/generated/kubectl/kubectl-commands#apply) and [kubectl taint](/docs/refer... | https://github.com/kubernetes/website/blob/main//content/en/docs/contribute/generate-ref-docs/kubectl.md | main | kubernetes | [
-0.04729807749390602,
-0.003218370955437422,
0.020779065787792206,
-0.012085555121302605,
0.00008673481352161616,
0.024846380576491356,
-0.03062400408089161,
-0.031846120953559875,
0.04111156612634659,
0.0014729356626048684,
-0.002219447633251548,
-0.11328932642936707,
0.014398109167814255,
... | 0.058272 |
to backport your change to the release-{{< skew prevMinorVersion >}} branch. For instructions on how to do this, see [Propose a Cherry Pick](https://git.k8s.io/community/contributors/devel/sig-release/cherry-picks.md). Monitor your cherry-pick pull request until it is merged into the release branch. {{< note >}} Propos... | https://github.com/kubernetes/website/blob/main//content/en/docs/contribute/generate-ref-docs/kubectl.md | main | kubernetes | [
0.008241396397352219,
0.01576271653175354,
0.05727313086390495,
-0.03664446249604225,
-0.02233579009771347,
0.05990319326519966,
-0.047404173761606216,
0.06972640752792358,
0.03494100645184517,
0.04871856048703194,
0.018527664244174957,
-0.07701277732849121,
-0.05099901184439659,
-0.025701... | 0.03812 |
This page shows how to use the `update-imported-docs.py` script to generate the Kubernetes reference documentation. The script automates the build setup and generates the reference documentation for a release. ## {{% heading "prerequisites" %}} {{< include "prerequisites-ref-docs.md" >}} ## Getting the docs repository ... | https://github.com/kubernetes/website/blob/main//content/en/docs/contribute/generate-ref-docs/quickstart.md | main | kubernetes | [
-0.01645682565867901,
-0.05480393022298813,
0.08053304255008698,
-0.00950587447732687,
-0.010500234551727772,
0.0150181008502841,
-0.037875786423683167,
0.03786482289433479,
0.0631629079580307,
0.07733771950006485,
-0.03363709896802902,
-0.049553532153367996,
0.044601939618587494,
-0.03858... | 0.012434 |
may require changes to the configuration file (for example: golang version dependencies and third-party library changes). If you encounter build issues, contact the SIG-Docs team on the [#sig-docs Kubernetes Slack channel](https://kubernetes.slack.com). {{< note >}} The `generate-command` is an optional entry, which ca... | https://github.com/kubernetes/website/blob/main//content/en/docs/contribute/generate-ref-docs/quickstart.md | main | kubernetes | [
-0.05058250203728676,
-0.010668130591511726,
0.04997894912958145,
0.021093757823109627,
-0.0070257592014968395,
-0.0002995334507431835,
-0.038865696638822556,
0.0432649590075016,
0.047825608402490616,
0.006493694148957729,
0.0017252960242331028,
-0.03483445197343826,
-0.03720792755484581,
... | 0.098795 |
This page shows how to build the Kubernetes component and tool reference pages. ## {{% heading "prerequisites" %}} Start with the [Prerequisites section](/docs/contribute/generate-ref-docs/quickstart/#before-you-begin) in the Reference Documentation Quickstart guide. Follow the [Reference Documentation Quickstart](/doc... | https://github.com/kubernetes/website/blob/main//content/en/docs/contribute/generate-ref-docs/kubernetes-components.md | main | kubernetes | [
-0.07151887565851212,
-0.009715655818581581,
0.04008331149816513,
-0.02560688741505146,
0.0005179333966225386,
0.06500693410634995,
-0.02350858971476555,
0.02383183129131794,
0.013865077868103981,
0.04766841605305672,
-0.04147953540086746,
-0.0665079802274704,
0.03610902279615402,
-0.02721... | 0.017572 |
### Requirements: - You need a machine that is running Linux or macOS. - You need to have these tools installed: - [Python](https://www.python.org/downloads/) v3.7.x+ - [Git](https://git-scm.com/book/en/v2/Getting-Started-Installing-Git) - [Golang](https://go.dev/dl/) version 1.13+ - [Pip](https://pypi.org/project/pip/... | https://github.com/kubernetes/website/blob/main//content/en/docs/contribute/generate-ref-docs/prerequisites-ref-docs.md | main | kubernetes | [
0.01410802360624075,
-0.03854650259017944,
-0.024513380602002144,
-0.030617084354162216,
-0.029370132833719254,
-0.020493024960160255,
-0.055654991418123245,
0.009154696017503738,
-0.009392871521413326,
-0.020735014230012894,
0.018298668786883354,
-0.06296396255493164,
-0.0008630194352008402... | 0.029252 |
This page shows how to contribute to the upstream `kubernetes/kubernetes` project. You can fix bugs found in the Kubernetes API documentation or the content of the Kubernetes components such as `kubeadm`, `kube-apiserver`, and `kube-controller-manager`. If you instead want to regenerate the reference documentation for ... | https://github.com/kubernetes/website/blob/main//content/en/docs/contribute/generate-ref-docs/contribute-upstream.md | main | kubernetes | [
-0.026911845430731773,
-0.07020006328821182,
0.03816851228475571,
-0.0010227554012089968,
0.014646309427917004,
0.098991259932518,
-0.03431631624698639,
0.01292424090206623,
0.021586602553725243,
0.056581754237413406,
-0.027335409075021744,
-0.05483948811888695,
-0.011351722292602062,
0.00... | 0.045703 |
the changes you have made so far. In the next step, you will do a second commit. It is important to keep your changes separated into two commits. ### Generate the OpenAPI spec and related files Go to `` and run these scripts: ```shell ./hack/update-codegen.sh ./hack/update-openapi-spec.sh ``` Run `git status` to see wh... | https://github.com/kubernetes/website/blob/main//content/en/docs/contribute/generate-ref-docs/contribute-upstream.md | main | kubernetes | [
-0.034908369183540344,
0.0679544061422348,
0.0067522660829126835,
0.0356920100748539,
0.050975386053323746,
-0.10689376294612885,
-0.10140218585729599,
-0.024546504020690918,
0.019499046728014946,
0.01544235646724701,
0.06392376869916916,
-0.076893649995327,
0.027910899370908737,
-0.029458... | 0.040783 |
Monitor your pull request until it gets merged into the release-{{< skew prevMinorVersion >}} branch. At this point, both the master branch and the release-{{< skew prevMinorVersion >}} branch have your updated `types.go` file and a set of generated files that reflect the change you made to `types.go`. Note that the ge... | https://github.com/kubernetes/website/blob/main//content/en/docs/contribute/generate-ref-docs/contribute-upstream.md | main | kubernetes | [
-0.006641804240643978,
0.03312576562166214,
0.041156306862831116,
0.003906764555722475,
0.04419939965009689,
-0.06453164666891098,
-0.08321067690849304,
-0.030689716339111328,
0.05551351606845856,
0.013675050809979439,
0.06656985729932785,
-0.03811988979578018,
-0.044681377708911896,
-0.06... | 0.050085 |
{{< glossary\_definition term\_id="configmap" prepend="A ConfigMap is" length="all" >}} {{< caution >}} ConfigMap does not provide secrecy or encryption. If the data you want to store are confidential, use a {{< glossary\_tooltip text="Secret" term\_id="secret" >}} rather than a ConfigMap, or use additional (third part... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/configuration/configmap.md | main | kubernetes | [
-0.061638474464416504,
0.026395348832011223,
-0.017567608505487442,
0.018940124660730362,
-0.02942780591547489,
-0.0188069399446249,
0.0885409340262413,
-0.01763307861983776,
0.026136543601751328,
0.02514035813510418,
0.02714359574019909,
-0.10737548023462296,
0.08069206774234772,
-0.07025... | 0.069074 |
