Skip to content

Commit 6fb319b

Browse files
committed
Merge remote-tracking branch 'upstream/main' into dev-1.24
2 parents dd1f2f1 + f89e0ba commit 6fb319b

File tree

97 files changed

+415
-326
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

97 files changed

+415
-326
lines changed

Makefile

Lines changed: 13 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -28,28 +28,30 @@ module-init:
2828

2929
all: build ## Build site with production settings and put deliverables in ./public
3030

31-
build: module-check ## Build site with production settings and put deliverables in ./public
32-
hugo --minify
31+
build: module-check ## Build site with non-production settings and put deliverables in ./public
32+
hugo --minify --environment development
3333

3434
build-preview: module-check ## Build site with drafts and future posts enabled
35-
hugo --buildDrafts --buildFuture
35+
hugo --buildDrafts --buildFuture --environment preview
3636

3737
deploy-preview: ## Deploy preview site via netlify
38-
hugo --enableGitInfo --buildFuture -b $(DEPLOY_PRIME_URL)
38+
hugo --enableGitInfo --buildFuture --environment preview -b $(DEPLOY_PRIME_URL)
3939

4040
functions-build:
4141
$(NETLIFY_FUNC) build functions-src
4242

4343
check-headers-file:
4444
scripts/check-headers-file.sh
4545

46-
production-build: build check-headers-file ## Build the production site and ensure that noindex headers aren't added
46+
production-build: module-check ## Build the production site and ensure that noindex headers aren't added
47+
hugo --minify --environment production
48+
HUGO_ENV=production $(MAKE) check-headers-file
4749

48-
non-production-build: ## Build the non-production site, which adds noindex headers to prevent indexing
49-
hugo --enableGitInfo
50+
non-production-build: module-check ## Build the non-production site, which adds noindex headers to prevent indexing
51+
hugo --enableGitInfo --environment nonprod
5052

5153
serve: module-check ## Boot the development server.
52-
hugo server --buildFuture
54+
hugo server --buildFuture --environment development
5355

5456
docker-image:
5557
@echo -e "$(CCRED)**** The use of docker-image is deprecated. Use container-image instead. ****$(CCEND)"
@@ -70,10 +72,10 @@ container-image: ## Build a container image for the preview of the website
7072
--build-arg HUGO_VERSION=$(HUGO_VERSION)
7173

7274
container-build: module-check
73-
$(CONTAINER_RUN) --read-only --mount type=tmpfs,destination=/tmp,tmpfs-mode=01777 $(CONTAINER_IMAGE) sh -c "npm ci && hugo --minify"
75+
$(CONTAINER_RUN) --read-only --mount type=tmpfs,destination=/tmp,tmpfs-mode=01777 $(CONTAINER_IMAGE) sh -c "npm ci && hugo --minify --environment development"
7476

7577
container-serve: module-check ## Boot the development server using container. Run `make container-image` before this.
76-
$(CONTAINER_RUN) --cap-drop=ALL --cap-add=AUDIT_WRITE --read-only --mount type=tmpfs,destination=/tmp,tmpfs-mode=01777 -p 1313:1313 $(CONTAINER_IMAGE) hugo server --buildFuture --bind 0.0.0.0 --destination /tmp/hugo --cleanDestinationDir
78+
$(CONTAINER_RUN) --cap-drop=ALL --cap-add=AUDIT_WRITE --read-only --mount type=tmpfs,destination=/tmp,tmpfs-mode=01777 -p 1313:1313 $(CONTAINER_IMAGE) hugo server --buildFuture --environment development --bind 0.0.0.0 --destination /tmp/hugo --cleanDestinationDir
7779

7880
test-examples:
7981
scripts/test_examples.sh install
@@ -88,7 +90,7 @@ docker-internal-linkcheck:
8890
$(MAKE) container-internal-linkcheck
8991

9092
container-internal-linkcheck: link-checker-image-pull
91-
$(CONTAINER_RUN) $(CONTAINER_IMAGE) hugo --config config.toml,linkcheck-config.toml --buildFuture
93+
$(CONTAINER_RUN) $(CONTAINER_IMAGE) hugo --config config.toml,linkcheck-config.toml --buildFuture --environment test
9294
$(CONTAINER_ENGINE) run --mount type=bind,source=$(CURDIR),target=/test --rm wjdp/htmltest htmltest
9395

9496
clean-api-reference: ## Clean all directories in API reference directory, preserve _index.md

assets/scss/_custom.scss

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -215,15 +215,25 @@ body.td-404 main .error-details {
215215
}
216216
}
217217

218+
body > footer {
219+
width: 100vw;
220+
}
221+
218222
/* FOOTER */
219223
footer {
220224
background-color: #303030;
221225
background-image: url("/images/texture.png");
222226
padding: 1rem !important;
223227
min-height: initial !important;
224228

