Documentazione
Blog di Kubernetes
Formazione
Partner
Community
Casi di Studio
Versions
Release Information
v1.25
v1.24
v1.23
v1.22
v1.21
Italiano (Italian)
English
中文 (Chinese)
한국어 (Korean)
日本語 (Japanese)
Français (French)
Deutsch (German)
Español (Spanish)
Português (Portuguese)
Bahasa Indonesia
Русский (Russian)
Glossary
Home
Available Documentation Versions
Getting started
(EN)
Concetti
Overview
Cos'è Kubernetes?
I componenti di Kubernetes
Le API di Kubernetes
Working with Kubernetes Objects
Understanding Kubernetes Objects
Kubernetes Object Management
Object Names and IDs
Labels and Selectors
Namespaces
Annotations
Field Selectors
Finalizers
Owners and Dependents
Recommended Labels
Architettura di Kubernetes
Nodes
Comunicazione Control Plane - Nodo
Concetti alla base del Cloud Controller Manager
Controller
About cgroup v2
Container Runtime Interface (CRI)
Garbage Collection
Containers
Immagini
Container Environment
Container Lifecycle Hooks
Runtime Class
Windows in Kubernetes
Windows containers in Kubernetes
Guide for scheduling Windows containers in Kubernetes
Workloads
Pods
Pod Lifecycle
Init Containers
Disruptions
Ephemeral Containers
User Namespaces
Downward API
Workload Resources
Deployments
ReplicaSet
StatefulSets
DaemonSet
Jobs
Automatic Clean-up for Finished Jobs
CronJob
ReplicationController
Services, Load Balancing, and Networking
Service
Ingress
Ingress Controllers
EndpointSlices
Network Policies
DNS for Services and Pods
IPv4/IPv6 dual-stack
Topology Aware Hints
Networking on Windows
Service Internal Traffic Policy
Topology-aware traffic routing with topology keys
Storage
Volumes
Persistent Volumes
Projected Volumes
Ephemeral Volumes
Storage Classes
Dynamic Volume Provisioning
Volume Snapshots
Volume Snapshot Classes
CSI Volume Cloning
Storage Capacity
Node-specific Volume Limits
Volume Health Monitoring
Windows Storage
Configurazione
Configuration Best Practices
ConfigMaps
Secrets
Resource Management for Pods and Containers
Organizing Cluster Access Using kubeconfig Files
Resource Management for Windows nodes
Security
Overview of Cloud Native Security
Pod Security Standards
Pod Security Admission
Pod Security Policies
Security For Windows Nodes
Controlling Access to the Kubernetes API
Role Based Access Control Good Practices
Good practices for Kubernetes Secrets
Multi-tenancy
Kubernetes API Server Bypass Risks
Security Checklist
Policies
Limit Ranges
Resource Quotas
Process ID Limits And Reservations
Node Resource Managers
Scheduling, Preemption and Eviction
Kubernetes Scheduler
Assigning Pods to Nodes
Pod Overhead
Pod Topology Spread Constraints
Taints and Tolerations
Scheduling Framework
Scheduler Performance Tuning
Resource Bin Packing
Pod Priority and Preemption
Node-pressure Eviction
API-initiated Eviction
Amministrazione del Cluster
Certificates
Managing Resources
Cluster Networking
Logging Architecture
Metrics For Kubernetes System Components
System Logs
Proxy in Kubernetes
Traces For Kubernetes System Components
API Priority and Fairness
Installing Addons
Extending Kubernetes
Compute, Storage, and Networking Extensions
Network Plugins
Device Plugins
Extending the Kubernetes API
Custom Resources
Kubernetes API Aggregation Layer
Operator pattern
Tasks
(EN)
Tutorials
Hello Minikube
Learn Kubernetes Basics
Create a Cluster
Using Minikube to Create a Cluster
Interactive Tutorial - Creating a Cluster
Deploy an App
Using kubectl to Create a Deployment
Interactive Tutorial - Deploying an App
Explore Your App
Viewing Pods and Nodes
Interactive Tutorial - Exploring Your App
Expose Your App Publicly
Using a Service to Expose Your App
Interactive Tutorial - Exposing Your App
Scale Your App
Running Multiple Instances of Your App
Interactive Tutorial - Scaling Your App
Update Your App
Performing a Rolling Update
Interactive Tutorial - Updating Your App
Configuration
Example: Configuring a Java Microservice
Externalizing config using MicroProfile, ConfigMaps and Secrets
Interactive Tutorial - Configuring a Java Microservice
Configuring Redis using a ConfigMap
Security
Apply Pod Security Standards at the Cluster Level
Apply Pod Security Standards at the Namespace Level
Restrict a Container's Access to Resources with AppArmor
Restrict a Container's Syscalls with seccomp
Stateless Applications
Exposing an External IP Address to Access an Application in a Cluster
Example: Deploying PHP Guestbook application with Redis
Stateful Applications
StatefulSet Basics
Example: Deploying WordPress and MySQL with Persistent Volumes
Example: Deploying Cassandra with a StatefulSet
Running ZooKeeper, A Distributed System Coordinator
Services
Connecting Applications with Services
Using Source IP
Reference
(EN)
Contribute
(EN)
Docs smoke test page
(EN)
Documentazione
Concetti
Amministrazione del Cluster
Amministrazione del Cluster
Proxy in Kubernetes
Ultima modifica June 22, 2021 at 6:21 PM PST:
[it] Remove exec permission on markdown files (2fb4914100)
Modifica
Create child page
Crea issue di documentazione
Print entire section