Skip to content

Commit 7a513e6

Browse files
Fix broken anchor link of #type-nodeport in service.md (#30388)
* Fix broken anchor link of #type-nodeport in service.md * Update anchor link from #nodeport to #type-nodeport Update anchor link from #nodeport to #type-nodeport in overview.md * Update anchor link from #nodeport to #type-nodeport Update anchor link from #nodeport to #type-nodeport in ingress.md * Update anchor link from #nodeport to #type-nodeport Update anchor link from #nodeport to #type-nodeport in troubleshooting-kubeadm.md * Update anchor link from #nodeport to #type-nodeport Update anchor link from #nodeport to #type-nodeport in connecting-frontend-backend.md * Update anchor link from #nodeport to #type-nodeport Update anchor link from #nodeport to #type-nodeport in source-ip.md
1 parent 152082f commit 7a513e6

File tree

6 files changed

+6
-6
lines changed

6 files changed

+6
-6
lines changed

content/en/docs/concepts/configuration/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ DNS server watches the Kubernetes API for new `Services` and creates a set of DN
5555

5656
If you only need access to the port for debugging purposes, you can use the [apiserver proxy](/docs/tasks/access-application-cluster/access-cluster/#manually-constructing-apiserver-proxy-urls) or [`kubectl port-forward`](/docs/tasks/access-application-cluster/port-forward-access-application-cluster/).
5757

58-
If you explicitly need to expose a Pod's port on the node, consider using a [NodePort](/docs/concepts/services-networking/service/#nodeport) Service before resorting to `hostPort`.
58+
If you explicitly need to expose a Pod's port on the node, consider using a [NodePort](/docs/concepts/services-networking/service/#type-nodeport) Service before resorting to `hostPort`.
5959

6060
- Avoid using `hostNetwork`, for the same reasons as `hostPort`.
6161

content/en/docs/concepts/services-networking/ingress.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ graph LR;
5151
An Ingress may be configured to give Services externally-reachable URLs, load balance traffic, terminate SSL / TLS, and offer name-based virtual hosting. An [Ingress controller](/docs/concepts/services-networking/ingress-controllers) is responsible for fulfilling the Ingress, usually with a load balancer, though it may also configure your edge router or additional frontends to help handle the traffic.
5252

5353
An Ingress does not expose arbitrary ports or protocols. Exposing services other than HTTP and HTTPS to the internet typically
54-
uses a service of type [Service.Type=NodePort](/docs/concepts/services-networking/service/#nodeport) or
54+
uses a service of type [Service.Type=NodePort](/docs/concepts/services-networking/service/#type-nodeport) or
5555
[Service.Type=LoadBalancer](/docs/concepts/services-networking/service/#loadbalancer).
5656

5757
## Prerequisites

content/en/docs/concepts/services-networking/service.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -568,7 +568,7 @@ The default is `ClusterIP`.
568568
You can also use [Ingress](/docs/concepts/services-networking/ingress/) to expose your Service. Ingress is not a Service type, but it acts as the entry point for your cluster. It lets you consolidate your routing rules
569569
into a single resource as it can expose multiple services under the same IP address.
570570

571-
### Type NodePort {#nodeport}
571+
### Type NodePort {#type-nodeport}
572572

573573
If you set the `type` field to `NodePort`, the Kubernetes control plane
574574
allocates a port from a range specified by `--service-node-port-range` flag (default: 30000-32767).

content/en/docs/setup/production-environment/tools/kubeadm/troubleshooting-kubeadm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -159,7 +159,7 @@ Calico, Canal, and Flannel CNI providers are verified to support HostPort.
159159
For more information, see the [CNI portmap documentation](https://github.com/containernetworking/plugins/blob/master/plugins/meta/portmap/README.md).
160160

161161
If your network provider does not support the portmap CNI plugin, you may need to use the [NodePort feature of
162-
services](/docs/concepts/services-networking/service/#nodeport) or use `HostNetwork=true`.
162+
services](/docs/concepts/services-networking/service/#type-nodeport) or use `HostNetwork=true`.
163163

164164
## Pods are not accessible via their Service IP
165165

content/en/docs/tasks/access-application-cluster/connecting-frontend-backend.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Kubernetes {{< glossary_tooltip term_id="service" >}} object.
2727
This task uses
2828
[Services with external load balancers](/docs/tasks/access-application-cluster/create-external-load-balancer/), which
2929
require a supported environment. If your environment does not support this, you can use a Service of type
30-
[NodePort](/docs/concepts/services-networking/service/#nodeport) instead.
30+
[NodePort](/docs/concepts/services-networking/service/#type-nodeport) instead.
3131

3232
<!-- lessoncontent -->
3333

content/en/docs/tutorials/services/source-ip.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -164,7 +164,7 @@ The `client_address` is always the client pod's IP address, whether the client p
164164
## Source IP for Services with `Type=NodePort`
165165

166166
Packets sent to Services with
167-
[`Type=NodePort`](/docs/concepts/services-networking/service/#nodeport)
167+
[`Type=NodePort`](/docs/concepts/services-networking/service/#type-nodeport)
168168
are source NAT'd by default. You can test this by creating a `NodePort` Service:
169169

170170
```shell

0 commit comments

Comments
 (0)