modeling the data being consumed. For the first three methods, the {{< glossary\_tooltip text="kubelet" term\_id="kubelet" >}} uses the data from the ConfigMap when it launches container(s) for a Pod. The fourth method means you have to write code to read the ConfigMap and its data. However, because you're using the Ku... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/configuration/configmap.md | main | kubernetes | [
-0.02067343145608902,
0.0013879068428650498,
0.04862884059548378,
0.008063418790698051,
-0.04039879888296127,
-0.03453735634684563,
0.061101168394088745,
0.010357446037232876,
0.06828373670578003,
0.0461476668715477,
-0.03468824923038483,
-0.09794047474861145,
-0.004958620760589838,
-0.063... | 0.132769 |
the cache is configurable using the `configMapAndSecretChangeDetectionStrategy` field in the [KubeletConfiguration struct](/docs/reference/config-api/kubelet-config.v1beta1/). A ConfigMap can be either propagated by watch (default), ttl-based, or by redirecting all requests directly to the API server. As a result, the ... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/configuration/configmap.md | main | kubernetes | [
0.048709023743867874,
0.003747734008356929,
0.061656657606363297,
0.001037708600051701,
-0.052935365587472916,
-0.03413186967372894,
-0.01980563998222351,
-0.017722101882100105,
0.12055536359548569,
0.049445800483226776,
-0.018719282001256943,
-0.033948663622140884,
-0.0116453031077981,
-0... | 0.126792 |
as immutable. For clusters that extensively use ConfigMaps (at least tens of thousands of unique ConfigMap to Pod mounts), preventing changes to their data has the following advantages: - protects you from accidental (or unwanted) updates that could cause applications outages - improves performance of your cluster by s... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/configuration/configmap.md | main | kubernetes | [
-0.011868693865835667,
0.03162546455860138,
0.02887648344039917,
0.007737801875919104,
0.039343178272247314,
-0.05200060084462166,
0.00620317691937089,
-0.03832447528839111,
0.0712546557188034,
0.041598089039325714,
0.034448061138391495,
-0.008650116622447968,
0.03390124812722206,
-0.05701... | 0.206985 |
A Secret is an object that contains a small amount of sensitive data such as a password, a token, or a key. Such information might otherwise be put in a {{< glossary\_tooltip term\_id="pod" >}} specification or in a {{< glossary\_tooltip text="container image" term\_id="image" >}}. Using a Secret means that you don't n... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/configuration/secret.md | main | kubernetes | [
-0.0770299956202507,
0.03132491558790207,
0.04488180950284004,
0.028476441279053688,
-0.0024335947819054127,
0.013305792585015297,
0.022017624229192734,
-0.009833146817982197,
0.12487581372261047,
0.06487961113452911,
0.012230523861944675,
-0.041967280209064484,
0.0260641910135746,
-0.0815... | 0.115448 |
over localhost networking). With this partitioned approach, an attacker now has to trick the application server into doing something rather arbitrary, which may be harder than getting it to read a file. ### Alternatives to Secrets Rather than using a Secret to protect confidential data, you can pick from alternatives. ... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/configuration/secret.md | main | kubernetes | [
-0.012179297395050526,
0.06678380072116852,
0.04500659555196762,
-0.014358154498040676,
0.0010655221994966269,
0.012279970571398735,
0.028764445334672928,
0.03889697790145874,
0.1044323742389679,
0.03394957631826401,
-0.04700065031647682,
-0.0566323958337307,
0.027882996946573257,
0.004024... | 0.070657 |
indicate an `Opaque` Secret type. For example, the following command creates an empty Secret of type `Opaque`: ```shell kubectl create secret generic empty-secret kubectl get secret empty-secret ``` The output looks like: ``` NAME TYPE DATA AGE empty-secret Opaque 0 2m6s ``` The `DATA` column shows the number of data i... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/configuration/secret.md | main | kubernetes | [
-0.08948151767253876,
0.02449096366763115,
0.020034844055771828,
0.021698934957385063,
-0.08242110162973404,
-0.018966220319271088,
0.06029728800058365,
-0.01740221120417118,
0.1637062132358551,
0.04510844126343727,
0.03558086231350899,
-0.10080515593290329,
0.02591782994568348,
-0.0477961... | 0.094626 |
the `stringData` field instead. {{< /note >}} When you create Docker config Secrets using a manifest, the API server checks whether the expected key exists in the `data` field, and it verifies if the value provided can be parsed as a valid JSON. The API server doesn't validate if the JSON actually is a Docker config fi... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/configuration/secret.md | main | kubernetes | [
-0.04578268900513649,
0.08711722493171692,
0.003950755577534437,
-0.02232508361339569,
-0.04372338950634003,
-0.04315571114420891,
0.017912784591317177,
0.06496855616569519,
0.044618044048547745,
-0.0006846637697890401,
-0.021954581141471863,
-0.11967053264379501,
0.013902353122830391,
0.0... | 0.028481 |
### TLS Secrets The `kubernetes.io/tls` Secret type is for storing a certificate and its associated key that are typically used for TLS. One common use for TLS Secrets is to configure encryption in transit for an [Ingress](/docs/concepts/services-networking/ingress/), but you can also use it with other resources or dir... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/configuration/secret.md | main | kubernetes | [
-0.032069962471723557,
0.08326437324285507,
0.013633196242153645,
-0.0014226211933419108,
-0.05151517689228058,
-0.034044548869132996,
0.02649044059216976,
-0.005912479478865862,
0.13694137334823608,
0.03480253368616104,
-0.034349918365478516,
-0.05273474007844925,
0.0199215617030859,
0.03... | 0.068437 |
specify the `stringData` field instead, which accepts arbitrary strings as values. The keys of `data` and `stringData` must consist of alphanumeric characters, `-`, `\_` or `.`. All key-value pairs in the `stringData` field are internally merged into the `data` field. If a key appears in both the `data` and the `string... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/configuration/secret.md | main | kubernetes | [
-0.021739711984992027,
0.05763959884643555,
-0.018712451681494713,
-0.009386701509356499,
-0.14827999472618103,
-0.010180682875216007,
-0.027609020471572876,
0.030735066160559654,
0.11814256012439728,
0.012136563658714294,
-0.018311794847249985,
-0.06355271488428116,
0.03253871202468872,
-... | 0.099937 |
eventually-consistent approach. {{< note >}} A container using a Secret as a [subPath](/docs/concepts/storage/volumes#using-subpath) volume mount does not receive automated Secret updates. {{< /note >}} The kubelet keeps a cache of the current keys and values for the Secrets that are used in volumes for pods on that no... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/configuration/secret.md | main | kubernetes | [
-0.0040476154536008835,
0.03484152629971504,
0.08033100515604019,
0.028199845924973488,
-0.02785789966583252,
-0.006334220990538597,
-0.022795718163251877,
-0.03470538556575775,
0.15036329627037048,
0.021135592833161354,
-0.010635524988174438,
-0.06958196312189102,
0.01799076609313488,
-0.... | 0.152235 |
you from accidental (or unwanted) updates that could cause applications outages - (for clusters that extensively use Secrets - at least tens of thousands of unique Secret to Pod mounts), switching to immutable Secrets improves the performance of your cluster by significantly reducing load on kube-apiserver. The kubelet... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/configuration/secret.md | main | kubernetes | [
