Skip to content

Commit a56d96f

Browse files
author
Tim Bannister
committed
Use code shortcode for Tutorials section
Replace legacy codenew shortcode with code shortcode.
1 parent 2692867 commit a56d96f

File tree

11 files changed

+30
-30
lines changed

11 files changed

+30
-30
lines changed

content/en/docs/tutorials/configuration/configure-redis-using-configmap.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ Examine the contents of the Redis pod manifest and note the following:
6868
This has the net effect of exposing the data in `data.redis-config` from the `example-redis-config`
6969
ConfigMap above as `/redis-master/redis.conf` inside the Pod.
7070

71-
{{% codenew file="pods/config/redis-pod.yaml" %}}
71+
{{% code file="pods/config/redis-pod.yaml" %}}
7272

7373
Examine the created objects:
7474

@@ -139,7 +139,7 @@ Which should also yield its default value of `noeviction`:
139139

140140
Now let's add some configuration values to the `example-redis-config` ConfigMap:
141141

142-
{{% codenew file="pods/config/example-redis-config.yaml" %}}
142+
{{% code file="pods/config/example-redis-config.yaml" %}}
143143

144144
Apply the updated ConfigMap:
145145

content/en/docs/tutorials/security/apparmor.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -209,7 +209,7 @@ done
209209

210210
Next, we'll run a simple "Hello AppArmor" pod with the deny-write profile:
211211

212-
{{% codenew file="pods/security/hello-apparmor.yaml" %}}
212+
{{% code file="pods/security/hello-apparmor.yaml" %}}
213213

214214
```shell
215215
kubectl create -f ./hello-apparmor.yaml

content/en/docs/tutorials/security/seccomp.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -71,13 +71,13 @@ into the cluster.
7171

7272
{{< tabs name="tab_with_code" >}}
7373
{{< tab name="audit.json" >}}
74-
{{% codenew file="pods/security/seccomp/profiles/audit.json" %}}
74+
{{% code file="pods/security/seccomp/profiles/audit.json" %}}
7575
{{< /tab >}}
7676
{{< tab name="violation.json" >}}
77-
{{% codenew file="pods/security/seccomp/profiles/violation.json" %}}
77+
{{% code file="pods/security/seccomp/profiles/violation.json" %}}
7878
{{< /tab >}}
7979
{{< tab name="fine-grained.json" >}}
80-
{{% codenew file="pods/security/seccomp/profiles/fine-grained.json" %}}
80+
{{% code file="pods/security/seccomp/profiles/fine-grained.json" %}}
8181
{{< /tab >}}
8282
{{< /tabs >}}
8383

@@ -104,7 +104,7 @@ so each node of the cluster is a container. This allows for files
104104
to be mounted in the filesystem of each container similar to loading files
105105
onto a node.
106106

107-
{{% codenew file="pods/security/seccomp/kind.yaml" %}}
107+
{{% code file="pods/security/seccomp/kind.yaml" %}}
108108

109109
Download that example kind configuration, and save it to a file named `kind.yaml`:
110110
```shell
@@ -176,7 +176,7 @@ no other seccomp profile is specified. Otherwise, the default is `Unconfined`.
176176
Here's a manifest for a Pod that requests the `RuntimeDefault` seccomp profile
177177
for all its containers:
178178

179-
{{% codenew file="pods/security/seccomp/ga/default-pod.yaml" %}}
179+
{{% code file="pods/security/seccomp/ga/default-pod.yaml" %}}
180180

181181
Create that Pod:
182182
```shell
@@ -206,7 +206,7 @@ process, to a new Pod.
206206

207207
Here's a manifest for that Pod:
208208

209-
{{% codenew file="pods/security/seccomp/ga/audit-pod.yaml" %}}
209+
{{% code file="pods/security/seccomp/ga/audit-pod.yaml" %}}
210210

211211
{{< note >}}
212212
Older versions of Kubernetes allowed you to configure seccomp
@@ -311,7 +311,7 @@ syscalls.
311311

312312
The manifest for this demonstration is:
313313

314-
{{% codenew file="pods/security/seccomp/ga/violation-pod.yaml" %}}
314+
{{% code file="pods/security/seccomp/ga/violation-pod.yaml" %}}
315315

316316
Attempt to create the Pod in the cluster:
317317

@@ -354,7 +354,7 @@ sent to `syslog`.
354354

355355
The manifest for this example is:
356356

357-
{{% codenew file="pods/security/seccomp/ga/fine-pod.yaml" %}}
357+
{{% code file="pods/security/seccomp/ga/fine-pod.yaml" %}}
358358

359359
Create the Pod in your cluster:
360360

content/en/docs/tutorials/services/connect-applications-service.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ This tutorial uses a simple nginx web server to demonstrate the concept.
3131
We did this in a previous example, but let's do it once again and focus on the networking perspective.
3232
Create an nginx Pod, and note that it has a container port specification:
3333

34-
{{% codenew file="service/networking/run-my-nginx.yaml" %}}
34+
{{% code file="service/networking/run-my-nginx.yaml" %}}
3535

3636
This makes it accessible from any node in your cluster. Check the nodes the Pod is running on:
3737

@@ -92,7 +92,7 @@ service/my-nginx exposed
9292
9393
This is equivalent to `kubectl apply -f` the following yaml:
9494
95-
{{% codenew file="service/networking/nginx-svc.yaml" %}}
95+
{{% code file="service/networking/nginx-svc.yaml" %}}
9696
9797
This specification will create a Service which targets TCP port 80 on any Pod
9898
with the `run: my-nginx` label, and expose it on an abstracted Service port
@@ -340,7 +340,7 @@ nginxsecret kubernetes.io/tls 2 1m
340340
Now modify your nginx replicas to start an https server using the certificate
341341
in the secret, and the Service, to expose both ports (80 and 443):
342342
343-
{{% codenew file="service/networking/nginx-secure-app.yaml" %}}
343+
{{% code file="service/networking/nginx-secure-app.yaml" %}}
344344
345345
Noteworthy points about the nginx-secure-app manifest:
346346
@@ -376,7 +376,7 @@ linked the CName used in the certificate with the actual DNS name used by pods
376376
during Service lookup. Let's test this from a pod (the same secret is being reused
377377
for simplicity, the pod only needs nginx.crt to access the Service):
378378
379-
{{% codenew file="service/networking/curlpod.yaml" %}}
379+
{{% code file="service/networking/curlpod.yaml" %}}
380380
381381
```shell
382382
kubectl apply -f ./curlpod.yaml

