Skip to content

Commit 1dec188

Browse files
authored
Merge pull request #32501 from guresonur/patch-1
Update service.md
2 parents a55bc55 + fe86ff7 commit 1dec188

File tree

1 file changed

+11
-12
lines changed
  • content/en/docs/concepts/services-networking

1 file changed

+11
-12
lines changed

content/en/docs/concepts/services-networking/service.md

Lines changed: 11 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ spec:
125125
image: nginx:11.14.2
126126
ports:
127127
- containerPort: 80
128-
name: http-web-service
128+
name: http-web-svc
129129
130130
---
131131
apiVersion: v1
@@ -139,7 +139,7 @@ spec:
139139
- name: name-of-service-port
140140
protocol: TCP
141141
port: 80
142-
targetPort: http-web-service
142+
targetPort: http-web-svc
143143
```
144144

145145

@@ -217,10 +217,10 @@ In the example above, traffic is routed to the single endpoint defined in
217217
the YAML: `192.0.2.42:9376` (TCP).
218218

219219
{{< note >}}
220-
The Kubernetes API server does not allow proxying to endpoints that are not mapped to
221-
pods. Actions such as `kubectl proxy <service-name>` where the service has no
222-
selector will fail due to this constraint. This prevents the Kubernetes API server
223-
from being used as a proxy to endpoints the caller may not be authorized to access.
220+
The Kubernetes API server does not allow proxying to endpoints that are not mapped to
221+
pods. Actions such as `kubectl proxy <service-name>` where the service has no
222+
selector will fail due to this constraint. This prevents the Kubernetes API server
223+
from being used as a proxy to endpoints the caller may not be authorized to access.
224224
{{< /note >}}
225225

226226
An ExternalName Service is a special case of Service that does not have
@@ -284,7 +284,7 @@ There are a few reasons for using proxying for Services:
284284

285285
Later in this page you can read about various kube-proxy implementations work. Overall,
286286
you should note that, when running `kube-proxy`, kernel level rules may be
287-
modified (for example, iptables rules might get created), which won't get cleaned up,
287+
modified (for example, iptables rules might get created), which won't get cleaned up,
288288
in some cases until you reboot. Thus, running kube-proxy is something that should
289289
only be done by an administrator which understands the consequences of having a
290290
low level, privileged network proxying service on a computer. Although the `kube-proxy`
@@ -299,7 +299,6 @@ Note that the kube-proxy starts up in different modes, which are determined by i
299299
- The ConfigMap parameters for the kube-proxy cannot all be validated and verified on startup. For example, if your operating system doesn't allow you to run iptables commands, the standard kernel kube-proxy implementation will not work. Likewise, if you have an operating system which doesn't support `netsh`, it will not run in Windows userspace mode.
300300

301301
### User space proxy mode {#proxy-mode-userspace}
302-
{{< feature-state for_k8s_version="v1.23" state="deprecated" >}}
303302

304303
In this (legacy) mode, kube-proxy watches the Kubernetes control plane for the addition and
305304
removal of Service and Endpoint objects. For each Service it opens a
@@ -742,13 +741,13 @@ Your cluster must have the `ServiceLoadBalancerClass` [feature gate](/docs/refer
742741
other versions of Kubernetes, check the documentation for that release.
743742
By default, `spec.loadBalancerClass` is `nil` and a `LoadBalancer` type of Service uses
744743
the cloud provider's default load balancer implementation if the cluster is configured with
745-
a cloud provider using the `--cloud-provider` component flag.
744+
a cloud provider using the `--cloud-provider` component flag.
746745
If `spec.loadBalancerClass` is specified, it is assumed that a load balancer
747746
implementation that matches the specified class is watching for Services.
748747
Any default load balancer implementation (for example, the one provided by
749748
the cloud provider) will ignore Services that have this field set.
750749
`spec.loadBalancerClass` can be set on a Service of type `LoadBalancer` only.
751-
Once set, it cannot be changed.
750+
Once set, it cannot be changed.
752751
The value of `spec.loadBalancerClass` must be a label-style identifier,
753752
with an optional prefix such as "`internal-vip`" or "`example.com/internal-vip`".
754753
Unprefixed names are reserved for end-users.
@@ -1031,7 +1030,7 @@ There are other annotations to manage Classic Elastic Load Balancers that are de
10311030

10321031
service.beta.kubernetes.io/aws-load-balancer-security-groups: "sg-53fae93f"
10331032
# A list of existing security groups to be configured on the ELB created. Unlike the annotation
1034-
# service.beta.kubernetes.io/aws-load-balancer-extra-security-groups, this replaces all other security groups previously assigned to the ELB and also overrides the creation
1033+
# service.beta.kubernetes.io/aws-load-balancer-extra-security-groups, this replaces all other security groups previously assigned to the ELB and also overrides the creation
10351034
# of a uniquely generated security group for this ELB.
10361035
# The first security group ID on this list is used as a source to permit incoming traffic to target worker nodes (service traffic and health checks).
10371036
# If multiple ELBs are configured with the same security group ID, only a single permit line will be added to the worker node security groups, that means if you delete any
@@ -1041,7 +1040,7 @@ There are other annotations to manage Classic Elastic Load Balancers that are de
10411040
service.beta.kubernetes.io/aws-load-balancer-extra-security-groups: "sg-53fae93f,sg-42efd82e"
10421041
# A list of additional security groups to be added to the created ELB, this leaves the uniquely generated security group in place, this ensures that every ELB
10431042
# has a unique security group ID and a matching permit line to allow traffic to the target worker nodes (service traffic and health checks).
1044-
# Security groups defined here can be shared between services.
1043+
# Security groups defined here can be shared between services.
10451044

10461045
service.beta.kubernetes.io/aws-load-balancer-target-node-labels: "ingress-gw,gw-name=public-api"
10471046
# A comma separated list of key-value pairs which are used

0 commit comments

Comments
 (0)