Skip to content

Commit 4a19082

Browse files
Merge branch 'master' of github.com:kubernetes/website
2 parents 38b9575 + fd227a8 commit 4a19082

File tree

92 files changed

+3798
-1818
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

92 files changed

+3798
-1818
lines changed

content/en/blog/_posts/2017-03-00-Advanced-Scheduling-In-Kubernetes.md

Lines changed: 30 additions & 73 deletions
Original file line numberDiff line numberDiff line change
@@ -20,21 +20,14 @@ For example, if we want to require scheduling on a node that is in the us-centra
2020

2121

2222
```
23-
affinity:
24-
25-
nodeAffinity:
26-
27-
requiredDuringSchedulingIgnoredDuringExecution:
28-
29-
nodeSelectorTerms:
30-
31-
- matchExpressions:
32-
33-
- key: "failure-domain.beta.kubernetes.io/zone"
34-
35-
operator: In
36-
37-
values: ["us-central1-a"]
23+
affinity:
24+
nodeAffinity:
25+
requiredDuringSchedulingIgnoredDuringExecution:
26+
nodeSelectorTerms:
27+
- matchExpressions:
28+
- key: "failure-domain.beta.kubernetes.io/zone"
29+
operator: In
30+
values: ["us-central1-a"]
3831
```
3932

4033

@@ -44,21 +37,14 @@ Preferred rules mean that if nodes match the rules, they will be chosen first, a
4437

4538

4639
```
47-
affinity:
48-
49-
nodeAffinity:
50-
51-
preferredDuringSchedulingIgnoredDuringExecution:
52-
53-
nodeSelectorTerms:
54-
55-
- matchExpressions:
56-
57-
- key: "failure-domain.beta.kubernetes.io/zone"
58-
59-
operator: In
60-
61-
values: ["us-central1-a"]
40+
affinity:
41+
nodeAffinity:
42+
preferredDuringSchedulingIgnoredDuringExecution:
43+
nodeSelectorTerms:
44+
- matchExpressions:
45+
- key: "failure-domain.beta.kubernetes.io/zone"
46+
operator: In
47+
values: ["us-central1-a"]
6248
```
6349

6450

@@ -67,21 +53,14 @@ Node anti-affinity can be achieved by using negative operators. So for instance
6753

6854

6955
```
70-
affinity:
71-
72-
nodeAffinity:
73-
74-
requiredDuringSchedulingIgnoredDuringExecution:
75-
76-
nodeSelectorTerms:
77-
78-
- matchExpressions:
79-
80-
- key: "failure-domain.beta.kubernetes.io/zone"
81-
82-
operator: NotIn
83-
84-
values: ["us-central1-a"]
56+
affinity:
57+
nodeAffinity:
58+
requiredDuringSchedulingIgnoredDuringExecution:
59+
nodeSelectorTerms:
60+
- matchExpressions:
61+
- key: "failure-domain.beta.kubernetes.io/zone"
62+
operator: NotIn
63+
values: ["us-central1-a"]
8564
```
8665

8766

@@ -99,23 +78,19 @@ The kubectl command allows you to set taints on nodes, for example:
9978

10079
```
10180
kubectl taint nodes node1 key=value:NoSchedule
102-
```
81+
```
10382

10483

10584
creates a taint that marks the node as unschedulable by any pods that do not have a toleration for taint with key key, value value, and effect NoSchedule. (The other taint effects are PreferNoSchedule, which is the preferred version of NoSchedule, and NoExecute, which means any pods that are running on the node when the taint is applied will be evicted unless they tolerate the taint.) The toleration you would add to a PodSpec to have the corresponding pod tolerate this taint would look like this
10685

10786

10887

10988
```
110-
tolerations:
111-
112-
- key: "key"
113-
114-
operator: "Equal"
115-
116-
value: "value"
117-
118-
effect: "NoSchedule"
89+
tolerations:
90+
- key: "key"
91+
operator: "Equal"
92+
value: "value"
93+
effect: "NoSchedule"
11994
```
12095

12196

@@ -138,21 +113,13 @@ Let’s look at an example. Say you have front-ends in service S1, and they comm
138113

139114
```
140115
affinity:
141-
142116
podAffinity:
143-
144117
requiredDuringSchedulingIgnoredDuringExecution:
145-
146118
- labelSelector:
147-
148119
matchExpressions:
149-
150120
- key: service
151-
152121
operator: In
153-
154122
values: [“S1”]
155-
156123
topologyKey: failure-domain.beta.kubernetes.io/zone
157124
```
158125

@@ -172,25 +139,15 @@ Here we have a Pod where we specify the schedulerName field:
172139

173140
```
174141
apiVersion: v1
175-
176142
kind: Pod
177-
178143
metadata:
179-
180144
name: nginx
181-
182145
labels:
183-
184146
app: nginx
185-
186147
spec:
187-
188148
schedulerName: my-scheduler
189-
190149
containers:
191-
192150
- name: nginx
193-
194151
image: nginx:1.10
195152
```
196153

content/en/docs/concepts/cluster-administration/flow-control.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ kube-apiserver \
5959
```
6060

