Skip to content

Commit 9dbaf53

Browse files
committed
[zh] Sync changes from English site (1)
1 parent 7a44e1a commit 9dbaf53

File tree

7 files changed

+42
-35
lines changed

7 files changed

+42
-35
lines changed

content/zh/docs/concepts/cluster-administration/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ Before choosing a guide, here are some considerations:
102102

103103
* [证书](/zh/docs/concepts/cluster-administration/certificates/)节描述了使用不同的工具链生成证书的步骤。
104104
* [Kubernetes 容器环境](/zh/docs/concepts/containers/container-environment/)描述了 Kubernetes 节点上由 Kubelet 管理的容器的环境。
105-
* [控制到 Kubernetes API 的访问](/zh/docs/reference/access-authn-authz/controlling-access/)描述了如何为用户和 service accounts 建立权限许可。
105+
* [控制到 Kubernetes API 的访问](/zh/docs/concepts/security/controlling-access/)描述了如何为用户和 service accounts 建立权限许可。
106106
* [认证](/docs/reference/access-authn-authz/authentication/)节阐述了 Kubernetes 中的身份认证功能,包括许多认证选项。
107107
* [鉴权](/zh/docs/reference/access-authn-authz/authorization/)从认证中分离出来,用于控制如何处理 HTTP 请求。
108108
* [使用准入控制器](/zh/docs/reference/access-authn-authz/admission-controllers) 阐述了在认证和授权之后拦截到 Kubernetes API 服务的请求的插件。

content/zh/docs/concepts/cluster-administration/addons.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,8 @@ content_type: concept
55

66
<!-- overview -->
77

8+
{{% thirdparty-content %}}
9+
810
<!--
911
Add-ons extend the functionality of Kubernetes.
1012
@@ -34,6 +36,8 @@ Add-ons 扩展了 Kubernetes 的功能。
3436
* [Flannel](https://github.com/coreos/flannel/blob/master/Documentation/kubernetes.md) is an overlay network provider that can be used with Kubernetes.
3537
* [Knitter](https://github.com/ZTE/Knitter/) is a network solution supporting multiple networking in Kubernetes.
3638
* [Multus](https://github.com/Intel-Corp/multus-cni) is a Multi plugin for multiple network support in Kubernetes to support all CNI plugins (e.g. Calico, Cilium, Contiv, Flannel), in addition to SRIOV, DPDK, OVS-DPDK and VPP based workloads in Kubernetes.
39+
* [OVN-Kubernetes](https://github.com/ovn-org/ovn-kubernetes/) is a networking provider for Kubernetes based on [OVN (Open Virtual Network)](https://github.com/ovn-org/ovn/), a virtual networking implementation that came out of the Open vSwitch (OVS) project. OVN-Kubernetes provides an overlay based networking implementation for Kubernetes, including an OVS based implementation of load balancing and network policy.
40+
* [OVN4NFV-K8S-Plugin](https://github.com/opnfv/ovn4nfv-k8s-plugin) is OVN based CNI controller plugin to provide cloud native based Service function chaining(SFC), Multiple OVN overlay networking, dynamic subnet creation, dynamic creation of virtual networks, VLAN Provider network, Direct provider network and pluggable with other Multi-network plugins, ideal for edge based cloud native workloads in Multi-cluster networking
3741
* [NSX-T](https://docs.vmware.com/en/VMware-NSX-T/2.0/nsxt_20_ncp_kubernetes.pdf) Container Plug-in (NCP) provides integration between VMware NSX-T and container orchestrators such as Kubernetes, as well as integration between NSX-T and container-based CaaS/PaaS platforms such as Pivotal Container Service (PKS) and OpenShift.
3842
* [Nuage](https://github.com/nuagenetworks/nuage-kubernetes/blob/v5.1.1-1/docs/kubernetes-1-installation.rst) is an SDN platform that provides policy-based networking between Kubernetes Pods and non-Kubernetes environments with visibility and security monitoring.
3943
* [Romana](http://romana.io) is a Layer 3 networking solution for pod networks that also supports the [NetworkPolicy API](/docs/concepts/services-networking/network-policies/). Kubeadm add-on installation details available [here](https://github.com/romana/romana/tree/master/containerize).
@@ -63,6 +67,15 @@ Add-ons 扩展了 Kubernetes 的功能。
6367
* [Multus](https://github.com/Intel-Corp/multus-cni) 是一个多插件,可在 Kubernetes 中提供多种网络支持,
6468
以支持所有 CNI 插件(例如 Calico,Cilium,Contiv,Flannel),
6569
而且包含了在 Kubernetes 中基于 SRIOV、DPDK、OVS-DPDK 和 VPP 的工作负载。
70+
* [OVN-Kubernetes](https://github.com/ovn-org/ovn-kubernetes/) 是一个 Kubernetes 网络驱动,
71+
基于 [OVN(Open Virtual Network)](https://github.com/ovn-org/ovn/)实现,是从 Open vSwitch (OVS)
72+
项目衍生出来的虚拟网络实现。
73+
OVN-Kubernetes 为 Kubernetes 提供基于覆盖网络的网络实现,包括一个基于 OVS 实现的负载均衡器
74+
和网络策略。
75+
* [OVN4NFV-K8S-Plugin](https://github.com/opnfv/ovn4nfv-k8s-plugin) 是一个基于 OVN 的 CNI
76+
控制器插件,提供基于云原生的服务功能链条(Service Function Chaining,SFC)、多种 OVN 覆盖
77+
网络、动态子网创建、动态虚拟网络创建、VLAN 驱动网络、直接驱动网络,并且可以
78+
驳接其他的多网络插件,适用于基于边缘的、多集群联网的云原生工作负载。
6679
* [NSX-T](https://docs.vmware.com/en/VMware-NSX-T/2.0/nsxt_20_ncp_kubernetes.pdf) 容器插件(NCP)
6780
提供了 VMware NSX-T 与容器协调器(例如 Kubernetes)之间的集成,以及 NSX-T 与基于容器的
6881
CaaS / PaaS 平台(例如关键容器服务(PKS)和 OpenShift)之间的集成。

