Skip to content

Commit 0ce9e23

Browse files
Merge branch 'kubernetes:main' into main
2 parents 4b8e05b + 3b4199e commit 0ce9e23

File tree

125 files changed

+1911
-2417
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

125 files changed

+1911
-2417
lines changed

OWNERS

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ emeritus_approvers:
1111
# - chenopis, commented out to disable PR assignments
1212
# - irvifa, commented out to disable PR assignments
1313
# - jaredbhatti, commented out to disable PR assignments
14+
# - jimangel, commented out to disable PR assignments
1415
# - kbarnard10, commented out to disable PR assignments
1516
# - steveperry-53, commented out to disable PR assignments
1617
- stewart-yu

README-ja.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ Hugo(Extended version)を使用してWebサイトをローカルで実行する
1616
このリポジトリを使用するには、以下をローカルにインストールする必要があります。
1717

1818
- [npm](https://www.npmjs.com/)
19-
- [Go](https://golang.org/)
19+
- [Go](https://go.dev/)
2020
- [Hugo(Extended version)](https://gohugo.io/)
2121
- [Docker](https://www.docker.com/)などのコンテナランタイム
2222

content/en/blog/_posts/2022-12-13-host-process-containers-ga/index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ closed and the storage will be unmounted.
5454

5555
HostProcess and Linux privileged containers enable similar scenarios but differ
5656
greatly in their implementation (hence the naming difference). HostProcess containers
57-
have their own [PodSecurityContext](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.25/#windowssecuritycontextoptions-v1-core) fields.
57+
have their own [PodSecurityContext](/docs/reference/generated/kubernetes-api/v1.25/#windowssecuritycontextoptions-v1-core) fields.
5858
Those used to configure Linux privileged containers **do not** apply. Enabling privileged access to a Windows host is a
5959
fundamentally different process than with Linux so the configuration and
6060
capabilities of each differ significantly. Below is a diagram detailing the
@@ -110,7 +110,7 @@ Please note that within a Pod, you can't mix HostProcess containers with normal
110110

111111
- Work through [Create a Windows HostProcess Pod](/docs/tasks/configure-pod-container/create-hostprocess-pod/)
112112

113-
- Read about Kubernetes [Pod Security Standards](/docs/concepts/security/pod-security-standards/) and [Pod Security Admission](docs/concepts/security/pod-security-admission/)
113+
- Read about Kubernetes [Pod Security Standards](/docs/concepts/security/pod-security-standards/) and [Pod Security Admission](/docs/concepts/security/pod-security-admission/)
114114

115115
- Read the enhancement proposal [Windows Privileged Containers and Host Networking Mode](https://github.com/kubernetes/enhancements/tree/master/keps/sig-windows/1981-windows-privileged-container-support) (KEP-1981)
116116

content/en/blog/_posts/2022-12-20-validating-admission-policies-alpha/index.md

Lines changed: 13 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -60,12 +60,14 @@ kind: ValidatingAdmissionPolicyBinding
6060
metadata:
6161
name: "demo-binding-test.example.com"
6262
spec:
63-
policy: "demo-policy.example.com"
63+
policyName: "demo-policy.example.com"
6464
matchResources:
6565
namespaceSelector:
66-
- key: environment,
67-
operator: In,
68-
values: ["test"]
66+
matchExpressions:
67+
- key: environment
68+
operator: In
69+
values:
70+
- test
6971
```
7072

7173
This `ValidatingAdmissionPolicyBinding` resource binds the above policy only to
@@ -115,14 +117,16 @@ kind: ValidatingAdmissionPolicyBinding
115117
metadata:
116118
name: "demo-binding-production.example.com"
117119
spec:
118-
policy: "demo-policy.example.com"
119-
paramsRef:
120+
policyName: "demo-policy.example.com"
121+
paramRef:
120122
name: "demo-params-production.example.com"
121123
matchResources:
122124
namespaceSelector:
123-
- key: environment,
124-
operator: In,
125-
values: ["production"]
125+
matchExpressions:
126+
- key: environment
127+
operator: In
128+
values:
129+
- production
126130
```
127131

