Container

Container

import "k8s.io/api/core/v1"

Container

A single application container that you want to run within a pod.

  • name (string), required
    Name of the container specified as a DNS_LABEL. Each container in a pod must have a unique name (DNS_LABEL). Cannot be updated.

Image

Entrypoint

  • command ([]string)
    Entrypoint array. Not executed within a shell. The docker image’s ENTRYPOINT is used if this is not provided. Variable references $(VAR_NAME) are expanded using the container’s environment. If a variable cannot be resolved, the reference in the input string will be unchanged. The $(VAR_NAME) syntax can be escaped with a double $$, ie: $$(VAR_NAME). Escaped references will never be expanded, regardless of whether the variable exists or not. Cannot be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell
  • args ([]string)
    Arguments to the entrypoint. The docker image’s CMD is used if this is not provided. Variable references $(VAR_NAME) are expanded using the container’s environment. If a variable cannot be resolved, the reference in the input string will be unchanged. The $(VAR_NAME) syntax can be escaped with a double $$, ie: $$(VAR_NAME). Escaped references will never be expanded, regardless of whether the variable exists or not. Cannot be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell
  • workingDir (string)
    Container’s working directory. If not specified, the container runtime’s default will be used, which might be configured in the container image. Cannot be updated.

Ports

  • ports ([]ContainerPort)
    Patch strategy: merge on key containerPort
    Map: unique values on keys containerPort, protocol will be kept during a merge
    List of ports to expose from the container. Exposing a port here gives the system additional information about the network connections a container uses, but is primarily informational. Not specifying a port here DOES NOT prevent that port from being exposed. Any port which is listening on the default “0.0.0.0” address inside a container will be accessible from the network. Cannot be updated.
    ContainerPort represents a network port in a single container.
    • ports.containerPort (int32), required
      Number of port to expose on the pod’s IP address. This must be a valid port number, 0 < x < 65536.
    • ports.hostIP (string)
      What host IP to bind the external port to.
    • ports.hostPort (int32)
      Number of port to expose on the host. If specified, this must be a valid port number, 0 < x < 65536. If HostNetwork is specified, this must match ContainerPort. Most containers do not need this.
    • ports.name (string)
      If specified, this must be an IANA_SVC_NAME and unique within the pod. Each named port in a pod must have a unique name. Name for the port that can be referred to by services.
    • ports.protocol (string)
      Protocol for port. Must be UDP, TCP, or SCTP. Defaults to “TCP”.

