Dokumentation
Kubernetes Blog
Schulungen
Partner
Community
Fallstudien
Versions
Release Information
v1.23
v1.22
v1.21
v1.20
v1.19
Deutsch
English
中文 Chinese
한국어 Korean
日本語 Japanese
Français
Español
Bahasa Indonesia
Home
Unterstützte Versionen der Kubernetes-Dokumentation
Setup
Kubernetes herunterladen
Release erstellen
Learning environment
Production environment
Container Runtimes
Installing Kubernetes with deployment tools
Bootstrapping clusters with kubeadm
Installing kubeadm
Troubleshooting kubeadm
Creating a cluster with kubeadm
Customizing components with the kubeadm API
Options for Highly Available Topology
Creating Highly Available Clusters with kubeadm
Set up a High Availability etcd Cluster with kubeadm
Configuring each kubelet in your cluster using kubeadm
Dual-stack support with kubeadm
Installing Kubernetes with kops
Installing Kubernetes with Kubespray
Turnkey Cloud Solutions
Windows in Kubernetes
Windows containers in Kubernetes
Guide for scheduling Windows containers in Kubernetes
Best practices
Considerations for large clusters
Running in multiple zones
Validate node setup
Enforcing Pod Security Standards
PKI certificates and requirements
Kubernetes lokal über Minikube betreiben
Konzepte
Überblick
Was ist Kubernetes?
Kubernetes Komponenten
The Kubernetes API
Working with Kubernetes Objects
Understanding Kubernetes Objects
Kubernetes Object Management
Object Names and IDs
Namespaces
Labels and Selectors
Annotations
Field Selectors
Finalizers
Owners and Dependents
Recommended Labels
Kubernetes Architekur
Nodes
Control Plane-Node Communication
Master-Node Kommunikation
Controllers
Zugrunde liegende Konzepte des Cloud Controller Manager
Container Runtime Interface (CRI)
Garbage Collection
Container
Images
Container Environment
Runtime Class
Container Lifecycle Hooks
Workloads
Pods
Workload Resources
Deployments
ReplicaSet
StatefulSets
DaemonSet
Jobs
Automatic Clean-up for Finished Jobs
CronJob
ReplicationController
Dienste, Lastverteilung und Netzwerkfunktionen
Speicher
Konfiguration
Security
Overview of Cloud Native Security
Pod Security Standards
Pod Security Admission
Pod Security Policies
Controlling Access to the Kubernetes API
Richtlinien
Scheduling, Preemption and Eviction
Kubernetes Scheduler
Assigning Pods to Nodes
Pod Overhead
Taints and Tolerations
Pod Priority and Preemption
Node-pressure Eviction
API-initiated Eviction
Resource Bin Packing for Extended Resources
Scheduling Framework
Scheduler Performance Tuning
Cluster Administration
Certificates
Managing Resources
Cluster Networking
Logging Architecture
Metrics For Kubernetes System Components
System Logs
Traces For Kubernetes System Components
Proxies in Kubernetes
Controller Manager Metriken
Addons Installieren
API Priority and Fairness
Kubernets erweitern
Aufgaben
Werkzeuge installieren
Install and Set Up kubectl on Linux
Install and Set Up kubectl on macOS
Install and Set Up kubectl on Windows
Installieren und konfigurieren von kubectl
Installation von Minikube
Einen Cluster verwalten
Migrating from dockershim
Changing the Container Runtime on a Node from Docker Engine to containerd
Migrate Docker Engine nodes from dockershim to cri-dockerd
Find Out What Container Runtime is Used on a Node
Check whether Dockershim deprecation affects you
Migrating telemetry and security agents from dockershim
Verwaltung mit kubeadm
Certificates
Manage Memory, CPU, and API Resources
Configure Default Memory Requests and Limits for a Namespace
Configure Default CPU Requests and Limits for a Namespace
Configure Minimum and Maximum Memory Constraints for a Namespace
Configure Minimum and Maximum CPU Constraints for a Namespace
Configure Memory and CPU Quotas for a Namespace
Configure a Pod Quota for a Namespace