-0.018299197778105736,
0.029400460422039032,
0.06452617049217224,
0.018510598689317703,
0.008241607807576656,
-0.008183375932276249,
-0.015553634613752365,
-0.022948583588004112,
0.12540759146213531,
0.042074382305145264,
-0.018879931420087814,
-0.01544214878231287,
0.006758272182196379,
-... | 0.16353 |
file](/docs/tasks/configmap-secret/managing-secret-using-config-file/) - Learn how to [manage Secrets using kustomize](/docs/tasks/configmap-secret/managing-secret-using-kustomize/) - Read the [API reference](/docs/reference/kubernetes-api/config-and-storage-resources/secret-v1/) for `Secret` | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/configuration/secret.md | main | kubernetes | [
-0.044866230338811874,
0.04321793466806412,
-0.0374021902680397,
-0.0038483510725200176,
0.0000614311356912367,
-0.001564819016493857,
0.049244534224271774,
0.0169666800647974,
-0.016631435602903366,
0.025642478838562965,
0.04630036652088165,
-0.01690693572163582,
0.018175682052969933,
-0.... | 0.18527 |
When you specify a {{< glossary\_tooltip term\_id="pod" >}}, you can optionally specify how much of each resource a {{< glossary\_tooltip text="container" term\_id="container" >}} needs. The most common resources to specify are CPU and memory (RAM); there are others. When you specify the resource \_request\_ for contai... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/configuration/manage-resources-containers.md | main | kubernetes | [
-0.046773262321949005,
0.0292767696082592,
0.05293497443199158,
0.010236028581857681,
-0.020522059872746468,
-0.05464351922273636,
0.08662674576044083,
-0.053122490644454956,
0.09455271810293198,
-0.005119426175951958,
-0.01870270073413849,
-0.0695919319987297,
-0.006300187204033136,
-0.07... | 0.086235 |
where the default page size is 4KiB, you could specify a limit, `hugepages-2Mi: 80Mi`. If the container tries allocating over 40 2MiB huge pages (a total of 80 MiB), that allocation fails. {{< note >}} You cannot overcommit `hugepages-\*` resources. This is different from the `memory` and `cpu` resources. {{< /note >}}... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/configuration/manage-resources-containers.md | main | kubernetes | [
0.008693801239132881,
0.07433202117681503,
0.011745757423341274,
-0.0010393327102065086,
-0.04580673575401306,
-0.051526375114917755,
-0.019033480435609818,
-0.0025355485267937183,
0.026513490825891495,
0.06757718324661255,
-0.0527920201420784,
-0.019700177013874054,
-0.00017927683074958622,... | 0.131507 |
CPU and would like to decrease its CPU resources. By using the decimal form, it's harder to spot that `0.0005` CPU is an invalid value, while by using the milliCPU form, it's easier to spot that `0.5m` is an invalid value. {{< /note >}} ### Memory resource units {#meaning-of-memory} Limits and requests for `memory` are... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/configuration/manage-resources-containers.md | main | kubernetes | [
0.03407349810004234,
0.0885595977306366,
-0.011995541863143444,
0.025689616799354553,
-0.09627639502286911,
-0.008102690801024437,
0.04152638465166092,
0.04763052985072136,
0.13525067269802094,
0.041329994797706604,
-0.021549036726355553,
-0.08362845331430435,
-0.01004855427891016,
-0.0191... | 0.20462 |
the Linux kernel checks to see if this limit is exceeded; if so, the kernel waits before allowing that cgroup to resume execution. - The CPU request typically defines a weighting. If several different containers (cgroups) want to run on a contended system, workloads with larger CPU requests are allocated more CPU time ... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/configuration/manage-resources-containers.md | main | kubernetes | [
0.04716956615447998,
0.02269562892615795,
-0.019549522548913956,
0.03501834720373154,
0.014129473827779293,
-0.007070975843816996,
-0.054560888558626175,
0.03601120784878731,
0.10462073981761932,
-0.011429084464907646,
-0.00446117389947176,
0.04100373014807701,
-0.044865574687719345,
-0.07... | 0.171581 |
usage can be retrieved either from the [Metrics API](/docs/tasks/debug/debug-cluster/resource-metrics-pipeline/#metrics-api) directly or from your monitoring tools. ### Considerations for memory backed `emptyDir` volumes {#memory-backed-emptydir} {{< caution >}} If you do not specify a `sizeLimit` for an `emptyDir` vol... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/configuration/manage-resources-containers.md | main | kubernetes | [
0.08800271898508072,
0.026744285598397255,
-0.02135116048157215,
0.0900489091873169,
0.04216071590781212,
-0.06298130005598068,
-0.009204987436532974,
0.03774789720773697,
0.08664672076702118,
0.043343685567379,
-0.02106923796236515,
0.004263471346348524,
-0.018732769414782524,
-0.04714573... | 0.140121 |
the non-Kubernetes-built-in resources. There are two steps required to use Extended Resources. First, the cluster operator must advertise an Extended Resource. Second, users must request the Extended Resource in Pods. ### Managing extended resources #### Node-level extended resources Node-level extended resources are t... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/configuration/manage-resources-containers.md | main | kubernetes | [
0.0024265774991363287,
-0.027797257527709007,
-0.0028243856504559517,
0.07719578593969345,
0.020843347534537315,
-0.03290526568889618,
-0.010738173499703407,
-0.05151334032416344,
0.028258519247174263,
0.07396844029426575,
-0.0009775095386430621,
-0.01264924369752407,
0.01801062934100628,
... | 0.173599 |
map in the container spec. {{< note >}} Extended resources cannot be overcommitted, so request and limit must be equal if both are present in a container spec. {{< /note >}} A Pod is scheduled only if all of the resource requests are satisfied, including CPU, memory and any extended resources. The Pod remains in the `P... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/configuration/manage-resources-containers.md | main | kubernetes | [
0.00981221254914999,
0.051409535109996796,
0.05384845659136772,
0.0003360901609994471,
-0.010545087978243828,
-0.05140218138694763,
0.004843602422624826,
-0.011163657531142235,
0.06509844213724136,
0.02542877197265625,
0.0009672665037214756,
-0.002725237514823675,
-0.02704719454050064,
-0.... | 0.159246 |
Pod will not fit on the node. By looking at the “Pods” section, you can see which Pods are taking up space on the node. The amount of resources available to Pods is less than the node capacity because system daemons use a portion of the available resources. Within the Kubernetes API, each Node has a `.status.allocatabl... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/configuration/manage-resources-containers.md | main | kubernetes | [
0.07801877707242966,
-0.015316804870963097,
0.0009855924872681499,
0.04090966656804085,
0.005084850359708071,
-0.024188585579395294,
-0.02289469540119171,
-0.01071383710950613,
0.05893399566411972,
0.08919160068035126,
-0.05167412385344505,
-0.014981617219746113,
-0.023247122764587402,
-0.... | 0.13898 |
Use kubeconfig files to organize information about clusters, users, namespaces, and authentication mechanisms. The `kubectl` command-line tool uses kubeconfig files to find the information it needs to choose a cluster and communicate with the API server of a cluster. {{< note >}} A file that is used to configure access... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/configuration/organize-cluster-access-kubeconfig.md | main | kubernetes | [