Environment variables

  • env ([]EnvVar)
    Patch strategy: merge on key name
    List of environment variables to set in the container. Cannot be updated.
    EnvVar represents an environment variable present in a Container.
    • env.name (string), required
      Name of the environment variable. Must be a C_IDENTIFIER.
    • env.value (string)
      Variable references $(VAR_NAME) are expanded using the previous defined environment variables in the container and any service environment variables. If a variable cannot be resolved, the reference in the input string will be unchanged. The $(VAR_NAME) syntax can be escaped with a double $$, ie: $$(VAR_NAME). Escaped references will never be expanded, regardless of whether the variable exists or not. Defaults to “”.
    • env.valueFrom (EnvVarSource)
      Source for the environment variable’s value. Cannot be used if value is not empty.
      EnvVarSource represents a source for the value of an EnvVar.
    • env.valueFrom.configMapKeyRef (ConfigMapKeySelector)
      Selects a key of a ConfigMap.
      Selects a key from a ConfigMap.
    • env.valueFrom.configMapKeyRef.key (string), required
      The key to select.
    • env.valueFrom.configMapKeyRef.name (string)
      Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
    • env.valueFrom.configMapKeyRef.optional (boolean)
      Specify whether the ConfigMap or its key must be defined
    • env.valueFrom.fieldRef (ObjectFieldSelector)
      Selects a field of the pod: supports metadata.name, metadata.namespace, metadata.labels['<KEY>'], metadata.annotations['<KEY>'], spec.nodeName, spec.serviceAccountName, status.hostIP, status.podIP, status.podIPs.
    • env.valueFrom.resourceFieldRef (ResourceFieldSelector)
      Selects a resource of the container: only resources limits and requests (limits.cpu, limits.memory, limits.ephemeral-storage, requests.cpu, requests.memory and requests.ephemeral-storage) are currently supported.
    • env.valueFrom.secretKeyRef (SecretKeySelector)
      Selects a key of a secret in the pod’s namespace
      SecretKeySelector selects a key of a Secret.
    • env.valueFrom.secretKeyRef.key (string), required
      The key of the secret to select from. Must be a valid secret key.
    • env.valueFrom.secretKeyRef.name (string)
      Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
    • env.valueFrom.secretKeyRef.optional (boolean)
      Specify whether the Secret or its key must be defined
  • envFrom ([]EnvFromSource)
    List of sources to populate environment variables in the container. The keys defined within a source must be a C_IDENTIFIER. All invalid keys will be reported as an event when the container is starting. When a key exists in multiple sources, the value associated with the last source will take precedence. Values defined by an Env with a duplicate key will take precedence. Cannot be updated.
    EnvFromSource represents the source of a set of ConfigMaps
    • envFrom.configMapRef (ConfigMapEnvSource)
      The ConfigMap to select from
      ConfigMapEnvSource selects a ConfigMap to populate the environment variables with.
      The contents of the target ConfigMap’s Data field will represent the key-value pairs as environment variables.
    • envFrom.configMapRef.name (string)
      Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
    • envFrom.configMapRef.optional (boolean)
      Specify whether the ConfigMap must be defined
    • envFrom.prefix (string)
      An optional identifier to prepend to each key in the ConfigMap. Must be a C_IDENTIFIER.
    • envFrom.secretRef (SecretEnvSource)
      The Secret to select from
      SecretEnvSource selects a Secret to populate the environment variables with.
      The contents of the target Secret’s Data field will represent the key-value pairs as environment variables.
    • envFrom.secretRef.name (string)
      Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
    • envFrom.secretRef.optional (boolean)
      Specify whether the Secret must be defined

Volumes

  • volumeMounts ([]VolumeMount)
    Patch strategy: merge on key mountPath
    Pod volumes to mount into the container’s filesystem. Cannot be updated.
    VolumeMount describes a mounting of a Volume within a container.
    • volumeMounts.mountPath (string), required
      Path within the container at which the volume should be mounted. Must not contain ‘:’.
    • volumeMounts.name (string), required
      This must match the Name of a Volume.
    • volumeMounts.mountPropagation (string)
      mountPropagation determines how mounts are propagated from the host to container and the other way around. When not set, MountPropagationNone is used. This field is beta in 1.10.
    • volumeMounts.readOnly (boolean)
      Mounted read-only if true, read-write otherwise (false or unspecified). Defaults to false.
    • volumeMounts.subPath (string)
      Path within the volume from which the container’s volume should be mounted. Defaults to "” (volume’s root).
    • volumeMounts.subPathExpr (string)
      Expanded path within the volume from which the container’s volume should be mounted. Behaves similarly to SubPath but environment variable references $(VAR_NAME) are expanded using the container’s environment. Defaults to "” (volume’s root). SubPathExpr and SubPath are mutually exclusive.
  • volumeDevices ([]VolumeDevice)
    Patch strategy: merge on key devicePath
    volumeDevices is the list of block devices to be used by the container.
    volumeDevice describes a mapping of a raw block device within a container.
    • volumeDevices.devicePath (string), required
      devicePath is the path inside of the container that the device will be mapped to.
    • volumeDevices.name (string), required
      name must match the name of a persistentVolumeClaim in the pod