Install a Network Policy Provider
Use Antrea for NetworkPolicy
Use Calico for NetworkPolicy
Use Cilium for NetworkPolicy
Use Kube-router for NetworkPolicy
Romana for NetworkPolicy
Weave Net for NetworkPolicy
Access Clusters Using the Kubernetes API
Advertise Extended Resources for a Node
Autoscale the DNS Service in a Cluster
Change the default StorageClass
Change the Reclaim Policy of a PersistentVolume
Cloud Controller Manager Administration
Configure Quotas for API Objects
Control CPU Management Policies on the Node
Control Topology Management Policies on a node
Customizing DNS Service
Debugging DNS Resolution
Declare Network Policy
Developing Cloud Controller Manager
Enable Or Disable A Kubernetes API
Enabling Service Topology
Encrypting Secret Data at Rest
Guaranteed Scheduling For Critical Add-On Pods
IP Masquerade Agent User Guide
Limit Storage Consumption
Migrate Replicated Control Plane To Use Cloud Controller Manager
Namespaces Walkthrough
Operating etcd clusters for Kubernetes
Reconfigure a Node's Kubelet in a Live Cluster
Reserve Compute Resources for System Daemons
Running Kubernetes Node Components as a Non-root User
Safely Drain a Node
Securing a Cluster
Set Kubelet parameters via a config file
Share a Cluster with Namespaces
Upgrade A Cluster
Use Cascading Deletion in a Cluster
Using a KMS provider for data encryption
Using CoreDNS for Service Discovery
Using NodeLocal DNSCache in Kubernetes clusters
Using sysctls in a Kubernetes Cluster
Utilizing the NUMA-aware Memory Manager
Monitoring, Logging, and Debugging
Troubleshooting Applications
Debug Pods
Debug Services
Debug a StatefulSet
Debug Init Containers
Debug Running Pods
Determine the Reason for Pod Failure
Get a Shell to a Running Container
Troubleshooting Clusters
Resource metrics pipeline
Tools for Monitoring Resources
Monitor Node Health
Debugging Kubernetes nodes with crictl
Auditing
Developing and debugging services locally using telepresence
Pods und Container konfigurieren
Manage Kubernetes Objects
Declarative Management of Kubernetes Objects Using Configuration Files
Declarative Management of Kubernetes Objects Using Kustomize
Managing Kubernetes Objects Using Imperative Commands
Imperative Management of Kubernetes Objects Using Configuration Files
Update API Objects in Place Using kubectl patch
Managing Secrets
Managing Secrets using kubectl
Managing Secrets using Configuration File
Managing Secrets using Kustomize
Daten in Anwendungen injizieren
Anwendungen ausführen
Run a Stateless Application Using a Deployment
Run a Single-Instance Stateful Application
Run a Replicated Stateful Application
Scale a StatefulSet
Delete a StatefulSet
Force Delete StatefulSet Pods
Horizontal Pod Autoscaler
HorizontalPodAutoscaler Walkthrough
Specifying a Disruption Budget for your Application
Accessing the Kubernetes API from a Pod
Jobs ausführen
Auf Anwendungen in einem Cluster zugreifen
Überwachung, Protokollierung und Fehlerbehebung
Extend Kubernetes
Configure the Aggregation Layer
Use Custom Resources
Extend the Kubernetes API with CustomResourceDefinitions
Versions in CustomResourceDefinitions
Set up an Extension API Server
Configure Multiple Schedulers
Use an HTTP Proxy to Access the Kubernetes API
Set up Konnectivity service
Kubernetes erweitern
TLS
Föderation
Cluster-Daemons verwalten
Service Catalog installieren
Networking
Adding entries to Pod /etc/hosts with HostAliases
Validate IPv4/IPv6 dual-stack
Configure a kubelet image credential provider
Extend kubectl with plugins
Manage HugePages
Schedule GPUs
Tutorials
Hallo Minikube
Kubernetes Grundlagen lernen
Einen Cluster erstellen
Minikube zum Erstellen eines Clusters verwenden
Interaktives Lernprogramm - Erstellen eines Clusters
