Skip to content

Commit 7af1ee9

Browse files
authored
Remove s390x references (#388)
* Remove s390x references Signed-off-by: Derek Nola <derek.nola@suse.com> * Remove dead link Signed-off-by: Derek Nola <derek.nola@suse.com> --------- Signed-off-by: Derek Nola <derek.nola@suse.com>
1 parent 6f2182c commit 7af1ee9

File tree

4 files changed

+3
-7
lines changed

4 files changed

+3
-7
lines changed

docs/installation/requirements.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,6 @@ K3s is available for the following architectures:
1818
- x86_64
1919
- armhf
2020
- arm64/aarch64
21-
- s390x
2221

2322
:::warning ARM64 Page Size
2423

@@ -169,7 +168,7 @@ The VXLAN port on nodes should not be exposed to the world as it opens up your c
169168
:::
170169

171170
:::danger
172-
Flannel relies on the [Bridge CNI plugin](https://www.cni.dev/plugins/current/main/bridge/) to create a L2 network that switches traffic. Rogue pods with `NET_RAW` capabilities can abuse that L2 network to launch attacks such as [ARP spoofing](https://static.sched.com/hosted_files/kccncna19/72/ARP%20DNS%20spoof.pdf). Therefore, as documented in the [Kubernetes docs](https://kubernetes.io/docs/concepts/security/pod-security-standards/), please set a restricted profile that disables `NET_RAW` on non-trustable pods.
171+
Flannel relies on the [Bridge CNI plugin](https://www.cni.dev/plugins/current/main/bridge/) to create a L2 network that switches traffic. Rogue pods with `NET_RAW` capabilities can abuse that L2 network to launch attacks such as ARP spoofing. Therefore, as documented in the [Kubernetes docs](https://kubernetes.io/docs/concepts/security/pod-security-standards/), please set a restricted profile that disables `NET_RAW` on non-trustable pods.
173172
:::
174173

175174
### Inbound Rules for K3s Nodes

i18n/ja/docusaurus-plugin-content-docs/current/installation/requirements.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,6 @@ K3sは以下のアーキテクチャで利用可能です:
1818
- x86_64
1919
- armhf
2020
- arm64/aarch64
21-
- s390x
2221

2322
:::warning ARM64 ページサイズ
2423

i18n/kr/docusaurus-plugin-content-docs/current/installation/requirements.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,6 @@ K3s is available for the following architectures:
1818
- x86_64
1919
- armhf
2020
- arm64/aarch64
21-
- s390x
2221

2322
:::warning ARM64 Page Size
2423

@@ -127,7 +126,7 @@ The VXLAN port on nodes should not be exposed to the world as it opens up your c
127126
:::
128127

129128
:::danger
130-
Flannel relies on the [Bridge CNI plugin](https://www.cni.dev/plugins/current/main/bridge/) to create a L2 network that switches traffic. Rogue pods with `NET_RAW` capabilities can abuse that L2 network to launch attacks such as [ARP spoofing](https://static.sched.com/hosted_files/kccncna19/72/ARP%20DNS%20spoof.pdf). Therefore, as documented in the [Kubernetes docs](https://kubernetes.io/docs/concepts/security/pod-security-standards/), please set a restricted profile that disables `NET_RAW` on non-trustable pods.
129+
Flannel relies on the [Bridge CNI plugin](https://www.cni.dev/plugins/current/main/bridge/) to create a L2 network that switches traffic. Rogue pods with `NET_RAW` capabilities can abuse that L2 network to launch attacks such as ARP spoofing. Therefore, as documented in the [Kubernetes docs](https://kubernetes.io/docs/concepts/security/pod-security-standards/), please set a restricted profile that disables `NET_RAW` on non-trustable pods.
131130
:::
132131

133132
### Inbound Rules for K3s Nodes

i18n/zh/docusaurus-plugin-content-docs/current/installation/requirements.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,6 @@ K3s is available for the following architectures:
1818
- x86_64
1919
- armhf
2020
- arm64/aarch64
21-
- s390x
2221

2322
:::warning ARM64 Page Size
2423

@@ -127,7 +126,7 @@ The VXLAN port on nodes should not be exposed to the world as it opens up your c
127126
:::
128127

129128
:::danger
130-
Flannel relies on the [Bridge CNI plugin](https://www.cni.dev/plugins/current/main/bridge/) to create a L2 network that switches traffic. Rogue pods with `NET_RAW` capabilities can abuse that L2 network to launch attacks such as [ARP spoofing](https://static.sched.com/hosted_files/kccncna19/72/ARP%20DNS%20spoof.pdf). Therefore, as documented in the [Kubernetes docs](https://kubernetes.io/docs/concepts/security/pod-security-standards/), please set a restricted profile that disables `NET_RAW` on non-trustable pods.
129+
Flannel relies on the [Bridge CNI plugin](https://www.cni.dev/plugins/current/main/bridge/) to create a L2 network that switches traffic. Rogue pods with `NET_RAW` capabilities can abuse that L2 network to launch attacks such as ARP spoofing. Therefore, as documented in the [Kubernetes docs](https://kubernetes.io/docs/concepts/security/pod-security-standards/), please set a restricted profile that disables `NET_RAW` on non-trustable pods.
131130
:::
132131

133132
### Inbound Rules for K3s Nodes

0 commit comments

Comments
 (0)