Resources

Lifecycle

  • lifecycle (Lifecycle)
    Actions that the management system should take in response to container lifecycle events. Cannot be updated.
    Lifecycle describes actions that the management system should take in response to container lifecycle events. For the PostStart and PreStop lifecycle handlers, management of the container blocks until the action is complete, unless the container process fails, in which case the handler is aborted.
    • lifecycle.postStart (Handler)
      PostStart is called immediately after a container is created. If the handler fails, the container is terminated and restarted according to its restart policy. Other management of the container blocks until the hook completes. More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks
      Handler defines a specific action that should be taken
    • lifecycle.postStart.exec (ExecAction)
      One and only one of the following should be specified. Exec specifies the action to take.
    • lifecycle.postStart.httpGet (HTTPGetAction)
      HTTPGet specifies the http request to perform.
    • lifecycle.postStart.tcpSocket (TCPSocketAction)
      TCPSocket specifies an action involving a TCP port. TCP hooks not yet supported
    • lifecycle.preStop (Handler)
      PreStop is called immediately before a container is terminated due to an API request or management event such as liveness/startup probe failure, preemption, resource contention, etc. The handler is not called if the container crashes or exits. The reason for termination is passed to the handler. The Pod’s termination grace period countdown begins before the PreStop hooked is executed. Regardless of the outcome of the handler, the container will eventually terminate within the Pod’s termination grace period. Other management of the container blocks until the hook completes or until the termination grace period is reached. More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks
      Handler defines a specific action that should be taken
    • lifecycle.preStop.exec (ExecAction)
      One and only one of the following should be specified. Exec specifies the action to take.
    • lifecycle.preStop.httpGet (HTTPGetAction)
      HTTPGet specifies the http request to perform.
    • lifecycle.preStop.tcpSocket (TCPSocketAction)
      TCPSocket specifies an action involving a TCP port. TCP hooks not yet supported
  • terminationMessagePath (string)
    Optional: Path at which the file to which the container’s termination message will be written is mounted into the container’s filesystem. Message written is intended to be brief final status, such as an assertion failure message. Will be truncated by the node if greater than 4096 bytes. The total message length across all containers will be limited to 12kb. Defaults to /dev/termination-log. Cannot be updated.
  • terminationMessagePolicy (string)
    Indicate how the termination message should be populated. File will use the contents of terminationMessagePath to populate the container status message on both success and failure. FallbackToLogsOnError will use the last chunk of container log output if the termination message file is empty and the container exited with an error. The log output is limited to 2048 bytes or 80 lines, whichever is smaller. Defaults to File. Cannot be updated.
  • livenessProbe (Probe)
    Periodic probe of container liveness. Container will be restarted if the probe fails. Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes
    Probe describes a health check to be performed against a container to determine whether it is alive or ready to receive traffic.
    • livenessProbe.exec (ExecAction)
      One and only one of the following should be specified. Exec specifies the action to take.
    • livenessProbe.httpGet (HTTPGetAction)
      HTTPGet specifies the http request to perform.
    • livenessProbe.tcpSocket (TCPSocketAction)
      TCPSocket specifies an action involving a TCP port. TCP hooks not yet supported
    • livenessProbe.initialDelaySeconds (int32)
      Number of seconds after the container has started before liveness probes are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes
    • livenessProbe.periodSeconds (int32)
      How often (in seconds) to perform the probe. Default to 10 seconds. Minimum value is 1.
    • livenessProbe.timeoutSeconds (int32)
      Number of seconds after which the probe times out. Defaults to 1 second. Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes
    • livenessProbe.failureThreshold (int32)
      Minimum consecutive failures for the probe to be considered failed after having succeeded. Defaults to 3. Minimum value is 1.
    • livenessProbe.successThreshold (int32)
      Minimum consecutive successes for the probe to be considered successful after having failed. Defaults to 1. Must be 1 for liveness and startup. Minimum value is 1.
  • readinessProbe (Probe)
    Periodic probe of container service readiness. Container will be removed from service endpoints if the probe fails. Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes
    Probe describes a health check to be performed against a container to determine whether it is alive or ready to receive traffic.
    • readinessProbe.exec (ExecAction)
      One and only one of the following should be specified. Exec specifies the action to take.
    • readinessProbe.httpGet (HTTPGetAction)
      HTTPGet specifies the http request to perform.
    • readinessProbe.tcpSocket (TCPSocketAction)
      TCPSocket specifies an action involving a TCP port. TCP hooks not yet supported
    • readinessProbe.initialDelaySeconds (int32)
      Number of seconds after the container has started before liveness probes are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes
    • readinessProbe.periodSeconds (int32)
      How often (in seconds) to perform the probe. Default to 10 seconds. Minimum value is 1.
    • readinessProbe.timeoutSeconds (int32)
      Number of seconds after which the probe times out. Defaults to 1 second. Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes
    • readinessProbe.failureThreshold (int32)
      Minimum consecutive failures for the probe to be considered failed after having succeeded. Defaults to 3. Minimum value is 1.
    • readinessProbe.successThreshold (int32)
      Minimum consecutive successes for the probe to be considered successful after having failed. Defaults to 1. Must be 1 for liveness and startup. Minimum value is 1.