Eine App bereitstellen
Verwenden von kubectl zum Erstellen eines Deployments
Interaktives Lernprogramm - Bereitstellen einer App
Entdecken Sie Ihre App
Anzeigen von Pods und Nodes
Interaktives Lernprogramm - Entdecken Sie Ihre App
Machen Sie Ihre App öffentlich zugänglich
Verwendung eines Services zum Veröffentlichen Ihrer App
Interaktives Lernprogramm - Ihre App öffentlich zugänglich machen
Skalieren Sie Ihre App
Mehrere Instanzen Ihrer App ausführen
Interaktives Lernprogramm - Skalieren Ihrer App
Aktualisieren Sie Ihre App
Durchführen eines Rolling-Updates
Interaktives Lernprogramm - Aktualisieren Ihrer App
Configuration
Example: Configuring a Java Microservice
Externalizing config using MicroProfile, ConfigMaps and Secrets
Interactive Tutorial - Configuring a Java Microservice
Configuring Redis using a ConfigMap
Security
Apply Pod Security Standards at the Cluster Level
Apply Pod Security Standards at the Namespace Level
Restrict a Container's Access to Resources with AppArmor
Restrict a Container's Syscalls with seccomp
Stateless Applications
Exposing an External IP Address to Access an Application in a Cluster
Example: Deploying PHP Guestbook application with Redis
Stateful Applications
StatefulSet Basics
Example: Deploying WordPress and MySQL with Persistent Volumes
Example: Deploying Cassandra with a StatefulSet
Running ZooKeeper, A Distributed System Coordinator
Services
Using Source IP
Referenzen
Standardisiertes Glossar
Kubernetes Probleme und Sicherheit
Verwendung der Kubernetes-API
API Zugriff
Well-Known Labels, Annotations and Taints
Audit Annotations
API Referenzinformationen
Föderation API
Node Reference Information
Articles on dockershim Removal and on Using CRI-compatible Runtimes
Ports and Protocols
Setup-Tools Referenzinformationen
Befehlszeilen-Werkzeug Referenzinformationen
kubectl CLI
kubectl Commands
kubectl
JSONPath Support
kubectl for Docker Users
kubectl Spickzettel
kubectl Usage Conventions
Configuration APIs
Client Authentication (v1)
Client Authentication (v1beta1)
kube-apiserver Audit Configuration (v1)
kube-apiserver Configuration (v1)
kube-apiserver Configuration (v1alpha1)
kube-apiserver Encryption Configuration (v1)
kube-proxy Configuration (v1alpha1)
kube-scheduler Configuration (v1beta2)
kube-scheduler Configuration (v1beta3)
kubeadm Configuration (v1beta2)
kubeadm Configuration (v1beta3)
Kubelet Configuration (v1alpha1)
Kubelet Configuration (v1beta1)
Kubelet CredentialProvider (v1alpha1)
WebhookAdmission Configuration (v1)
Scheduling
Scheduler Configuration
Scheduling Policies
Other Tools
Mapping from dockercli to crictl
Tools
Mitmachen
Suggesting content improvements
Contributing new content
Opening a pull request
Documenting for a release
Blogs and case studies
Reviewing changes
Reviewing pull requests
For approvers and reviewers
Lokalisierung der Kubernetes Dokumentation
Bei SIG Docs mitmachen
Rollen und Verantwortlichkeiten
PR Wranglers
Documentation style overview
Content guide
Style guide
Diagram guide
Writing a new topic
Page content types
Content organization
Custom Hugo Shortcodes
Reference Docs Overview
Contributing to the Upstream Kubernetes Code
Quickstart
Generating Reference Documentation for the Kubernetes API
Generating Reference Documentation for kubectl Commands
Generating Reference Pages for Kubernetes Components and Tools
Advanced contributing
Viewing Site Analytics
Docs smoke test page
(EN)
Suchergebnisse
Dokumentation
Aufgaben
Daten in Anwendungen injizieren
Daten in Anwendungen injizieren
Zuletzt geändert June 22, 2021 at 6:12 PM PST:
[de] Remove exec permission on markdown files (bee4cb77c2)
Diese Seite bearbeiten
Unterseite anlegen
Problem zu dieser Seite melden
Kapitel inkl. Unterseiten drucken