225-
.footer__links {
226-
width: 100%;
229+
> div, > p {
230+
max-width: 95%;
231+
@media only screen and (min-width: 768px) {
232+
max-width: calc(min(80rem,90vw)); // avoid spreading too wide
233+
}
234+
}
235+
236+
> .footer__links {
227237
margin: auto;
228238
padding-bottom: 1rem;
229239

@@ -233,6 +243,8 @@ footer {
233243
}
234244

235245
@media only screen and (min-width: 768px) {
246+
max-width: calc(min(60rem,90vw)); // avoid spreading too wide
247+
236248
nav {
237249
display: flex;
238250
flex-direction: row;

content/en/docs/concepts/architecture/cloud-controller.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ when you declare a Service resource that requires them.
7878

7979
## Authorization
8080

81-
This section breaks down the access that the cloud controller managers requires
81+
This section breaks down the access that the cloud controller manager requires
8282
on various API objects, in order to perform its operations.
8383

8484
### Node controller {#authorization-node-controller}

content/en/docs/concepts/cluster-administration/networking.md

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ Azure CNI is available natively in the [Azure Kubernetes Service (AKS)](https://
6767

6868
### Calico
6969

70-
[Calico](https://docs.projectcalico.org/) is an open source networking and network security solution for containers, virtual machines, and native host-based workloads. Calico supports multiple data planes including: a pure Linux eBPF dataplane, a standard Linux networking dataplane, and a Windows HNS dataplane. Calico provides a full networking stack but can also be used in conjunction with [cloud provider CNIs](https://docs.projectcalico.org/networking/determine-best-networking#calico-compatible-cni-plugins-and-cloud-provider-integrations) to provide network policy enforcement.
70+
[Calico](https://projectcalico.docs.tigera.io/about/about-calico/) is an open source networking and network security solution for containers, virtual machines, and native host-based workloads. Calico supports multiple data planes including: a pure Linux eBPF dataplane, a standard Linux networking dataplane, and a Windows HNS dataplane. Calico provides a full networking stack but can also be used in conjunction with [cloud provider CNIs](https://projectcalico.docs.tigera.io/networking/determine-best-networking#calico-compatible-cni-plugins-and-cloud-provider-integrations) to provide network policy enforcement.
7171

7272
### Cilium
7373

@@ -79,9 +79,9 @@ addressing, and it can be used in combination with other CNI plugins.
7979

8080
### CNI-Genie from Huawei
8181

82-
[CNI-Genie](https://github.com/Huawei-PaaS/CNI-Genie) is a CNI plugin that enables Kubernetes to [simultaneously have access to different implementations](https://github.com/Huawei-PaaS/CNI-Genie/blob/master/docs/multiple-cni-plugins/README.md#what-cni-genie-feature-1-multiple-cni-plugins-enables) of the [Kubernetes network model](/docs/concepts/cluster-administration/networking/#the-kubernetes-network-model) in runtime. This includes any implementation that runs as a [CNI plugin](https://github.com/containernetworking/cni#3rd-party-plugins), such as [Flannel](https://github.com/coreos/flannel#flannel), [Calico](https://docs.projectcalico.org/), [Weave-net](https://www.weave.works/products/weave-net/).
82+
[CNI-Genie](https://github.com/cni-genie/CNI-Genie) is a CNI plugin that enables Kubernetes to [simultaneously have access to different implementations](https://github.com/cni-genie/CNI-Genie/blob/master/docs/multiple-cni-plugins/README.md#what-cni-genie-feature-1-multiple-cni-plugins-enables) of the [Kubernetes network model](/docs/concepts/cluster-administration/networking/#the-kubernetes-network-model) in runtime. This includes any implementation that runs as a [CNI plugin](https://github.com/containernetworking/cni#3rd-party-plugins), such as [Flannel](https://github.com/flannel-io/flannel#flannel), [Calico](https://projectcalico.docs.tigera.io/about/about-calico/), [Weave-net](https://www.weave.works/oss/net/).
8383

84-
CNI-Genie also supports [assigning multiple IP addresses to a pod](https://github.com/Huawei-PaaS/CNI-Genie/blob/master/docs/multiple-ips/README.md#feature-2-extension-cni-genie-multiple-ip-addresses-per-pod), each from a different CNI plugin.
84+
CNI-Genie also supports [assigning multiple IP addresses to a pod](https://github.com/cni-genie/CNI-Genie/blob/master/docs/multiple-ips/README.md#feature-2-extension-cni-genie-multiple-ip-addresses-per-pod), each from a different CNI plugin.
8585