-0.011255013756453991,
-0.0011111389612779021,
-0.057706207036972046,
0.020014028996229172,
0.022035278379917145,
-0.022001070901751518,
0.013940026983618736,
-0.026434456929564476,
0.07259073853492737,
-0.009830345399677753,
0.025315377861261368,
-0.08420035243034363,
0.06630176305770874,
... | 0.193996 |
Even if the second file has non-conflicting entries under `red-user`, discard them. For an example of setting the `KUBECONFIG` environment variable, see [Setting the KUBECONFIG environment variable](/docs/tasks/access-application-cluster/configure-access-multiple-clusters/#set-the-kubeconfig-environment-variable). Othe... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/configuration/organize-cluster-access-kubeconfig.md | main | kubernetes | [
0.04715457186102867,
-0.04693710803985596,
-0.028557538986206055,
-0.000048614565457683057,
-0.02246185392141342,
-0.03255867585539818,
0.10739351809024811,
-0.01744968444108963,
-0.004946679808199406,
-0.04152204841375351,
0.03741704672574997,
-0.07575282454490662,
0.044787947088479996,
-... | 0.09051 |
Kubernetes lets you define \_probes\_ to continuously monitor the health of containers in a Pod. Based on probe results, Kubernetes can restart unhealthy containers or stop sending traffic to containers that are not ready. There are three types of probes, each serving a different purpose: - [Startup probe](#startup-pro... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/configuration/liveness-readiness-startup-probes.md | main | kubernetes | [
0.03989787399768829,
-0.01726720482110977,
0.03449243679642677,
0.044724736362695694,
0.0712934210896492,
-0.020963424816727638,
0.0032451057340949774,
-0.06400848925113678,
0.07231003791093826,
0.06014962121844292,
-0.03978922590613365,
0.016957564279437065,
-0.03666069358587265,
0.002961... | 0.20778 |
This page outlines the differences in how resources are managed between Linux and Windows. On Linux nodes, {{< glossary\_tooltip text="cgroups" term\_id="cgroup" >}} are used as a pod boundary for resource control. Containers are created within that boundary for network, process and file system isolation. The Linux cgr... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/configuration/windows-resource-management.md | main | kubernetes | [
-0.014327081851661205,
0.033929962664842606,
-0.08447513729333878,
0.024966591969132423,
0.02864370308816433,
-0.030011476948857307,
0.033469028770923615,
-0.018409281969070435,
0.07454812526702881,
-0.000027291436708765104,
-0.07088698446750641,
-0.07809145748615265,
-0.019929558038711548,
... | 0.180944 |
This checklist aims to provide basic guidelines on securing applications running in Kubernetes from a developer's perspective. This list is not meant to be exhaustive and is intended to evolve over time. On how to read and use this document: - The order of topics does not reflect an order of priority. - Some checklist ... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/application-security-checklist.md | main | kubernetes | [
-0.015247859060764313,
0.04109325632452965,
0.01928112655878067,
-0.048313699662685394,
0.07079534977674484,
0.0404217466711998,
0.12953375279903412,
-0.04050622135400772,
-0.03550845757126808,
0.05220891535282135,
-0.02108999341726303,
-0.03788599371910095,
0.012111207470297813,
0.0055148... | 0.169235 |
increase the attack surface. For sensitive workloads, consider providing a recommended ValidatingAdmissionPolicy that further restricts the permitted write actions. ### Image security - [ ] Using an image scanning tool to scan an image before deploying containers in the Kubernetes cluster. - [ ] Use container signing t... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/application-security-checklist.md | main | kubernetes | [
0.08635668456554413,
0.0599292628467083,
0.07822468131780624,
-0.007101890631020069,
-0.0008741275523789227,
-0.00924940686672926,
0.038326747715473175,
0.02259967476129532,
0.024484051391482353,
0.042718030512332916,
-0.0490720272064209,
-0.04768109321594238,
0.031014718115329742,
0.00794... | 0.172265 |
This page describes some of the security features that are built into the Linux kernel that you can use in your Kubernetes workloads. To learn how to apply these features to your Pods and containers, refer to [Configure a SecurityContext for a Pod or Container](/docs/tasks/configure-pod-container/security-context/). Yo... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/linux-kernel-security-constraints.md | main | kubernetes | [
0.06835781037807465,
0.03186469525098801,
0.02910570614039898,
-0.03956712409853935,
-0.005660123657435179,
-0.021607577800750732,
0.01926749385893345,
0.04238239675760269,
0.030327899381518364,
0.03237539157271385,
-0.04042196273803711,
-0.007378948386758566,
0.006308344192802906,
0.02268... | 0.142586 |
further limit the allowed syscalls individually by using a seccomp profile. Container runtimes usually include a default seccomp profile. Kubernetes lets you automatically apply seccomp profiles loaded onto a node to your Pods and containers. {{}} Kubernetes also has the `allowPrivilegeEscalation` setting for Pods and ... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/linux-kernel-security-constraints.md | main | kubernetes | [
0.05778605863451958,
0.0013518024934455752,
0.02543557807803154,
-0.04999144375324249,
-0.012952226214110851,
-0.020617030560970306,
0.0584016814827919,
0.02312086522579193,
0.018362581729888916,
-0.0013575333869084716,
0.014149991795420647,
-0.05529516562819481,
-0.032452695071697235,
0.0... | 0.205356 |
nodes usually includes one of either AppArmor or SELinux. Both mechanisms provide similar types of protection, but have differences such as the following: \* \*\*Configuration\*\*: AppArmor uses profiles to define access to resources. SELinux uses policies that apply to specific labels. \* \*\*Policy application\*\*: I... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/linux-kernel-security-constraints.md | main | kubernetes | [
-0.0018010663334280252,
0.0178252961486578,
-0.01285452488809824,
-0.013105946592986584,
0.09234204888343811,
-0.058487337082624435,
0.03372733294963837,
0.1333966702222824,
-0.0058534592390060425,
-0.008627195842564106,
0.004906979855149984,
-0.0033308283891528845,
0.04072782024741173,
-0... | 0.249519 |
user in a privileged container might be able to use the `CAP\_SYS\_ADMIN` and `CAP\_NET\_ADMIN` capabilities on the node, bypassing the runtime seccomp configuration and other restrictions. In most cases, you should avoid using privileged containers, and instead grant the specific capabilities required by your containe... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/linux-kernel-security-constraints.md | main | kubernetes | [
0.07942843437194824,
0.04437015950679779,
0.011795367114245892,
-0.02326805144548416,
-0.028200019150972366,
0.029921820387244225,
0.0398327074944973,
0.018994703888893127,
-0.000005811961273138877,
0.027710190042853355,
-0.05305737629532814,
-0.06684790551662445,
0.006511931773275137,
0.0... | 0.086188 |
Kubernetes {{< glossary\_tooltip text="RBAC" term\_id="rbac" >}} is a key security control to ensure that cluster users and workloads have only the access to resources required to execute their roles. It is important to ensure that, when designing permissions for cluster users, the cluster administrator understands the... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/rbac-good-practices.md | main | kubernetes | [
-0.003094287123531103,
-0.029595404863357544,
-0.04765912517905235,
0.02038971148431301,