Security Context

  • securityContext (SecurityContext)
    Security options the pod should run with. More info: https://kubernetes.io/docs/concepts/policy/security-context/ More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
    SecurityContext holds security configuration that will be applied to a container. Some fields are present in both SecurityContext and PodSecurityContext. When both are set, the values in SecurityContext take precedence.
    • securityContext.runAsUser (int64)
      The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.

    • securityContext.runAsNonRoot (boolean)
      Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.

    • securityContext.runAsGroup (int64)
      The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.

    • securityContext.readOnlyRootFilesystem (boolean)
      Whether this container has a read-only root filesystem. Default is false.

    • securityContext.procMount (string)
      procMount denotes the type of proc mount to use for the containers. The default is DefaultProcMount which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled.

    • securityContext.privileged (boolean)
      Run container in privileged mode. Processes in privileged containers are essentially equivalent to root on the host. Defaults to false.

    • securityContext.allowPrivilegeEscalation (boolean)
      AllowPrivilegeEscalation controls whether a process can gain more privileges than its parent process. This bool directly controls if the no_new_privs flag will be set on the container process. AllowPrivilegeEscalation is true always when the container is: 1) run as Privileged 2) has CAP_SYS_ADMIN

    • securityContext.capabilities (Capabilities)
      The capabilities to add/drop when running containers. Defaults to the default set of capabilities granted by the container runtime.
      Adds and removes POSIX capabilities from running containers.

    • securityContext.capabilities.add ([]string)
      Added capabilities

    • securityContext.capabilities.drop ([]string)
      Removed capabilities

    • securityContext.seccompProfile (SeccompProfile)
      The seccomp options to use by this container. If seccomp options are provided at both the pod & container level, the container options override the pod options.
      SeccompProfile defines a pod/container’s seccomp profile settings. Only one profile source may be set.

    • securityContext.seccompProfile.type (string), required
      type indicates which kind of seccomp profile will be applied. Valid options are:

      Localhost - a profile defined in a file on the node should be used. RuntimeDefault - the container runtime default profile should be used. Unconfined - no profile should be applied.

    • securityContext.seccompProfile.localhostProfile (string)
      localhostProfile indicates a profile defined in a file on the node should be used. The profile must be preconfigured on the node to work. Must be a descending path, relative to the kubelet’s configured seccomp profile location. Must only be set if type is “Localhost”.

    • securityContext.seLinuxOptions (SELinuxOptions)
      The SELinux context to be applied to the container. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.
      SELinuxOptions are the labels to be applied to the container

    • securityContext.seLinuxOptions.level (string)
      Level is SELinux level label that applies to the container.

    • securityContext.seLinuxOptions.role (string)
      Role is a SELinux role label that applies to the container.