8686
### cni-ipvlan-vpc-k8s
8787
[cni-ipvlan-vpc-k8s](https://github.com/lyft/cni-ipvlan-vpc-k8s) contains a set
@@ -104,6 +104,11 @@ network complexity required to deploy Kubernetes at scale within AWS.
104104
[Coil](https://github.com/cybozu-go/coil) is a CNI plugin designed for ease of integration, providing flexible egress networking.
105105
Coil operates with a low overhead compared to bare metal, and allows you to define arbitrary egress NAT gateways for external networks.
106106

107+
### Contiv-VPP
108+
109+
[Contiv-VPP](https://contivpp.io/) is a user-space, performance-oriented network plugin for
110+
Kubernetes, using the [fd.io](https://fd.io/) data plane.
111+
107112
### Contrail / Tungsten Fabric
108113

109114
[Contrail](https://www.juniper.net/us/en/products-services/sdn/contrail/contrail-networking/), based on [Tungsten Fabric](https://tungsten.io), is a truly open, multi-cloud network virtualization and policy management platform. Contrail and Tungsten Fabric are integrated with various orchestration systems such as Kubernetes, OpenShift, OpenStack and Mesos, and provide different isolation modes for virtual machines, containers/pods and bare metal workloads.
@@ -122,7 +127,7 @@ With this toolset DANM is able to provide multiple separated network interfaces,
122127

123128
### Flannel
124129

125-
[Flannel](https://github.com/coreos/flannel#flannel) is a very simple overlay
130+
[Flannel](https://github.com/flannel-io/flannel#flannel) is a very simple overlay
126131
network that satisfies the Kubernetes requirements. Many
127132
people have reported success with Flannel and Kubernetes.
128133

@@ -188,7 +193,7 @@ at [ovn-kubernetes](https://github.com/openvswitch/ovn-kubernetes).
188193

189194
### Weave Net from Weaveworks
190195

191-
[Weave Net](https://www.weave.works/products/weave-net/) is a
196+
[Weave Net](https://www.weave.works/oss/net/) is a
192197
resilient and simple to use network for Kubernetes and its hosted applications.
193198
Weave Net runs as a [CNI plug-in](https://www.weave.works/docs/net/latest/cni-plugin/)
194199
or stand-alone. In either version, it doesn't require any configuration or extra code

content/en/docs/concepts/cluster-administration/system-logs.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -182,7 +182,8 @@ There are two types of system components: those that run in a container and thos
182182
that do not run in a container. For example:
183183

184184
* The Kubernetes scheduler and kube-proxy run in a container.
185-
* The kubelet and container runtime, for example Docker, do not run in containers.
185+
* The kubelet and {{<glossary_tooltip term_id="container-runtime" text="container runtime">}}
186+
do not run in containers.
186187

187188
On machines with systemd, the kubelet and container runtime write to journald.
188189
Otherwise, they write to `.log` files in the `/var/log` directory.

content/en/docs/concepts/storage/volumes.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -858,7 +858,7 @@ operations from the existing in-tree plugin to the `rbd.csi.ceph.com` {{<
858858
glossary_tooltip text="CSI" term_id="csi" >}} driver. In order to use this
859859
feature, the
860860
[Ceph CSI driver](https://github.com/ceph/ceph-csi)
861-
must be installed on the cluster and the `CSIMigration` and `CSIMigrationRBD`
861+
must be installed on the cluster and the `CSIMigration` and `csiMigrationRBD`
862862
[feature gates](/docs/reference/command-line-tools-reference/feature-gates/)
863863
must be enabled.
864864

@@ -1133,6 +1133,7 @@ spec:
11331133
volumeMounts:
11341134
- name: workdir1
11351135
mountPath: /logs
1136+
# The variable expansion uses round brackets (not curly brackets).
11361137
subPathExpr: $(POD_NAME)
11371138
restartPolicy: Never
11381139
volumes:

content/en/docs/reference/command-line-tools-reference/feature-gates.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ different Kubernetes components.
8888
| `CSIMigrationOpenStack` | `true` | Beta | 1.18 | |
8989
| `CSIMigrationvSphere` | `false` | Beta | 1.19 | |
9090
| `CSIMigrationPortworx` | `false` | Alpha | 1.23 | |
91-
| `CSIMigrationRBD` | `false` | Alpha | 1.23 | |
91+
| `csiMigrationRBD` | `false` | Alpha | 1.23 | |
9292
| `CSIStorageCapacity` | `false` | Alpha | 1.19 | 1.20 |
9393
| `CSIStorageCapacity` | `true` | Beta | 1.21 | |
9494
| `CSIVolumeHealth` | `false` | Alpha | 1.21 | |
@@ -653,9 +653,9 @@ Each feature gate is designed for enabling/disabling a specific feature:
653653
operations from the GCE-PD in-tree plugin to PD CSI plugin. Supports falling
654654
back to in-tree GCE plugin if a node does not have PD CSI plugin installed and
655655
configured. Requires CSIMigration feature flag enabled.
656-
- `CSIMigrationRBD`: Enables shims and translation logic to route volume
656+
- `csiMigrationRBD`: Enables shims and translation logic to route volume
657657
operations from the RBD in-tree plugin to Ceph RBD CSI plugin. Requires
658-
CSIMigration and CSIMigrationRBD feature flags enabled and Ceph CSI plugin
658+
CSIMigration and csiMigrationRBD feature flags enabled and Ceph CSI plugin
659659
installed and configured in the cluster. This flag has been deprecated in
660660
favor of the
661661
`InTreePluginRBDUnregister` feature flag which prevents the registration of
@@ -731,6 +731,7 @@ Each feature gate is designed for enabling/disabling a specific feature:
731731
on resources created from [CustomResourceDefinition](/docs/concepts/extend-kubernetes/api-extension/custom-resources/).
732732
- `DaemonSetUpdateSurge`: Enables the DaemonSet workloads to maintain
733733
availability during update per node.
734+
See [Perform a Rolling Update on a DaemonSet](/docs/tasks/manage-daemon/update-daemon-set/).
734735
- `DefaultPodTopologySpread`: Enables the use of `PodTopologySpread` scheduling plugin to do
735736
[default spreading](/docs/concepts/workloads/pods/pod-topology-spread-constraints/#internal-default-constraints).
736737
- `DelegateFSGroupToCSIDriver`: If supported by the CSI driver, delegates the

content/en/docs/reference/glossary/container-runtime.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ tags:
1515

1616
<!--more-->
1717

18-
Kubernetes supports several container runtimes: {{< glossary_tooltip term_id="docker">}},
18+
Kubernetes supports container runtimes such as
1919
{{< glossary_tooltip term_id="containerd" >}}, {{< glossary_tooltip term_id="cri-o" >}},
20-
and any implementation of the [Kubernetes CRI (Container Runtime
20+
and any other implementation of the [Kubernetes CRI (Container Runtime
2121
Interface)](https://github.com/kubernetes/community/blob/master/contributors/devel/sig-node/container-runtime-interface.md).

content/en/docs/reference/kubectl/conventions.md

Lines changed: 0 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -31,29 +31,6 @@ For `kubectl run` to satisfy infrastructure as code:
3131

3232
You can use the `--dry-run=client` flag to preview the object that would be sent to your cluster, without really submitting it.
3333

34-
{{< note >}}
35-
All `kubectl run` generators are deprecated. See the Kubernetes v1.17 documentation for a [list](https://v1-17.docs.kubernetes.io/docs/reference/kubectl/conventions/#generators) of generators and how they were used.
36-
{{< /note >}}
37-
38-
#### Generators
39-
You can generate the following resources with a kubectl command, `kubectl create --dry-run=client -o yaml`:
40-
41-
* `clusterrole`: Create a ClusterRole.
42-
* `clusterrolebinding`: Create a ClusterRoleBinding for a particular ClusterRole.
43-
* `configmap`: Create a ConfigMap from a local file, directory or literal value.
44-
* `cronjob`: Create a CronJob with the specified name.
45-
* `deployment`: Create a Deployment with the specified name.
46-
* `job`: Create a Job with the specified name.
47-
* `namespace`: Create a Namespace with the specified name.
48-
* `poddisruptionbudget`: Create a PodDisruptionBudget with the specified name.
49-
* `priorityclass`: Create a PriorityClass with the specified name.
50-
* `quota`: Create a Quota with the specified name.
51-
* `role`: Create a Role with single rule.
52-
* `rolebinding`: Create a RoleBinding for a particular Role or ClusterRole.
53-
* `secret`: Create a Secret using specified subcommand.
54-
* `service`: Create a Service using specified subcommand.
55-
* `serviceaccount`: Create a ServiceAccount with the specified name.
56-
5734
### `kubectl apply`
5835

5936
* You can use `kubectl apply` to create or update resources. For more information about using kubectl apply to update resources, see [Kubectl Book](https://kubectl.docs.kubernetes.io).

content/en/docs/setup/best-practices/enforcing-pod-security-standards.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ This page provides an overview of best practices when it comes to enforcing
1515

1616
## Using the built-in Pod Security Admission Controller
1717

18-
{{< feature-state for_k8s_version="v1.22" state="alpha" >}}
18+
{{< feature-state for_k8s_version="v1.23" state="beta" >}}
1919

2020
The [Pod Security Admission Controller](/docs/reference/access-authn-authz/admission-controllers/#podsecurity)
2121
intends to replace the deprecated PodSecurityPolicies.

0 commit comments

Comments
 (0)