-0.048681121319532394,
0.058057937771081924,
0.06842004507780075,
-0.05048965662717819,
0.007274007424712181,
0.010635563172399998,
-0.029711762443184853,
-0.029230473563075066,
0.032662633806467056,
0... | 0.153939 |
attacker is able to create a user account with the same name as a deleted user, they can automatically inherit all the rights of the deleted user, especially the rights assigned to that user. ## Kubernetes RBAC - privilege escalation risks {#privilege-escalation-risks} Within Kubernetes RBAC there are a number of privi... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/rbac-good-practices.md | main | kubernetes | [
-0.07857078313827515,
-0.0014380592620000243,
-0.045257072895765305,
0.024709252640604973,
-0.012556656263768673,
0.029470793902873993,
0.0927986353635788,
-0.04891697317361832,
0.09248337894678116,
-0.0002307745162397623,
0.023390598595142365,
0.024793829768896103,
0.06726083159446716,
-0... | 0.188832 |
have rights. This access bypasses audit logging and admission control, so care should be taken before granting any rights to this resource. These APIs can be exercised via websocket HTTP `GET` requests, which only requires authorization of the \*\*get\*\* verb. This means that \*\*get\*\* permission on `nodes/proxy` is... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/rbac-good-practices.md | main | kubernetes | [
-0.0639050081372261,
0.014257914386689663,
-0.08172617107629776,
0.05891008675098419,
-0.05380567908287048,
-0.008324941620230675,
0.06966632604598999,
-0.008260788396000862,
-0.003540764329954982,
-0.005369551945477724,
-0.03465960547327995,
0.0281175896525383,
0.037206169217824936,
0.014... | 0.138726 |
Kubernetes is based on a cloud native architecture and draws on advice from the {{< glossary\_tooltip text="CNCF" term\_id="cncf" >}} about good practices for cloud native information security. Read on for an overview of how Kubernetes is designed to help you deploy a secure cloud native platform. ## Cloud native infor... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/cloud-native-security.md | main | kubernetes | [
0.007997396402060986,
0.03487968444824219,
0.028063032776117325,
-0.06887590885162354,
0.06275355070829391,
0.04678933322429657,
0.046768032014369965,
-0.04261079058051109,
0.06655574589967728,
0.06042761355638504,
-0.013296079821884632,
-0.03943135589361191,
0.013851774856448174,
-0.00447... | 0.14623 |
Kubernetes uses TLS to protect API traffic; make sure to deploy the cluster using TLS (including for traffic between nodes and the control plane) and protect the encryption keys. If you use Kubernetes' own API for [CertificateSigningRequests](/docs/reference/access-authn-authz/certificate-signing-requests/#certificate-... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/cloud-native-security.md | main | kubernetes | [
-0.014766907319426537,
0.07393644750118256,
0.03783433139324188,
-0.001460632192902267,
-0.036820076406002045,
0.003155659418553114,
0.02915234863758087,
-0.01917886734008789,
0.09761138260364532,
0.029401276260614395,
-0.08459904789924622,
-0.08024829626083374,
0.034195031970739365,
-0.01... | 0.0796 |
running in containers can generate logs, publish metrics, or provide other observability data; at deploy time, you need to make sure your cluster provides an appropriate level of protection there. If you set up a metrics dashboard or something similar, review the chain of components that populate data into that dashboa... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/cloud-native-security.md | main | kubernetes | [
0.06287442892789841,
0.04811164364218712,
0.054290447384119034,
0.003808790585026145,
0.041699085384607315,
-0.036066796630620956,
-0.00842446368187666,
-0.020412780344486237,
0.06595481187105179,
0.06200196221470833,
-0.04695133492350578,
-0.07037556916475296,
0.04309562221169472,
0.00864... | 0.117248 |
This page introduces the ServiceAccount object in Kubernetes, providing information about how service accounts work, use cases, limitations, alternatives, and links to resources for additional guidance. ## What are service accounts? {#what-are-service-accounts} A service account is a type of non-human account that, in ... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/service-accounts.md | main | kubernetes | [
-0.07093195617198944,
-0.01839415915310383,
0.007075578439980745,
-0.030209049582481384,
-0.06200188770890236,
0.026367731392383575,
0.11624423414468765,
-0.04011943191289902,
0.14495070278644562,
0.023054448887705803,
-0.03153630718588829,
-0.09497188031673431,
0.05720401182770729,
0.0000... | 0.202876 |
to communicate with the Kubernetes API server. For example, authenticating to the cluster as part of a CI/CD pipeline. \* You use third-party security software in your cluster that relies on the ServiceAccount identity of different Pods to group those Pods into different contexts. ## How to use service accounts {#how-t... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/service-accounts.md | main | kubernetes | [
-0.0020144693553447723,
-0.043893784284591675,
-0.02499254047870636,
0.008243236690759659,
-0.07869107276201248,
0.00854438729584217,
0.052000243216753006,
0.03333000838756561,
0.08859405666589737,
0.05132107064127922,
-0.03909934312105179,
-0.09551333636045456,
0.03754561021924019,
-0.017... | 0.203425 |
Volume Projection](/docs/tasks/configure-pod-container/configure-service-account/#serviceaccount-token-volume-projection) (also recommended): In Kubernetes v1.20 and later, use the Pod specification to tell the kubelet to add the service account token to the Pod as a \*projected volume\*. Projected tokens expire automa... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/service-accounts.md | main | kubernetes | [
-0.03327757865190506,
-0.024257773533463478,
0.03583049029111862,
-0.0359615832567215,
-0.06129932776093483,
0.02130834199488163,
-0.01636512763798237,
0.01888546347618103,
0.1149488165974617,
0.03740326687693596,
-0.027698850259184837,
0.004953706171363592,
0.037491325289011,
0.0104629248... | 0.138375 |
tries to communicate with the Kubernetes API server, the client includes an `Authorization: Bearer ` header with the HTTP request. The API server checks the validity of that bearer token as follows: 1. Checks the token signature. 1. Checks whether the token has expired. 1. Checks whether object references in the token ... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/service-accounts.md | main | kubernetes | [
-0.04641682282090187,
-0.003265177831053734,
0.08305125683546066,
-0.01876411959528923,
-0.001429336960427463,
-0.04390662536025047,
0.06664027273654938,
-0.053297679871320724,
0.15257450938224792,
0.048879511654376984,
-0.056089360266923904,
-0.028030451387166977,
0.01900576427578926,
0.0... | 0.164566 |
{{}} The following good practices are intended for both cluster administrators and application developers. Use these guidelines to improve the security of your sensitive information in Secret objects, as well as to more effectively manage your Secrets. ## Cluster administrators This section provides good practices that... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/secrets-good-practices.md | main | kubernetes | [
-0.020447412505745888,
0.053621236234903336,
-0.018930498510599136,
0.025049906224012375,
-0.034467533230781555,
0.04499567672610283,
-0.03048662841320038,
-0.0013689661864191294,
0.023878801614046097,
0.015885526314377785,
-0.017445813864469528,
-0.007198497653007507,
0.029598627239465714,
... | 0.08546 |
