Skip to content

Commit 2a32814

Browse files
authored
Merge branch 'kubernetes:main' into cbshort-issue-31394
2 parents a819c51 + 5ae78ac commit 2a32814

File tree

90 files changed

+287
-274
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

90 files changed

+287
-274
lines changed

assets/scss/_custom.scss

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -215,15 +215,25 @@ body.td-404 main .error-details {
215215
}
216216
}
217217

218+
body > footer {
219+
width: 100vw;
220+
}
221+
218222
/* FOOTER */
219223
footer {
220224
background-color: #303030;
221225
background-image: url("/images/texture.png");
222226
padding: 1rem !important;
223227
min-height: initial !important;
224228

225-
.footer__links {
226-
width: 100%;
229+
> div, > p {
230+
max-width: 95%;
231+
@media only screen and (min-width: 768px) {
232+
max-width: calc(min(80rem,90vw)); // avoid spreading too wide
233+
}
234+
}
235+
236+
> .footer__links {
227237
margin: auto;
228238
padding-bottom: 1rem;
229239

@@ -233,6 +243,8 @@ footer {
233243
}
234244

235245
@media only screen and (min-width: 768px) {
246+
max-width: calc(min(60rem,90vw)); // avoid spreading too wide
247+
236248
nav {
237249
display: flex;
238250
flex-direction: row;

content/en/docs/concepts/architecture/cloud-controller.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ when you declare a Service resource that requires them.
7878

7979
## Authorization
8080

81-
This section breaks down the access that the cloud controller managers requires
81+
This section breaks down the access that the cloud controller manager requires
8282
on various API objects, in order to perform its operations.
8383

8484
### Node controller {#authorization-node-controller}

content/en/docs/concepts/cluster-administration/networking.md

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ Azure CNI is available natively in the [Azure Kubernetes Service (AKS)](https://
6767

6868
### Calico
6969

70-
[Calico](https://docs.projectcalico.org/) is an open source networking and network security solution for containers, virtual machines, and native host-based workloads. Calico supports multiple data planes including: a pure Linux eBPF dataplane, a standard Linux networking dataplane, and a Windows HNS dataplane. Calico provides a full networking stack but can also be used in conjunction with [cloud provider CNIs](https://docs.projectcalico.org/networking/determine-best-networking#calico-compatible-cni-plugins-and-cloud-provider-integrations) to provide network policy enforcement.
70+
[Calico](https://projectcalico.docs.tigera.io/about/about-calico/) is an open source networking and network security solution for containers, virtual machines, and native host-based workloads. Calico supports multiple data planes including: a pure Linux eBPF dataplane, a standard Linux networking dataplane, and a Windows HNS dataplane. Calico provides a full networking stack but can also be used in conjunction with [cloud provider CNIs](https://projectcalico.docs.tigera.io/networking/determine-best-networking#calico-compatible-cni-plugins-and-cloud-provider-integrations) to provide network policy enforcement.
7171

7272
### Cilium
7373

@@ -79,9 +79,9 @@ addressing, and it can be used in combination with other CNI plugins.
7979

8080
### CNI-Genie from Huawei
8181

82-
[CNI-Genie](https://github.com/Huawei-PaaS/CNI-Genie) is a CNI plugin that enables Kubernetes to [simultaneously have access to different implementations](https://github.com/Huawei-PaaS/CNI-Genie/blob/master/docs/multiple-cni-plugins/README.md#what-cni-genie-feature-1-multiple-cni-plugins-enables) of the [Kubernetes network model](/docs/concepts/cluster-administration/networking/#the-kubernetes-network-model) in runtime. This includes any implementation that runs as a [CNI plugin](https://github.com/containernetworking/cni#3rd-party-plugins), such as [Flannel](https://github.com/coreos/flannel#flannel), [Calico](https://docs.projectcalico.org/), [Weave-net](https://www.weave.works/products/weave-net/).
82+
[CNI-Genie](https://github.com/cni-genie/CNI-Genie) is a CNI plugin that enables Kubernetes to [simultaneously have access to different implementations](https://github.com/cni-genie/CNI-Genie/blob/master/docs/multiple-cni-plugins/README.md#what-cni-genie-feature-1-multiple-cni-plugins-enables) of the [Kubernetes network model](/docs/concepts/cluster-administration/networking/#the-kubernetes-network-model) in runtime. This includes any implementation that runs as a [CNI plugin](https://github.com/containernetworking/cni#3rd-party-plugins), such as [Flannel](https://github.com/flannel-io/flannel#flannel), [Calico](https://projectcalico.docs.tigera.io/about/about-calico/), [Weave-net](https://www.weave.works/oss/net/).
8383

