Skip to content

Commit 35b521f

Browse files
authored
Merge pull request #37464 from windsonsea/seren
Fix inconsistencies in service.md
2 parents f324805 + 5c89050 commit 35b521f

File tree

1 file changed

+9
-10
lines changed
  • content/en/docs/concepts/services-networking

1 file changed

+9
-10
lines changed

content/en/docs/concepts/services-networking/service.md

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -145,7 +145,6 @@ spec:
145145
targetPort: http-web-svc
146146
```
147147

148-
149148
This works even if there is a mixture of Pods in the Service using a single
150149
configured name, with the same network protocol available via different
151150
port numbers. This offers a lot of flexibility for deploying and evolving
@@ -353,7 +352,7 @@ thus is only available to use as-is.
353352

354353
Note that the kube-proxy starts up in different modes, which are determined by its configuration.
355354
- The kube-proxy's configuration is done via a ConfigMap, and the ConfigMap for kube-proxy
356-
effectively deprecates the behaviour for almost all of the flags for the kube-proxy.
355+
effectively deprecates the behavior for almost all of the flags for the kube-proxy.
357356
- The ConfigMap for the kube-proxy does not support live reloading of configuration.
358357
- The ConfigMap parameters for the kube-proxy cannot all be validated and verified on startup.
359358
For example, if your operating system doesn't allow you to run iptables commands,
@@ -420,7 +419,7 @@ The IPVS proxy mode is based on netfilter hook function that is similar to
420419
iptables mode, but uses a hash table as the underlying data structure and works
421420
in the kernel space.
422421
That means kube-proxy in IPVS mode redirects traffic with lower latency than
423-
kube-proxy in iptables mode, with much better performance when synchronising
422+
kube-proxy in iptables mode, with much better performance when synchronizing
424423
proxy rules. Compared to the other proxy modes, IPVS mode also supports a
425424
higher throughput of network traffic.
426425

@@ -662,7 +661,8 @@ Kubernetes `ServiceTypes` allow you to specify what kind of Service you want.
662661
* [`ExternalName`](#externalname): Maps the Service to the contents of the
663662
`externalName` field (e.g. `foo.bar.example.com`), by returning a `CNAME` record
664663
with its value. No proxying of any kind is set up.
665-
{{< note >}}You need either `kube-dns` version 1.7 or CoreDNS version 0.0.8 or higher
664+
{{< note >}}
665+
You need either `kube-dns` version 1.7 or CoreDNS version 0.0.8 or higher
666666
to use the `ExternalName` type.
667667
{{< /note >}}
668668

@@ -740,11 +740,11 @@ kube-proxy only selects the loopback interface for NodePort Services.
740740
The default for `--nodeport-addresses` is an empty list.
741741
This means that kube-proxy should consider all available network interfaces for NodePort.
742742
(That's also compatible with earlier Kubernetes releases.)
743-
Note that this Service is visible as `<NodeIP>:spec.ports[*].nodePort`
744-
and `.spec.clusterIP:spec.ports[*].port`.
743+
{{< note >}}
744+
This Service is visible as `<NodeIP>:spec.ports[*].nodePort` and `.spec.clusterIP:spec.ports[*].port`.
745745
If the `--nodeport-addresses` flag for kube-proxy or the equivalent field
746746
in the kube-proxy configuration file is set, `<NodeIP>` would be a filtered node IP address (or possibly IP addresses).
747-
747+
{{< /note >}}
748748

749749
### Type LoadBalancer {#loadbalancer}
750750

@@ -793,7 +793,6 @@ _As an alpha feature_, you can configure a load balanced Service to
793793
[omit](#load-balancer-nodeport-allocation) assigning a node port, provided that the
794794
cloud provider implementation supports this.
795795

796-
797796
{{< note >}}
798797

799798
On **Azure**, if you want to use a user-specified public type `loadBalancerIP`, you first need
@@ -1400,7 +1399,7 @@ fail with a message indicating an IP address could not be allocated.
14001399
In the control plane, a background controller is responsible for creating that
14011400
map (needed to support migrating from older versions of Kubernetes that used
14021401
in-memory locking). Kubernetes also uses controllers to check for invalid
1403-
assignments (eg due to administrator intervention) and for cleaning up allocated
1402+
assignments (e.g. due to administrator intervention) and for cleaning up allocated
14041403
IP addresses that are no longer used by any Services.
14051404

14061405
#### IP address ranges for `type: ClusterIP` Services {#service-ip-static-sub-range}
@@ -1476,7 +1475,7 @@ through a load-balancer, though in those cases the client IP does get altered.
14761475

14771476
#### IPVS
14781477

1479-
iptables operations slow down dramatically in large scale cluster e.g 10,000 Services.
1478+
iptables operations slow down dramatically in large scale cluster e.g. 10,000 Services.
14801479
IPVS is designed for load balancing and based on in-kernel hash tables.
14811480
So you can achieve performance consistency in large number of Services from IPVS-based kube-proxy.
14821481
Meanwhile, IPVS-based kube-proxy has more sophisticated load balancing algorithms

0 commit comments

Comments
 (0)