content/zh/docs/concepts/cluster-administration/flow-control.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -853,7 +853,7 @@ You can fetch like this:
853853

854854
<!--
855855
In addition to the queued requests,
856-
the output includeas one phantom line for each priority level that is exempt from limitation.
856+
the output includes one phantom line for each priority level that is exempt from limitation.
857857
-->
858858
针对每个优先级别,输出中还包含一条虚拟记录,对应豁免限制。
859859

@@ -881,4 +881,4 @@ You can make suggestions and feature requests via
881881
-->
882882
有关API优先级和公平性的设计细节的背景信息,
883883
请参阅[增强建议](https://github.com/kubernetes/enhancements/blob/master/keps/sig-api-machinery/20190228-priority-and-fairness.md)
884-
你可以通过 [SIG APIMachinery](https://github.com/kubernetes/community/tree/master/sig-api-machinery) 提出建议和特性请求。
884+
你可以通过 [SIG APIMachinery](https://github.com/kubernetes/community/tree/master/sig-api-machinery) 提出建议和特性请求。

content/zh/docs/concepts/cluster-administration/logging.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,9 @@ weight: 60
1414
<!-- overview -->
1515

1616
<!--
17-
Application and systems logs can help you understand what is happening inside your cluster. The logs are particularly useful for debugging problems and monitoring cluster activity. Most modern applications have some kind of logging mechanism; as such, most container engines are likewise designed to support some kind of logging. The easiest and most embraced logging method for containerized applications is to write to the standard output and standard error streams.
17+
Application logs can help you understand what is happening inside your application. The logs are particularly useful for debugging problems and monitoring cluster activity. Most modern applications have some kind of logging mechanism; as such, most container engines are likewise designed to support some kind of logging. The easiest and most embraced logging method for containerized applications is to write to the standard output and standard error streams.
1818
-->
19-
应用和系统日志可以让你了解集群内部的运行状况。日志对调试问题和监控集群活动非常有用。
19+
应用日志可以让你了解应用内部的运行状况。日志对调试问题和监控集群活动非常有用。
2020
大部分现代化应用都有某种日志记录机制;同样地,大多数容器引擎也被设计成支持某种日志记录机制。
2121
针对容器化应用,最简单且受欢迎的日志记录方式就是写入标准输出和标准错误流。
2222

@@ -45,14 +45,13 @@ the description of how logs are stored and handled on the node to be useful.
4545
4646
In this section, you can see an example of basic logging in Kubernetes that
4747
outputs data to the standard output stream. This demonstration uses
48-
a [pod specification](/examples/debug/counter-pod.yaml) with
49-
a container that writes some text to standard output once per second.
48+
a pod specification with a container that writes some text to standard output
49+
once per second.
5050
-->
5151
## Kubernetes 中的基本日志记录
5252