    • securityContext.seLinuxOptions.type (string)
      Type is a SELinux type label that applies to the container.

    • securityContext.seLinuxOptions.user (string)
      User is a SELinux user label that applies to the container.

    • securityContext.windowsOptions (WindowsSecurityContextOptions)
      The Windows specific settings applied to all containers. If unspecified, the options from the PodSecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.
      WindowsSecurityContextOptions contain Windows-specific options and credentials.

    • securityContext.windowsOptions.gmsaCredentialSpec (string)
      GMSACredentialSpec is where the GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) inlines the contents of the GMSA credential spec named by the GMSACredentialSpecName field.

    • securityContext.windowsOptions.gmsaCredentialSpecName (string)
      GMSACredentialSpecName is the name of the GMSA credential spec to use.

    • securityContext.windowsOptions.runAsUserName (string)
      The UserName in Windows to run the entrypoint of the container process. Defaults to the user specified in image metadata if unspecified. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.

Debugging

  • stdin (boolean)
    Whether this container should allocate a buffer for stdin in the container runtime. If this is not set, reads from stdin in the container will always result in EOF. Default is false.
  • stdinOnce (boolean)
    Whether the container runtime should close the stdin channel after it has been opened by a single attach. When stdin is true the stdin stream will remain open across multiple attach sessions. If stdinOnce is set to true, stdin is opened on container start, is empty until the first client attaches to stdin, and then remains open and accepts data until the client disconnects, at which time stdin is closed and remains closed until the container is restarted. If this flag is false, a container processes that reads from stdin will never receive an EOF. Default is false
  • tty (boolean)
    Whether this container should allocate a TTY for itself, also requires ‘stdin’ to be true. Default is false.

Beta level

  • startupProbe (Probe)
    StartupProbe indicates that the Pod has successfully initialized. If specified, no other probes are executed until this completes successfully. If this probe fails, the Pod will be restarted, just as if the livenessProbe failed. This can be used to provide different probe parameters at the beginning of a Pod’s lifecycle, when it might take a long time to load data or warm a cache, than during steady-state operation. This cannot be updated. This is a beta feature enabled by the StartupProbe feature flag. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes
    Probe describes a health check to be performed against a container to determine whether it is alive or ready to receive traffic.
    • startupProbe.exec (ExecAction)
      One and only one of the following should be specified. Exec specifies the action to take.
    • startupProbe.httpGet (HTTPGetAction)
      HTTPGet specifies the http request to perform.
    • startupProbe.tcpSocket (TCPSocketAction)
      TCPSocket specifies an action involving a TCP port. TCP hooks not yet supported
    • startupProbe.initialDelaySeconds (int32)
      Number of seconds after the container has started before liveness probes are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes
    • startupProbe.periodSeconds (int32)
      How often (in seconds) to perform the probe. Default to 10 seconds. Minimum value is 1.
    • startupProbe.timeoutSeconds (int32)
      Number of seconds after which the probe times out. Defaults to 1 second. Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes
    • startupProbe.failureThreshold (int32)
      Minimum consecutive failures for the probe to be considered failed after having succeeded. Defaults to 3. Minimum value is 1.
    • startupProbe.successThreshold (int32)
      Minimum consecutive successes for the probe to be considered successful after having failed. Defaults to 1. Must be 1 for liveness and startup. Minimum value is 1.

ContainerStatus

ContainerStatus contains details for the current status of this container.