Protect Secret data after reading Applications still need to protect the value of confidential information after reading it from an environment variable or volume. For example, your application must avoid logging the secret data in the clear or transmitting it to an untrusted party. ### Avoid sharing Secret manifests I... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/secrets-good-practices.md | main | kubernetes | [
-0.07804732024669647,
0.08448170125484467,
0.01339811459183693,
-0.03456314280629158,
0.02739584632217884,
0.0053627328015863895,
0.09315640479326248,
0.031926024705171585,
0.04345176741480827,
0.0057392241433262825,
0.02959199622273445,
-0.039884407073259354,
0.04094373807311058,
-0.02138... | 0.03241 |
The Kubernetes API server is the main point of entry to a cluster for external parties (users and services) interacting with it. As part of this role, the API server has several key built-in security controls, such as audit logging and {{< glossary\_tooltip text="admission controllers" term\_id="admission-controller" >... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/api-server-bypass-risks.md | main | kubernetes | [
-0.00348997232504189,
0.04386480152606964,
0.057903844863176346,
0.03643075376749039,
0.014491270296275616,
0.00423298729583621,
0.050615597516298294,
-0.06863988190889359,
0.10058291256427765,
0.06869126856327057,
-0.0005540922284126282,
-0.04415370896458626,
0.0428873673081398,
-0.041661... | 0.202146 |
authorization](/docs/reference/access-authn-authz/kubelet-authn-authz/#kubelet-authorization). Direct access to the kubelet API is not subject to admission control and is not logged by Kubernetes audit logging. An attacker with direct access to this API may be able to bypass controls that detect or prevent certain acti... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/api-server-bypass-risks.md | main | kubernetes | [
-0.03527543321251869,
0.0963427871465683,
0.0095824571326375,
0.012288632802665234,
-0.04216645285487175,
-0.01567482389509678,
0.06221451237797737,
-0.029572876170277596,
0.08713215589523315,
0.029750840738415718,
-0.04521501809358597,
-0.06637467443943024,
0.024480143561959267,
-0.053340... | 0.133944 |
attacker with access to this socket can launch new containers or interact with running containers. At the cluster level, the impact of this access depends on whether the containers that run on the compromised node have access to Secrets or other confidential data that an attacker could use to escalate privileges to oth... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/api-server-bypass-risks.md | main | kubernetes | [
0.01616837829351425,
0.07714080065488815,
0.004234373103827238,
0.006428350228816271,
-0.024823376908898354,
-0.003395094070583582,
0.0063696387223899364,
0.0038459906354546547,
0.03436077758669853,
0.0008084753062576056,
-0.0006836739485152066,
-0.008094623684883118,
0.024404902011156082,
... | 0.171679 |
This page provides an overview of available configuration options and best practices for cluster multi-tenancy. Sharing clusters saves costs and simplifies administration. However, sharing clusters also presents challenges such as security, fairness, and managing \_noisy neighbors\_. Clusters can be shared in many ways... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/multi-tenancy.md | main | kubernetes | [
0.06425614655017853,
-0.0667632594704628,
0.004322873428463936,
-0.031057041138410568,
-0.0411883220076561,
0.016856467351317406,
-0.0358542837202549,
-0.028089040890336037,
0.05502500757575035,
0.008110222406685352,
-0.018079107627272606,
-0.06046770513057709,
0.028205780312418938,
0.0357... | 0.126407 |
offer shared services such as security tools and databases to multiple internal “customers” and a SaaS vendor may also have multiple teams sharing a development cluster. Finally, hybrid architectures are also possible, such as a SaaS provider using a combination of per-customer workloads for sensitive data, combined wi... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/multi-tenancy.md | main | kubernetes | [
0.009127314202487469,
-0.04307650774717331,
-0.012130632065236568,
-0.011361028999090195,
-0.008776315487921238,
-0.007608154322952032,
-0.025481363758444786,
-0.00632266653701663,
0.07988019287586212,
0.0050604501739144325,
0.007837734185159206,
-0.02913093753159046,
0.0757778212428093,
-... | 0.157126 |
helps segment a tenant's workload into a logical and distinct management unit. In fact, a common practice is to isolate every workload in its own namespace, even if multiple workloads are operated by the same tenant. This ensures that each workload has its own identity and can be configured with an appropriate security... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/multi-tenancy.md | main | kubernetes | [
-0.026733210310339928,
-0.010665470734238625,
-0.016314100474119186,
-0.008274011313915253,
-0.032376307994127274,
0.007058960851281881,
0.06871537864208221,
-0.09418817609548569,
0.1092609241604805,
-0.0023128928150981665,
0.01198040135204792,
-0.0025082190986722708,
0.03549662232398987,
... | 0.13633 |
limits will either be throttled or killed, based on the resource type. When resource requests are set lower than limits, each container is guaranteed the requested amount but there may still be some potential for impact across workloads. Quotas cannot protect against all kinds of resource sharing, such as network traff... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/multi-tenancy.md | main | kubernetes | [
0.054835617542266846,
0.02122666873037815,
0.04083048179745674,
-0.002144509693607688,
-0.02731562964618206,
-0.00837717391550541,
0.000024120845409925096,
-0.039605431258678436,
0.08132680505514145,
0.04356490448117256,
-0.038046639412641525,
0.01054918672889471,
0.013703514821827412,
0.0... | 0.141111 |
can configure a separate StorageClass for each tenant and use this to strengthen isolation. If a StorageClass is shared, you should set a [reclaim policy of `Delete`](/docs/concepts/storage/storage-classes/#reclaim-policy) to ensure that a PersistentVolume cannot be reused across different namespaces. ### Sandboxing co... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/multi-tenancy.md | main | kubernetes | [
0.028537504374980927,
0.01365075632929802,
0.032996490597724915,
-0.004636446945369244,
0.009648418985307217,
-0.020625190809369087,
-0.024061499163508415,
-0.082477867603302,
0.07536375522613525,
0.005228754132986069,
0.00281645474024117,
0.001003019162453711,
0.006424794439226389,
-0.032... | 0.137959 |
to implement than sandboxing containers. For example, nodes for each tenant can be configured with taints so that only pods with the corresponding toleration can run on them. A mutating webhook could then be used to automatically add tolerations and node affinities to pods deployed into tenant namespaces so that they r... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/multi-tenancy.md | main | kubernetes | [
0.04776835814118385,
-0.007738375570625067,
0.04446251690387726,
-0.031063158065080643,
-0.0088873989880085,
-0.04207603633403778,
-0.023756200447678566,
-0.03668557479977608,
0.02903454564511776,
0.03590887412428856,
-0.013483094982802868,
-0.05729464441537857,
0.009682249277830124,
-0.02... | 0.181101 |
namespaces in the cluster. In multi-tenant environments where tenants can access pods and other Kubernetes resources, or where stronger isolation is required, it may be necessary to prevent pods from looking up services in other Namespaces. You can restrict cross-namespace DNS lookups by configuring security rules for ... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/multi-tenancy.md | main | kubernetes | [