5353
本节,你会看到一个kubernetes 中生成基本日志的例子,该例子中数据被写入到标准输出。
54-
这里通过一个特定的 [Pod 规约](/examples/debug/counter-pod.yaml) 演示创建一个容器,
55-
并令该容器每秒钟向标准输出写入数据。
54+
这里的示例为包含一个容器的 Pod 规约,该容器每秒钟向标准输出写入数据。
5655

5756
{{< codenew file="debug/counter-pod.yaml" >}}
5857

content/zh/docs/concepts/cluster-administration/networking.md

Lines changed: 15 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -140,6 +140,8 @@ imply any preferential status.
140140

141141
接下来的网络技术是按照首字母排序,顺序本身并无其他意义。
142142

143+
{{% thirdparty-content %}}
144+
143145
<!--
144146
### ACI
145147
@@ -267,6 +269,19 @@ BCF 被 Gartner 认为是非常有远见的。
267269
而 BCF 的一条关于 Kubernetes 的本地部署(其中包括 Kubernetes、DC/OS 和在不同地理区域的多个
268270
DC 上运行的 VMware)也在[这里](https://portworx.com/architects-corner-kubernetes-satya-komala-nio/)被引用。
269271

272+
<!--
273+
### Calico
274+
275+
[Calico](https://docs.projectcalico.org/) is an open source networking and network security solution for containers, virtual machines, and native host-based workloads. Calico supports multiple data planes including: a pure Linux eBPF dataplane, a standard Linux networking dataplane, and a Windows HNS dataplane. Calico provides a full networking stack but can also be used in conjunction with [cloud provider CNIs](https://docs.projectcalico.org/networking/determine-best-networking#calico-compatible-cni-plugins-and-cloud-provider-integrations) to provide network policy enforcement.
276+
-->
277+
### Calico
278+
279+
[Calico](https://docs.projectcalico.org/) 是一个开源的联网及网络安全方案,
280+
用于基于容器、虚拟机和本地主机的工作负载。
281+
Calico 支持多个数据面,包括:纯 Linux eBPF 的数据面、标准的 Linux 联网数据面
282+
以及 Windwos HNS 数据面。Calico 在提供完整的联网堆栈的同时,还可与
283+
[云驱动 CNIs](https://docs.projectcalico.org/networking/determine-best-networking#calico-compatible-cni-plugins-and-cloud-provider-integrations) 联合使用,以保证网络策略实施。
284+
270285
<!--
271286
### Cilium
272287
@@ -637,27 +652,6 @@ OVN 是一个由 Open vSwitch 社区开发的开源的网络虚拟化解决方
637652
它允许创建逻辑交换器、逻辑路由、状态 ACL、负载均衡等等来建立不同的虚拟网络拓扑。
638653
该项目有一个特定的Kubernetes插件和文档 [ovn-kubernetes](https://github.com/openvswitch/ovn-kubernetes)
639654

640-
<!--
641-
### Project Calico
642-
643-
[Project Calico](https://docs.projectcalico.org/) is an open source container networking provider and network policy engine.
644-
645-
Calico provides a highly scalable networking and network policy solution for connecting Kubernetes pods based on the same IP networking principles as the internet, for both Linux (open source) and Windows (proprietary - available from [Tigera](https://www.tigera.io/essentials/)). Calico can be deployed without encapsulation or overlays to provide high-performance, high-scale data center networking. Calico also provides fine-grained, intent based network security policy for Kubernetes pods via its distributed firewall.
646-
647-
Calico can also be run in policy enforcement mode in conjunction with other networking solutions such as Flannel, aka [canal](https://github.com/tigera/canal), or native GCE, AWS or Azure networking.
648-
-->
649-
### Calico 项目 {#project-calico}
650-
651-
[Calico 项目](https://docs.projectcalico.org/) 是一个开源的容器网络提供者和网络策略引擎。
652-
653-
Calico 提供了高度可扩展的网络和网络解决方案,使用基于与 Internet 相同的 IP 网络原理来连接 Kubernetes Pod,
654-
适用于 Linux (开放源代码)和 Windows(专有-可从 [Tigera](https://www.tigera.io/essentials/) 获得。
655-
可以无需封装或覆盖即可部署 Calico,以提供高性能,高可扩的数据中心网络。
656-
Calico 还通过其分布式防火墙为 Kubernetes Pod 提供了基于意图的细粒度网络安全策略。
657-
658-
Calico 还可以和其他的网络解决方案(比如 Flannel、[canal](https://github.com/tigera/canal)
659-
或原生 GCE、AWS、Azure 网络等)一起以策略实施模式运行。
660-
661655
<!--
662656
### Romana
663657

