Skip to content

Commit 7073243

Browse files
authored
Merge pull request #63 from olivercodes/docs-fixes
minor docs updates
2 parents fdfd69a + 7ad82f9 commit 7073243

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

site-src/guides/api-overview.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ selected by the AdminNetworkPolicy, as opposed to implicit deny NetworkPolicy ru
5353
- **Pass**: Traffic that matches a `Pass` rule will skip all further rules from all
5454
numbered ANPs and instead be enforced by the K8s NetworkPolicies.
5555
If there is no K8s NetworkPolicy of BaselineAdminNetworkPolicy rule match
56-
match, traffic will be governed by the implementation. For most implementations,
56+
traffic will be governed by the implementation. For most implementations,
5757
this means "allow", but there may be implementations which have their own policies
5858
outside of the standard Kubernetes APIs.
5959
- **Deny**: Traffic that matches a `Deny` rule will be dropped.
@@ -66,10 +66,10 @@ modified by the admin, or overridden by a higher priority rule.
6666

6767
On the other hand, the `Allow` rules can be used to call out traffic in the cluster
6868
that needs to be allowed for certain components to work as expected (egress to
69-
CoreDNS for example). Those traffic should not be blocked when developers apply
69+
CoreDNS for example). This traffic should not be blocked when developers apply
7070
NetworkPolicy to their Namespaces which isolates the workloads.
7171

72-
AdminNetworkPolicy `Pass` rules allows an admin to delegate security posture for
72+
AdminNetworkPolicy `Pass` rules allow an admin to delegate security posture for
7373
certain traffic to the Namespace owners by overriding any lower precedence Allow
7474
or Deny rules. For example, intra-tenant traffic management can be delegated to tenant
7575
admins explicitly with the use of `Pass` rules. More specifically traffic selected
@@ -92,15 +92,15 @@ Each ANP should define at least one `Ingress` or `Egress` relevant in-cluster tr
9292
along with the associated Action that should occur. In each `gress` rule the user
9393
should AT THE MINIMUM define an `Action`, and at least one `AdminNetworkPolicyPeer`.
9494
Optionally the user may also define select `Ports` to filter traffic on and also
95-
a name for each rule to make management/ reporting easier for Admins.
95+
a name for each rule to make management and reporting easier for Admins.
9696

9797
### AdminNetworkPolicy Status
9898

9999
For `v1alpha1` of this API the ANP status field is simply defined as a list of
100-
[`metav1.condition`](https://github.com/kubernetes/apimachinery/blob/v0.25.0/pkg/apis/meta/v1/types.go#L1464)s. Currently there are no rule as to what these conditions should display,
100+
[`metav1.condition`](https://github.com/kubernetes/apimachinery/blob/v0.25.0/pkg/apis/meta/v1/types.go#L1464)s. Currently there are no rules as to what these conditions should display,
101101
and it is up to each implementation to report what they see fit. For further
102102
API iterations the community may consider standardizing these conditions based on
103-
the usefulness they provide for various implementors.
103+
the usefulness they provide for various implementors.
104104

105105
## The BaselineAdminNetworkPolicy Resource
106106

0 commit comments

Comments
 (0)