6161
Alternatively, you can enable the v1alpha1 version of the API group
62-
with `--runtime-config=flowcontrol.apiserver.k8s.io/v1beta1=true`.
62+
with `--runtime-config=flowcontrol.apiserver.k8s.io/v1alpha1=true`.
6363

6464
The command-line flag `--enable-priority-and-fairness=false` will disable the
6565
API Priority and Fairness feature, even if other flags have enabled it.

content/en/docs/concepts/extend-kubernetes/operator.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -124,6 +124,6 @@ that can act as a [client for the Kubernetes API](/docs/reference/using-api/clie
124124
you implement yourself
125125
* using the [Operator Framework](https://operatorframework.io)
126126
* [Publish](https://operatorhub.io/) your operator for other people to use
127-
* Read [CoreOS' original article](https://coreos.com/blog/introducing-operators.html) that introduced the Operator pattern
127+
* Read [CoreOS' original article](https://web.archive.org/web/20170129131616/https://coreos.com/blog/introducing-operators.html) that introduced the Operator pattern (this is an archived version of the original article).
128128
* Read an [article](https://cloud.google.com/blog/products/containers-kubernetes/best-practices-for-building-kubernetes-operators-and-stateful-apps) from Google Cloud about best practices for building Operators
129129

content/en/docs/concepts/policy/resource-quotas.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ Neither contention nor changes to quota will affect already created resources.
5858
## Enabling Resource Quota
5959

6060
Resource Quota support is enabled by default for many Kubernetes distributions. It is
61-
enabled when the API server `--enable-admission-plugins=` flag has `ResourceQuota` as
61+
enabled when the {{< glossary_tooltip text="API server" term_id="kube-apiserver" >}} `--enable-admission-plugins=` flag has `ResourceQuota` as
6262
one of its arguments.
6363

6464
A resource quota is enforced in a particular namespace when there is a

content/en/docs/concepts/security/pod-security-standards.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ should range from highly restricted to highly flexible:
3232

3333
- **_Privileged_** - Unrestricted policy, providing the widest possible level of permissions. This
3434
policy allows for known privilege escalations.
35-
- **_Baseline/Default_** - Minimally restrictive policy while preventing known privilege
35+
- **_Baseline_** - Minimally restrictive policy while preventing known privilege
3636
escalations. Allows the default (minimally specified) Pod configuration.
3737
- **_Restricted_** - Heavily restricted policy, following current Pod hardening best practices.
3838

@@ -48,9 +48,9 @@ mechanisms (such as gatekeeper), the privileged profile may be an absence of app
4848
rather than an instantiated policy. In contrast, for a deny-by-default mechanism (such as Pod
4949
Security Policy) the privileged policy should enable all controls (disable all restrictions).
5050

51-
### Baseline/Default
51+
### Baseline
5252

53-
The Baseline/Default policy is aimed at ease of adoption for common containerized workloads while
53+
The Baseline policy is aimed at ease of adoption for common containerized workloads while
5454
preventing known privilege escalations. This policy is targeted at application operators and
5555
developers of non-critical applications. The following listed controls should be
5656
enforced/disallowed:
@@ -115,7 +115,9 @@ enforced/disallowed:
115115
<tr>
116116
<td>AppArmor <em>(optional)</em></td>
117117
<td>
118-
On supported hosts, the 'runtime/default' AppArmor profile is applied by default. The default policy should prevent overriding or disabling the policy, or restrict overrides to an allowed set of profiles.<br>
118+
On supported hosts, the 'runtime/default' AppArmor profile is applied by default.
119+
The baseline policy should prevent overriding or disabling the default AppArmor
120+
profile, or restrict overrides to an allowed set of profiles.<br>
119121
<br><b>Restricted Fields:</b><br>
120122
metadata.annotations['container.apparmor.security.beta.kubernetes.io/*']<br>
121123
<br><b>Allowed Values:</b> 'runtime/default', undefined<br>
@@ -175,7 +177,7 @@ well as lower-trust users.The following listed controls should be enforced/disal
175177
<td><strong>Policy</strong></td>
176178
</tr>
177179
<tr>
178-
<td colspan="2"><em>Everything from the default profile.</em></td>
180+
<td colspan="2"><em>Everything from the baseline profile.</em></td>
179181
</tr>
180182
<tr>
181183
<td>Volume Types</td>
@@ -275,7 +277,7 @@ of individual policies are not defined here.
275277

276278
## FAQ
277279

278-
### Why isn't there a profile between privileged and default?
280+
### Why isn't there a profile between privileged and baseline?
279281