content/zh/docs/concepts/cluster-administration/system-metrics.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -174,7 +174,7 @@ The kubelet collects accelerator metrics through cAdvisor. To collect these metr
174174
175175
The responsibility for collecting accelerator metrics now belongs to the vendor rather than the kubelet. Vendors must provide a container that collects metrics and exposes them to the metrics service (for example, Prometheus).
176176
177-
The [`DisableAcceleratorUsageMetrics` feature gate](/docs/references/command-line-tools-reference/feature-gate.md#feature-gates-for-alpha-or-beta-features:~:text= DisableAcceleratorUsageMetrics,-false) disables metrics collected by the kubelet, with a [timeline for enabling this feature by default](https://github.com/kubernetes/enhancements/tree/411e51027db842355bd489691af897afc1a41a5e/keps/sig-node/1867-disable-accelerator-usage-metrics#graduation-criteria).
177+
The [`DisableAcceleratorUsageMetrics` feature gate](/docs/reference/command-line-tools-reference/feature-gates/#feature-gates-for-alpha-or-beta-features:~:text= DisableAcceleratorUsageMetrics,-false) disables metrics collected by the kubelet, with a [timeline for enabling this feature by default](https://github.com/kubernetes/enhancements/tree/411e51027db842355bd489691af897afc1a41a5e/keps/sig-node/1867-disable-accelerator-usage-metrics#graduation-criteria).
178178
-->
179179
## 禁用加速器指标
180180

@@ -185,7 +185,9 @@ kubelet 在驱动程序上保持打开状态。这意味着为了执行基础结
185185
现在,收集加速器指标的责任属于供应商,而不是 kubelet。供应商必须提供一个收集指标的容器,
186186
并将其公开给指标服务(例如 Prometheus)。
187187

188-
[`DisableAcceleratorUsageMetrics` 特性门控](/zh/docs/references/command-line-tools-reference/feature-gate.md#feature-gates-for-alpha-or-beta-features:~:text= DisableAcceleratorUsageMetrics,-false)禁止由 kubelet 收集的指标,并[带有一条时间线,默认情况下会启用此功能](https://github.com/kubernetes/enhancements/tree/411e51027db842355bd489691af897afc1a41a5e/keps/sig-node/1867-disable-accelerator-usage-metrics#graduation-criteria)
188+
[`DisableAcceleratorUsageMetrics` 特性门控](/zh/docs/references/command-line-tools-reference/feature-gate.md#feature-gates-for-alpha-or-beta-features:~:text= DisableAcceleratorUsageMetrics,-false)
189+
禁止由 kubelet 收集的指标。
190+
关于[何时会在默认情况下启用此功能也有一定规划](https://github.com/kubernetes/enhancements/tree/411e51027db842355bd489691af897afc1a41a5e/keps/sig-node/1867-disable-accelerator-usage-metrics#graduation-criteria)
189191

190192
<!--
191193
## Component metrics
@@ -233,4 +235,4 @@ cloudprovider_gce_api_request_duration_seconds { request = "list_disk"}
233235
-->
234236
* 阅读有关指标的 [Prometheus 文本格式](https://github.com/prometheus/docs/blob/master/content/docs/instrumenting/exposition_formats.md#text-based-format)
235237
* 查看 [Kubernetes 稳定指标](https://github.com/kubernetes/kubernetes/blob/master/test/instrumentation/testdata/stable-metrics-list.yaml)的列表
236-
* 阅读有关 [Kubernetes 弃用策略](/docs/reference/using-api/deprecation-policy/#deprecating-a-feature-or-behavior)
238+
* 阅读有关 [Kubernetes 弃用策略](/docs/reference/using-api/deprecation-policy/#deprecating-a-feature-or-behavior)

content/zh/docs/concepts/policy/resource-quotas.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -140,8 +140,7 @@ The following resource types are supported:
140140
| `limits.memory` | Across all pods in a non-terminal state, the sum of memory limits cannot exceed this value. |
141141
| `requests.cpu` | Across all pods in a non-terminal state, the sum of CPU requests cannot exceed this value. |
142142
| `requests.memory` | Across all pods in a non-terminal state, the sum of memory requests cannot exceed this value. |
143-
| `hugepages-<size>` | Across all pods in a non-terminal state, the number of
144-
huge page requests of the specified size cannot exceed this value. |
143+
| `hugepages-<size>` | Across all pods in a non-terminal state, the number of huge page requests of the specified size cannot exceed this value. |
145144
| `cpu` | Same as `requests.cpu` |
146145
| `memory` | Same as `requests.memory` |
147146
-->

0 commit comments

Comments
 (0)