84-
CNI-Genie also supports [assigning multiple IP addresses to a pod](https://github.com/Huawei-PaaS/CNI-Genie/blob/master/docs/multiple-ips/README.md#feature-2-extension-cni-genie-multiple-ip-addresses-per-pod), each from a different CNI plugin.
84+
CNI-Genie also supports [assigning multiple IP addresses to a pod](https://github.com/cni-genie/CNI-Genie/blob/master/docs/multiple-ips/README.md#feature-2-extension-cni-genie-multiple-ip-addresses-per-pod), each from a different CNI plugin.
8585

8686
### cni-ipvlan-vpc-k8s
8787
[cni-ipvlan-vpc-k8s](https://github.com/lyft/cni-ipvlan-vpc-k8s) contains a set
@@ -104,6 +104,11 @@ network complexity required to deploy Kubernetes at scale within AWS.
104104
[Coil](https://github.com/cybozu-go/coil) is a CNI plugin designed for ease of integration, providing flexible egress networking.
105105
Coil operates with a low overhead compared to bare metal, and allows you to define arbitrary egress NAT gateways for external networks.
106106

107+
### Contiv-VPP
108+
109+
[Contiv-VPP](https://contivpp.io/) is a user-space, performance-oriented network plugin for
110+
Kubernetes, using the [fd.io](https://fd.io/) data plane.
111+
107112
### Contrail / Tungsten Fabric
108113

109114
[Contrail](https://www.juniper.net/us/en/products-services/sdn/contrail/contrail-networking/), based on [Tungsten Fabric](https://tungsten.io), is a truly open, multi-cloud network virtualization and policy management platform. Contrail and Tungsten Fabric are integrated with various orchestration systems such as Kubernetes, OpenShift, OpenStack and Mesos, and provide different isolation modes for virtual machines, containers/pods and bare metal workloads.
@@ -122,7 +127,7 @@ With this toolset DANM is able to provide multiple separated network interfaces,
122127

123128
### Flannel
124129

125-
[Flannel](https://github.com/coreos/flannel#flannel) is a very simple overlay
130+
[Flannel](https://github.com/flannel-io/flannel#flannel) is a very simple overlay
126131
network that satisfies the Kubernetes requirements. Many
127132
people have reported success with Flannel and Kubernetes.
128133

@@ -188,7 +193,7 @@ at [ovn-kubernetes](https://github.com/openvswitch/ovn-kubernetes).
188193

189194
### Weave Net from Weaveworks
190195

191-
[Weave Net](https://www.weave.works/products/weave-net/) is a
196+
[Weave Net](https://www.weave.works/oss/net/) is a
192197
resilient and simple to use network for Kubernetes and its hosted applications.
193198
Weave Net runs as a [CNI plug-in](https://www.weave.works/docs/net/latest/cni-plugin/)
194199
or stand-alone. In either version, it doesn't require any configuration or extra code

content/en/docs/concepts/cluster-administration/system-logs.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -182,7 +182,8 @@ There are two types of system components: those that run in a container and thos
182182
that do not run in a container. For example:
183183

184184
* The Kubernetes scheduler and kube-proxy run in a container.
185-
* The kubelet and container runtime, for example Docker, do not run in containers.
185+
* The kubelet and {{<glossary_tooltip term_id="container-runtime" text="container runtime">}}
186+
do not run in containers.
186187

187188
On machines with systemd, the kubelet and container runtime write to journald.
188189
Otherwise, they write to `.log` files in the `/var/log` directory.

content/en/docs/concepts/overview/working-with-objects/namespaces.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -98,6 +98,9 @@ is local to a namespace. This is useful for using the same configuration across
9898
multiple namespaces such as Development, Staging and Production. If you want to reach
9999
across namespaces, you need to use the fully qualified domain name (FQDN).
100100

101+
As a result, all namespace names must be valid
102+
[RFC 1123 DNS labels](/docs/concepts/overview/working-with-objects/names/#dns-label-names).
103+
101104
## Not All Objects are in a Namespace
102105

103106
Most Kubernetes resources (e.g. pods, services, replication controllers, and others) are

content/en/docs/concepts/services-networking/ingress.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -88,6 +88,15 @@ has all the information needed to configure a load balancer or proxy server. Mos
8888
contains a list of rules matched against all incoming requests. Ingress resource only supports rules
8989
for directing HTTP(S) traffic.
9090

91+
If the `ingressClassName` is omitted, a [default Ingress class](#default-ingress-class)
92+
should be defined.
93+
94+
There are some ingress controllers, that work without the definition of a
95+
default `IngressClass`. For example, the Ingress-NGINX controller can be
96+
configured with a [flag](https://kubernetes.github.io/ingress-nginx/#what-is-the-flag-watch-ingress-without-class)
97+
`--watch-ingress-without-class`. It is [recommended](https://kubernetes.github.io/ingress-nginx/#i-have-only-one-instance-of-the-ingresss-nginx-controller-in-my-cluster-what-should-i-do) though, to specify the
98+
default `IngressClass` as shown [below](#default-ingress-class).
99+
91100
### Ingress rules
92101