280282
The three profiles defined here have a clear linear progression from most secure (restricted) to least
281283
secure (privileged), and cover a broad set of workloads. Privileges required above the baseline

content/en/docs/concepts/services-networking/ingress-controllers.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,7 @@ Kubernetes as a project supports and maintains [AWS](https://github.com/kubernet
4949
* [Skipper](https://opensource.zalando.com/skipper/kubernetes/ingress-controller/) HTTP router and reverse proxy for service composition, including use cases like Kubernetes Ingress, designed as a library to build your custom proxy.
5050
* The [Traefik Kubernetes Ingress provider](https://doc.traefik.io/traefik/providers/kubernetes-ingress/) is an
5151
ingress controller for the [Traefik](https://traefik.io/traefik/) proxy.
52+
* [Tyk Operator](https://github.com/TykTechnologies/tyk-operator) extends Ingress with Custom Resources to bring API Management capabilities to Ingress. Tyk Operator works with the Open Source Tyk Gateway & Tyk Cloud control plane.
5253
* [Voyager](https://appscode.com/products/voyager) is an ingress controller for
5354
[HAProxy](https://www.haproxy.org/#desc).
5455

content/en/docs/concepts/workloads/pods/pod-lifecycle.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,8 +38,7 @@ If a {{< glossary_tooltip term_id="node" >}} dies, the Pods scheduled to that no
3838
are [scheduled for deletion](#pod-garbage-collection) after a timeout period.
3939

4040
Pods do not, by themselves, self-heal. If a Pod is scheduled to a
41-
{{< glossary_tooltip text="node" term_id="node" >}} that then fails,
42-
or if the scheduling operation itself fails, the Pod is deleted; likewise, a Pod won't
41+
{{< glossary_tooltip text="node" term_id="node" >}} that then fails, the Pod is deleted; likewise, a Pod won't
4342
survive an eviction due to a lack of resources or Node maintenance. Kubernetes uses a
4443
higher-level abstraction, called a
4544
{{< glossary_tooltip term_id="controller" text="controller" >}}, that handles the work of

content/en/docs/contribute/localization.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -267,7 +267,7 @@ Teams must merge localized content into the same release branch from which the c
267267

268268
An approver must maintain a development branch by keeping it current with its source branch and resolving merge conflicts. The longer a development branch stays open, the more maintenance it typically requires. Consider periodically merging development branches and opening new ones, rather than maintaining one extremely long-running development branch.
269269

270-
At the beginning of every team milestone, it's helpful to open an issue [comparing upstream changes](https://github.com/kubernetes/website/blob/master/scripts/upstream_changes.py) between the previous development branch and the current development branch.
270+
At the beginning of every team milestone, it's helpful to open an issue comparing upstream changes between the previous development branch and the current development branch. There are two scripts for comparing upstream changes. [`upstream_changes.py`](https://github.com/kubernetes/website/tree/master/scripts#upstream_changespy) is useful for checking the changes made to a specific file. And [`diff_l10n_branches.py`](https://github.com/kubernetes/website/tree/master/scripts#diff_l10n_branchespy) is useful for creating a list of outdated files for a specific localization branch.
271271

272272
While only approvers can open a new development branch and merge pull requests, anyone can open a pull request for a new development branch. No special permissions are required.
273273

content/en/docs/contribute/style/style-guide.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -576,6 +576,10 @@ Avoid making promises or giving hints about the future. If you need to talk abou
576576
an alpha feature, put the text under a heading that identifies it as alpha
577577
information.
578578
579+
An exception to this rule is documentation about announced deprecations
580+
targeting removal in future versions. One example of documentation like this
581+
is the [Deprecated API migration guide](/docs/reference/using-api/deprecation-guide/).
582+
579583
### Avoid statements that will soon be out of date
580584
581585
Avoid words like "currently" and "new." A feature that is new today might not be

content/en/docs/reference/command-line-tools-reference/feature-gates.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -351,7 +351,7 @@ different Kubernetes components.
351351
| `VolumeScheduling` | `false` | Alpha | 1.9 | 1.9 |
352352
| `VolumeScheduling` | `true` | Beta | 1.10 | 1.12 |
353353
| `VolumeScheduling` | `true` | GA | 1.13 | - |
354-
| `VolumeSubpath` | `true` | GA | 1.13 | - |
354+
| `VolumeSubpath` | `true` | GA | 1.10 | - |
355355
| `VolumeSubpathEnvExpansion` | `false` | Alpha | 1.14 | 1.14 |
356356
| `VolumeSubpathEnvExpansion` | `true` | Beta | 1.15 | 1.16 |
357357
| `VolumeSubpathEnvExpansion` | `true` | GA | 1.17 | - |

0 commit comments

Comments
 (0)