  • name (string), required
    This must be a DNS_LABEL. Each container in a pod must have a unique name. Cannot be updated.
  • image (string), required
    The image the container is running. More info: https://kubernetes.io/docs/concepts/containers/images
  • imageID (string), required
    ImageID of the container’s image.
  • containerID (string)
    Container’s ID in the format ‘docker://<container_id>’.
  • state (ContainerState)
    Details about the container’s current condition.
    ContainerState holds a possible state of container. Only one of its members may be specified. If none of them is specified, the default one is ContainerStateWaiting.
    • state.running (ContainerStateRunning)
      Details about a running container
      ContainerStateRunning is a running state of a container.
    • state.running.startedAt (Time)
      Time at which the container was last (re-)started
      Time is a wrapper around time.Time which supports correct marshaling to YAML and JSON. Wrappers are provided for many of the factory methods that the time package offers.
    • state.terminated (ContainerStateTerminated)
      Details about a terminated container
      ContainerStateTerminated is a terminated state of a container.
    • state.terminated.containerID (string)
      Container’s ID in the format ‘docker://<container_id>’
    • state.terminated.exitCode (int32), required
      Exit status from the last termination of the container
    • state.terminated.startedAt (Time)
      Time at which previous execution of the container started
      Time is a wrapper around time.Time which supports correct marshaling to YAML and JSON. Wrappers are provided for many of the factory methods that the time package offers.
    • state.terminated.finishedAt (Time)
      Time at which the container last terminated
      Time is a wrapper around time.Time which supports correct marshaling to YAML and JSON. Wrappers are provided for many of the factory methods that the time package offers.
    • state.terminated.message (string)
      Message regarding the last termination of the container
    • state.terminated.reason (string)
      (brief) reason from the last termination of the container
    • state.terminated.signal (int32)
      Signal from the last termination of the container
    • state.waiting (ContainerStateWaiting)
      Details about a waiting container
      ContainerStateWaiting is a waiting state of a container.
    • state.waiting.message (string)
      Message regarding why the container is not yet running.
    • state.waiting.reason (string)
      (brief) reason the container is not yet running.
  • lastState (ContainerState)
    Details about the container’s last termination condition.
    ContainerState holds a possible state of container. Only one of its members may be specified. If none of them is specified, the default one is ContainerStateWaiting.
    • lastState.running (ContainerStateRunning)
      Details about a running container
      ContainerStateRunning is a running state of a container.
    • lastState.running.startedAt (Time)
      Time at which the container was last (re-)started
      Time is a wrapper around time.Time which supports correct marshaling to YAML and JSON. Wrappers are provided for many of the factory methods that the time package offers.
    • lastState.terminated (ContainerStateTerminated)
      Details about a terminated container
      ContainerStateTerminated is a terminated state of a container.
    • lastState.terminated.containerID (string)
      Container’s ID in the format ‘docker://<container_id>’
    • lastState.terminated.exitCode (int32), required
      Exit status from the last termination of the container
    • lastState.terminated.startedAt (Time)
      Time at which previous execution of the container started
      Time is a wrapper around time.Time which supports correct marshaling to YAML and JSON. Wrappers are provided for many of the factory methods that the time package offers.
    • lastState.terminated.finishedAt (Time)
      Time at which the container last terminated
      Time is a wrapper around time.Time which supports correct marshaling to YAML and JSON. Wrappers are provided for many of the factory methods that the time package offers.
    • lastState.terminated.message (string)
      Message regarding the last termination of the container
    • lastState.terminated.reason (string)
      (brief) reason from the last termination of the container
    • lastState.terminated.signal (int32)
      Signal from the last termination of the container
    • lastState.waiting (ContainerStateWaiting)
      Details about a waiting container
      ContainerStateWaiting is a waiting state of a container.
    • lastState.waiting.message (string)
      Message regarding why the container is not yet running.
    • lastState.waiting.reason (string)
      (brief) reason the container is not yet running.
  • ready (boolean), required
    Specifies whether the container has passed its readiness probe.
  • restartCount (int32), required
    The number of times the container has been restarted, currently based on the number of dead containers that have not yet been removed. Note that this is calculated from dead containers. But those containers are subject to garbage collection. This value will get capped at 5 by GC.
  • started (boolean)
    Specifies whether the container has passed its startup probe. Initialized as false, becomes true after startupProbe is considered successful. Resets to false when the container is restarted, or if kubelet loses state temporarily. Is always true when no startupProbe is defined.