93102
Each HTTP rule contains the following information:
@@ -339,6 +348,14 @@ an `ingressClassName` specified. You can resolve this by ensuring that at most 1
339348
IngressClass is marked as default in your cluster.
340349
{{< /caution >}}
341350

351+
There are some ingress controllers, that work without the definition of a
352+
default `IngressClass`. For example, the Ingress-NGINX controller can be
353+
configured with a [flag](https://kubernetes.github.io/ingress-nginx/#what-is-the-flag-watch-ingress-without-class)
354+
`--watch-ingress-without-class`. It is [recommended](https://kubernetes.github.io/ingress-nginx/#i-have-only-one-instance-of-the-ingresss-nginx-controller-in-my-cluster-what-should-i-do) though, to specify the
355+
default `IngressClass`:
356+
357+
{{< codenew file="service/networking/default-ingressclass.yaml" >}}
358+
342359
## Types of Ingress
343360

344361
### Ingress backed by a single Service {#single-service-ingress}

content/en/docs/reference/glossary/container-runtime.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ tags:
1515

1616
<!--more-->
1717

18-
Kubernetes supports several container runtimes: {{< glossary_tooltip term_id="docker">}},
18+
Kubernetes supports container runtimes such as
1919
{{< glossary_tooltip term_id="containerd" >}}, {{< glossary_tooltip term_id="cri-o" >}},
20-
and any implementation of the [Kubernetes CRI (Container Runtime
20+
and any other implementation of the [Kubernetes CRI (Container Runtime
2121
Interface)](https://github.com/kubernetes/community/blob/master/contributors/devel/sig-node/container-runtime-interface.md).

content/en/docs/reference/kubectl/conventions.md

Lines changed: 0 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -31,29 +31,6 @@ For `kubectl run` to satisfy infrastructure as code:
3131

3232
You can use the `--dry-run=client` flag to preview the object that would be sent to your cluster, without really submitting it.
3333

34-
{{< note >}}
35-
All `kubectl run` generators are deprecated. See the Kubernetes v1.17 documentation for a [list](https://v1-17.docs.kubernetes.io/docs/reference/kubectl/conventions/#generators) of generators and how they were used.
36-
{{< /note >}}
37-
38-
#### Generators
39-
You can generate the following resources with a kubectl command, `kubectl create --dry-run=client -o yaml`:
40-
41-
* `clusterrole`: Create a ClusterRole.
42-
* `clusterrolebinding`: Create a ClusterRoleBinding for a particular ClusterRole.
43-
* `configmap`: Create a ConfigMap from a local file, directory or literal value.
44-
* `cronjob`: Create a CronJob with the specified name.
45-
* `deployment`: Create a Deployment with the specified name.
46-
* `job`: Create a Job with the specified name.
47-
* `namespace`: Create a Namespace with the specified name.
48-
* `poddisruptionbudget`: Create a PodDisruptionBudget with the specified name.
49-
* `priorityclass`: Create a PriorityClass with the specified name.
50-
* `quota`: Create a Quota with the specified name.
51-
* `role`: Create a Role with single rule.
52-
* `rolebinding`: Create a RoleBinding for a particular Role or ClusterRole.
53-
* `secret`: Create a Secret using specified subcommand.
54-
* `service`: Create a Service using specified subcommand.
55-
* `serviceaccount`: Create a ServiceAccount with the specified name.
56-
5734
### `kubectl apply`
5835

5936
* You can use `kubectl apply` to create or update resources. For more information about using kubectl apply to update resources, see [Kubectl Book](https://kubectl.docs.kubernetes.io).

content/en/docs/setup/best-practices/enforcing-pod-security-standards.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ This page provides an overview of best practices when it comes to enforcing
1515

1616
## Using the built-in Pod Security Admission Controller
1717

18-
{{< feature-state for_k8s_version="v1.22" state="alpha" >}}
18+
{{< feature-state for_k8s_version="v1.23" state="beta" >}}
1919

2020
The [Pod Security Admission Controller](/docs/reference/access-authn-authz/admission-controllers/#podsecurity)
2121
intends to replace the deprecated PodSecurityPolicies.

content/en/docs/tasks/configure-pod-container/assign-memory-resource.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -174,7 +174,7 @@ The output shows that the Container was killed because it is out of memory (OOM)
174174
```shell
175175
lastState:
176176
terminated:
177-
containerID: docker://65183c1877aaec2e8427bc95609cc52677a454b56fcb24340dbd22917c23b10f
177+
containerID: 65183c1877aaec2e8427bc95609cc52677a454b56fcb24340dbd22917c23b10f
178178
exitCode: 137
179179
finishedAt: 2017-06-20T20:52:19Z
180180
reason: OOMKilled

0 commit comments

Comments
 (0)