0.017523085698485374,
-0.06563905626535416,
0.02951577492058277,
-0.038410499691963196,
-0.07536463439464569,
0.006244977470487356,
-0.028335148468613625,
-0.064499132335186,
0.10364919155836105,
0.03831440582871437,
-0.017252445220947266,
-0.061100542545318604,
0.0007036731112748384,
-0.0... | 0.126031 |
just the workload level, since there are often policies that apply to all workloads owned by a single tenant. However, this raises its own problems. Firstly, this makes it difficult or impossible to customize policies to individual workloads, and secondly, it may be challenging to come up with a single level of "tenanc... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/multi-tenancy.md | main | kubernetes | [
-0.0026720936875790358,
-0.06059597060084343,
0.0004359909216873348,
-0.017770513892173767,
-0.045864224433898926,
0.028474804013967514,
0.014804263599216938,
-0.07651599496603012,
0.08877236396074295,
0.026488875970244408,
-0.01993926800787449,
-0.05778920650482178,
0.027614066377282143,
... | 0.080634 |
{{< feature-state for\_k8s\_version="v1.25" state="stable" >}} The Kubernetes [Pod Security Standards](/docs/concepts/security/pod-security-standards/) define different isolation levels for Pods. These standards let you define how you want to restrict the behavior of pods in a clear, consistent fashion. Kubernetes offe... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/pod-security-admission.md | main | kubernetes | [
0.01349037978798151,
0.024236556142568588,
0.08255691826343536,
-0.022472752258181572,
0.032389167696237564,
-0.0006264643743634224,
0.052967365831136703,
-0.03961678966879845,
0.01673617959022522,
0.028137071058154106,
0.024923263117671013,
-0.06121441721916199,
0.023387804627418518,
0.00... | 0.137353 |
given namespace. Exemptions can be statically configured in the [Admission Controller configuration](/docs/tasks/configure-pod-container/enforce-standards-admission-controller/#configure-the-admission-controller). Exemptions must be explicitly enumerated. Requests meeting exemption criteria are \_ignored\_ by the Admis... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/pod-security-admission.md | main | kubernetes | [
-0.02861260622739792,
0.042986173182725906,
0.03238455951213837,
0.033322952687740326,
0.07799186557531357,
-0.0202178992331028,
0.09648182988166809,
-0.061873339116573334,
-0.026371130719780922,
0.0289946086704731,
0.04884212836623192,
-0.057706642895936966,
0.01777803525328636,
0.0471644... | 0.14476 |
This page provides an overview of controlling access to the Kubernetes API. Users access the [Kubernetes API](/docs/concepts/overview/kubernetes-api/) using `kubectl`, client libraries, or by making REST requests. Both human users and [Kubernetes service accounts](/docs/tasks/configure-pod-container/configure-service-a... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/controlling-access.md | main | kubernetes | [
0.0042401449754834175,
0.07801253348588943,
0.01155531220138073,
-0.049125880002975464,
-0.055826615542173386,
-0.03638423606753349,
-0.0053701382130384445,
-0.045848265290260315,
0.09785109013319016,
0.037303097546100616,
-0.06895708292722702,
0.01094577182084322,
-0.00956667959690094,
-0... | 0.134612 |
request to write (`create` or `update`) to the objects in the `projectCaribou` namespace, his authorization is denied. If Bob makes a request to read (`get`) objects in a different namespace such as `projectFish`, then his authorization is denied. Kubernetes authorization requires that you use common REST attributes to... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/controlling-access.md | main | kubernetes | [
-0.009078874252736568,
0.009137546643614769,
-0.03592495992779732,
-0.025673693045973778,
-0.08511779457330704,
-0.03768515586853027,
0.022008003666996956,
-0.05751070752739906,
0.07040531188249588,
0.06833276152610779,
-0.03597582131624222,
-0.049289971590042114,
0.03386605903506279,
-0.0... | 0.1296 |
This checklist aims at providing a basic list of guidance with links to more comprehensive documentation on each topic. It does not claim to be exhaustive and is meant to evolve. On how to read and use this document: - The order of topics does not reflect an order of priority. - Some checklist items are detailed in the... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/security-checklist.md | main | kubernetes | [
0.018166491761803627,
0.04390719532966614,
-0.013558989390730858,
-0.0453965924680233,
0.061414916068315506,
0.06100678816437721,
0.12092047184705734,
-0.034487538039684296,
-0.016276227310299873,
0.048772625625133514,
-0.006012810859829187,
-0.03352821245789528,
0.033788926899433136,
0.00... | 0.083652 |
restricted to not expose the API publicly. Be careful, as many managed Kubernetes distributions are publicly exposing the API server by default. You can then use a bastion host to access the server. The [kubelet](/docs/reference/command-line-tools-reference/kubelet/) API access should be restricted and not exposed publ... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/security-checklist.md | main | kubernetes | [
-0.024085819721221924,
0.03040967509150505,
0.015770575031638145,
-0.0378827266395092,
-0.043730467557907104,
0.0035492856986820698,
-0.048263080418109894,
0.002822320442646742,
0.11852344870567322,
0.031418152153491974,
-0.014776894822716713,
-0.0664994865655899,
0.006368160713464022,
-0.... | 0.099213 |
sandbox the privileges of a process, restricting the calls it is able to make from userspace into the kernel. Kubernetes lets you automatically apply seccomp profiles loaded onto a node to your Pods and containers. Seccomp can improve the security of your workloads by reducing the Linux kernel syscall attack surface av... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/security-checklist.md | main | kubernetes | [
0.025699583813548088,
0.03694396838545799,
0.020225469022989273,
-0.0386824756860733,
-0.0100078284740448,
-0.014517770148813725,
0.0669793039560318,
0.026766899973154068,
0.03281606733798981,
-0.0032732279505580664,
-0.03259919583797455,
-0.05262143537402153,
-0.02287767454981804,
-0.0107... | 0.248595 |
[ ] ConfigMaps are not used to hold confidential data. - [ ] Encryption at rest is configured for the Secret API. - [ ] If appropriate, a mechanism to inject secrets stored in third-party storage is deployed and available. - [ ] Service account tokens are not mounted in pods that don't require them. - [ ] [Bound servic... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/security-checklist.md | main | kubernetes | [
-0.0468502976000309,
0.03566519916057587,
0.020633962005376816,
0.0017748511163517833,
0.008084350265562534,
0.00023347957176156342,
0.0016146848211064935,
0.0182302538305521,
0.07602539658546448,
0.05136294290423393,
-0.020323600620031357,
-0.019944412633776665,
0.011491822078824043,
-0.0... | 0.166971 |
as part of the deployment process in a CI/CD pipeline. The purpose of an image scan is to obtain information about possible vulnerabilities and their prevention in the container image, such as a [Common Vulnerability Scoring System (CVSS)](https://www.first.org/cvss/) score. If the result of the image scans is combined... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/security-checklist.md | main | kubernetes | [
0.015412680804729462,
0.06020132079720497,
-0.01809513568878174,
-0.039898816496133804,
0.0941954031586647,
-0.04057638347148895,