128132
```yaml

content/en/docs/concepts/overview/working-with-objects/namespaces.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -147,7 +147,7 @@ kubectl api-resources --namespaced=false
147147

148148
## Automatic labelling
149149

150-
{{< feature-state state="beta" for_k8s_version="1.21" >}}
150+
{{< feature-state for_k8s_version="1.22" state="stable" >}}
151151

152152
The Kubernetes control plane sets an immutable {{< glossary_tooltip text="label" term_id="label" >}}
153153
`kubernetes.io/metadata.name` on all namespaces, provided that the `NamespaceDefaultLabelName`

content/en/docs/concepts/scheduling-eviction/pod-scheduling-readiness.md

Lines changed: 1 addition & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -26,22 +26,7 @@ criteria that Pod should be satisfied before considered schedulable. This field
2626
only when a Pod is created (either by the client, or mutated during admission). After creation,
2727
each schedulingGate can be removed in arbitrary order, but addition of a new scheduling gate is disallowed.
2828

29-
{{<mermaid>}}
30-
stateDiagram-v2
31-
s1: pod created
32-
s2: pod scheduling gated
33-
s3: pod scheduling ready
34-
s4: pod running
35-
if: empty scheduling gates?
36-
[*] --> s1
37-
s1 --> if
38-
s2 --> if: scheduling gate removed
39-
if --> s2: no
40-
if --> s3: yes
41-
s3 --> s4
42-
s4 --> [*]
43-
{{< /mermaid >}}
44-
29+
{{< figure src="/docs/images/podSchedulingGates.svg" alt="pod-scheduling-gates-diagram" caption="Figure. Pod SchedulingGates" class="diagram-large" link="https://mermaid.live/edit#pako:eNplkktTwyAUhf8KgzuHWpukaYszutGlK3caFxQuCVMCGSDVTKf_XfKyPlhxz4HDB9wT5lYAptgHFuBRsdKxenFMClMYFIdfUdRYgbiD6ItJTEbR8wpEq5UpUfnDTf-5cbPoJjcbXdcaE61RVJIiqJvQ_Y30D-OCt-t3tFjcR5wZayiVnIGmkv4NiEfX9jijKTmmRH5jf0sRugOP0HyHUc1m6KGMFP27cM28fwSJDluPpNKaXqVJzmFNfHD2APRKSjnNFx9KhIpmzSfhVls3eHdTRrwG8QnxKfEZUUNeYTDBNbiaKRF_5dSfX-BQQQ0FpnEqQLJWhwIX5hyXsjbYl85wTINrgeC2EZd_xFQy7b_VJ6GCdd-itkxALE84dE3fAqXyIUZya6Qqe711OspVCI2ny2Vv35QqVO3-htt66ZWomAvVcZcv8yTfsiSFfJOydZoKvl_ttjLJVlJsblcJw-czwQ0zr9ZeqGDgeR77b2jD8xdtjtDn" >}}
4530
## Usage example
4631

4732
To mark a Pod not-ready for scheduling, you can create it with one or more scheduling gates like this:

content/en/docs/contribute/advanced.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -190,3 +190,7 @@ When you're ready to start the recording, click Record to Cloud.
190190
When you're ready to stop recording, click Stop.
191191

192192
The video uploads automatically to YouTube.
193+
194+
### Offboarding a SIG Co-chair (Emeritus)
195+
196+
See: [k/community/sig-docs/offboarding.md](https://github.com/kubernetes/community/blob/master/sig-docs/offboarding.md)
Lines changed: 1 addition & 0 deletions
Loading

content/en/docs/reference/access-authn-authz/validating-admission-policy.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -193,9 +193,10 @@ spec:
193193
matchResources:
194194
namespaceSelector:
195195
matchExpressions:
196-
- key: environment,
197-
operator: NotIn,
198-
values: ["test"]
196+
- key: environment
197+
operator: NotIn
198+
values:
199+
- test
199200
```
200201

201202
And have a parameter resource like:
@@ -222,7 +223,7 @@ spec:
222223
matchResources:
223224
namespaceSelector:
224225
matchExpressions:
225-
- key: environment,
226+
- key: environment
226227
operator: Exists
227228
```
228229

Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
---
2+
title: Feature gate
3+
id: feature-gate
4+
date: 2023-01-12
5+
full_link: /docs/reference/command-line-tools-reference/feature-gates/
6+
short_description: >
7+
A way to control whether or not a particular Kubernetes feature is enabled.
8+
9+
aka:
10+
tags:
11+
- fundamental
12+
- operation
13+
---
14+
15+
Feature gates are a set of keys (opaque string values) that you can use to control which
16+
Kubernetes features are enabled in your cluster.
17+
18+
<!--more-->
19+
20+
You can turn these features on or off using the `--feature-gates` command line flag on each Kubernetes component.
21+
Each Kubernetes component lets you enable or disable a set of feature gates that are relevant to that component.
22+
The Kubernetes documentation lists all current
23+
[feature gates](/docs/reference/command-line-tools-reference/feature-gates/) and what they control.

0 commit comments

Comments
 (0)