[Solved] Unable to connect to the server: dial tcp: lookup with AWS EKS
If you have received the following error while trying to issue commands to kubectl
:
Unable to connect to the server: dial tcp: lookup
Then it may be …
Read Article →91 articles about kubernetes development, tools, and best practices
If you have received the following error while trying to issue commands to kubectl
:
Unable to connect to the server: dial tcp: lookup
Then it may be …
Read Article →Once you have a Docker container, it is really simple to deploy containers to Kubernetes.
kubectl
provides a fantastic way …
Once you have a secret in Kubernetes, if you know it’s name, you can delete it.
You can get the secret name as …
Read Article →Secrets in Kubernetes are encoded using base64
.
If you have the secret name, you can ask for its value. If not, then learn how to get a secret in …!-->
Read Article →You have created a secret, and would like to retrieve it.
kubectl get secrets
This will result in:
NAME …
Read Article →
Secrets allow applications to not hardcode usernames
, passwords
or additional information such as hostnames
, IP addresses
or other protected/sensitive …
Once you have deployed an application into Kubernetes, it will not be available to the outside world.
For this to be possible, you need to expose it …
Read Article →If you find yourself needing to jump into a Kubernetes pod to either diagnose an issue, or run a particular command, you can use the bash
connectivity …
In this comprehensive guide, you will learn how to effectively get and list environment variables within a Kubernetes pod. Understanding how to work …
Read Article →In Kubernetes, a cluster
is a group of machines working together.
By running the kubectl cluster-info
command, we can find out high level information …
The kubeconfig
file is the main configuration file that allows access to a Kubernetes cluster.
When you first create your Kubernetes cluster, you are …
Read Article →Kubernetes secrets is a great way to store secret values that only Kubernetes can access in your hosted applications.
There are times when you might …
Read Article →