0.015818577259778976,
0.027246108278632164,
-0.026359444484114647,
0.0506168007850647,
0.05616036802530289,
0.0005657029105350375,
0.1064484566450119,
-0.004878... | 0.192332 |
The Pod Security Standards define three different \_policies\_ to broadly cover the security spectrum. These policies are \_cumulative\_ and range from highly-permissive to highly-restrictive. This guide outlines the requirements of each policy. | Profile | Description | | ------ | ----------- | | **Privileged** | Unre... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/pod-security-standards.md | main | kubernetes | [
0.03573038801550865,
0.017509596422314644,
0.023374466225504875,
-0.030142661184072495,
0.0437689907848835,
-0.023016594350337982,
0.04849722608923912,
0.017420222982764244,
-0.0223705992102623,
0.021965710446238518,
0.02557077445089817,
0.019584840163588524,
0.010691283270716667,
0.016830... | 0.156247 |
**Allowed Values** * Undefined/nil * "" | | AppArmor | On supported hosts, the `RuntimeDefault` AppArmor profile is applied by default. The baseline policy should prevent overriding or disabling the default AppArmor profile, or restrict overrides to an allowed set of profiles. **Restricted Fields** * `spec.securityCont... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/pod-security-standards.md | main | kubernetes | [
0.03916124999523163,
0.05547809600830078,
-0.044142790138721466,
-0.06602510064840317,
0.02792145498096943,
-0.03565797209739685,
0.0015411725034937263,
0.03550909832119942,
-0.01586991548538208,
0.030342355370521545,
0.018231503665447235,
-0.07070900499820709,
-0.000686176645103842,
0.075... | 0.093825 |
`true`. | | Running as Non-root user (v1.23+) | Containers must not set runAsUser to 0 **Restricted Fields** * `spec.securityContext.runAsUser` * `spec.containers[*].securityContext.runAsUser` * `spec.initContainers[*].securityContext.runAsUser` * `spec.ephemeralContainers[*].securityContext.runAsUser` **Allowed Values... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/pod-security-standards.md | main | kubernetes | [
0.0021277975756675005,
0.01667182333767414,
-0.12520593404769897,
-0.00786563754081726,
0.022341519594192505,
-0.00018984967027790844,
0.05866308882832527,
0.06863709539175034,
-0.08065735548734665,
-0.004470971878618002,
0.1040763184428215,
-0.09344417601823807,
0.033308908343315125,
0.02... | 0.112476 |
in this case, but that policies in this space need to be defined on a case-by-case basis. SIG Auth may reconsider this position in the future, should a clear need for other profiles arise. ### What's the difference between a security profile and a security context? [Security Contexts](/docs/tasks/configure-pod-containe... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/pod-security-standards.md | main | kubernetes | [
0.03369171544909477,
0.017682770267128944,
0.006468030158430338,
-0.013641019351780415,
0.08159952610731125,
0.007232648320496082,
0.09844572842121124,
0.034631550312042236,
-0.026447618380188942,
-0.009142138063907623,
0.025860585272312164,
-0.04635552316904068,
0.05548914521932602,
0.014... | 0.163215 |
{{% alert title="Removed feature" color="warning" %}} PodSecurityPolicy was [deprecated](/blog/2021/04/08/kubernetes-1-21-release-announcement/#podsecuritypolicy-deprecation) in Kubernetes v1.21, and removed from Kubernetes in v1.25. {{% /alert %}} Instead of using PodSecurityPolicy, you can enforce similar restriction... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/pod-security-policy.md | main | kubernetes | [
0.05532493442296982,
0.06111783906817436,
0.07130323350429535,
0.011621681042015553,
0.10986345261335373,
0.019973961636424065,
0.0584479421377182,
-0.02151602692902088,
0.028346756473183632,
0.026481349021196365,
0.016932737082242966,
-0.01306538563221693,
0.04859011247754097,
0.028492368... | 0.140916 |
This page describes security considerations and best practices specific to the Linux operating system. ## Protection for Secret data on nodes On Linux nodes, memory-backed volumes (such as [`secret`](/docs/concepts/configuration/secret/) volume mounts, or [`emptyDir`](/docs/concepts/storage/volumes/#emptydir) with `med... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/linux-security.md | main | kubernetes | [
-0.003648170502856374,
0.04820530116558075,
-0.03155669942498207,
0.030198128893971443,
0.01454915665090084,
0.03185839205980301,
-0.05580038204789162,
0.043439216911792755,
0.09703045338392258,
0.01859533227980137,
0.010764931328594685,
0.07721397280693054,
0.018500830978155136,
-0.069491... | 0.146647 |
This page describes security considerations and best practices specific to the Windows operating system. ## Protection for Secret data on nodes On Windows, data from Secrets are written out in clear text onto the node's local storage (as compared to using tmpfs / in-memory filesystems on Linux). As a cluster operator, ... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/windows-security.md | main | kubernetes | [
0.00943971797823906,
0.04573294147849083,
-0.032430633902549744,
0.03980685770511627,
-0.008824467658996582,
0.029998524114489555,
0.048699937760829926,
0.04201680049300194,
0.03555106371641159,
0.031129691749811172,
-0.021627869457006454,
-0.011241425760090351,
0.00008552101644454524,
0.0... | 0.0992 |
This section of the Kubernetes documentation aims to help you learn to run workloads more securely, and about the essential aspects of keeping a Kubernetes cluster secure. Kubernetes is based on a cloud-native architecture, and draws on advice from the {{< glossary\_tooltip text="CNCF" term\_id="cncf" >}} about good pr... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/_index.md | main | kubernetes | [
-0.0101968664675951,
0.033669035881757736,
0.0013077780604362488,
-0.03699560835957527,
-0.0011492196936160326,
0.05054908245801926,
0.07442866265773773,
-0.037928033620119095,
0.051835548132658005,
0.058938346803188324,
-0.04153788089752197,
-0.03449641913175583,
0.011260272935032845,
-0.... | 0.167614 |
For more information about policy mechanisms and Kubernetes, read [Policies](/docs/concepts/policy/). ## {{% heading "whatsnext" %}} Learn about related Kubernetes security topics: \* [Securing your cluster](/docs/tasks/administer-cluster/securing-a-cluster/) \* [Known vulnerabilities](/docs/reference/issues-security/o... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/_index.md | main | kubernetes | [
-0.03313971683382988,
0.041527219116687775,
0.002467149868607521,
-0.03231561928987503,
0.004028432536870241,
0.03662671148777008,
0.03501163423061371,
-0.025923339650034904,
0.058995671570301056,
0.05172672122716904,
-0.00890852976590395,
-0.02109397202730179,
0.01060594990849495,
-0.0222... | 0.145894 |
The Kubernetes {{< glossary\_tooltip text="scheduler" term\_id="kube-scheduler" >}} is one of the critical components of the {{< glossary\_tooltip text="control plane" term\_id="control-plane" >}}. This document covers how to improve the security posture of the Scheduler. A misconfigured scheduler can have security imp... | https://github.com/kubernetes/website/blob/main//content/en/docs/concepts/security/hardening-guide/scheduler.md | main | kubernetes | [
-0.11095315963029861,
0.07183930277824402,
0.05422379821538925,
0.03147571161389351,
-0.0069276439025998116,
0.009605959989130497,
0.06770885735750198,
-0.07905273139476776,
0.0709003135561943,
0.02965235337615013,
-0.040645476430654526,
-0.050625286996364594,
0.02642468549311161,
-0.00084... | 0.1194 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.