content/en/docs/tutorials/services/pods-and-endpoint-termination-flow.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ document.
3636
Let's say you have a Deployment containing of a single `nginx` replica
3737
(just for demonstration purposes) and a Service:
3838

39-
{{% codenew file="service/pod-with-graceful-termination.yaml" %}}
39+
{{% code file="service/pod-with-graceful-termination.yaml" %}}
4040

4141
```yaml
4242
apiVersion: apps/v1

content/en/docs/tutorials/stateful-application/basic-stateful-set.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ example presented in the
6363
It creates a [headless Service](/docs/concepts/services-networking/service/#headless-services),
6464
`nginx`, to publish the IP addresses of Pods in the StatefulSet, `web`.
6565

66-
{{% codenew file="application/web/web.yaml" %}}
66+
{{% code file="application/web/web.yaml" %}}
6767

6868
Download the example above, and save it to a file named `web.yaml`
6969

@@ -1090,7 +1090,7 @@ terminate all Pods in parallel, and not to wait for Pods to become Running
10901090
and Ready or completely terminated prior to launching or terminating another
10911091
Pod. This option only affects the behavior for scaling operations. Updates are not affected.
10921092

1093-
{{% codenew file="application/web/web-parallel.yaml" %}}
1093+
{{% code file="application/web/web-parallel.yaml" %}}
10941094

10951095
Download the example above, and save it to a file named `web-parallel.yaml`
10961096

content/en/docs/tutorials/stateful-application/cassandra.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ In Kubernetes, a {{< glossary_tooltip text="Service" term_id="service" >}} descr
6868

6969
The following Service is used for DNS lookups between Cassandra Pods and clients within your cluster:
7070

71-
{{% codenew file="application/cassandra/cassandra-service.yaml" %}}
71+
{{% code file="application/cassandra/cassandra-service.yaml" %}}
7272

7373
Create a Service to track all Cassandra StatefulSet members from the `cassandra-service.yaml` file:
7474

@@ -105,7 +105,7 @@ This example uses the default provisioner for Minikube.
105105
Please update the following StatefulSet for the cloud you are working with.
106106
{{< /note >}}
107107

108-
{{% codenew file="application/cassandra/cassandra-statefulset.yaml" %}}
108+
{{% code file="application/cassandra/cassandra-statefulset.yaml" %}}
109109

110110
Create the Cassandra StatefulSet from the `cassandra-statefulset.yaml` file:
111111

content/en/docs/tutorials/stateful-application/mysql-wordpress-persistent-volume.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -117,14 +117,14 @@ The following manifest describes a single-instance MySQL Deployment. The MySQL
117117
container mounts the PersistentVolume at /var/lib/mysql. The `MYSQL_ROOT_PASSWORD`
118118
environment variable sets the database password from the Secret.
119119

120-
{{% codenew file="application/wordpress/mysql-deployment.yaml" %}}
120+
{{% code file="application/wordpress/mysql-deployment.yaml" %}}
121121

122122
The following manifest describes a single-instance WordPress Deployment. The WordPress container mounts the
123123
PersistentVolume at `/var/www/html` for website data files. The `WORDPRESS_DB_HOST` environment variable sets
124124
the name of the MySQL Service defined above, and WordPress will access the database by Service. The
125125
`WORDPRESS_DB_PASSWORD` environment variable sets the database password from the Secret kustomize generated.
126126

127-
{{% codenew file="application/wordpress/wordpress-deployment.yaml" %}}
127+
{{% code file="application/wordpress/wordpress-deployment.yaml" %}}
128128

129129
1. Download the MySQL deployment configuration file.
130130

content/en/docs/tutorials/stateful-application/zookeeper.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ a [Service](/docs/concepts/services-networking/service/),
7474
a [PodDisruptionBudget](/docs/concepts/workloads/pods/disruptions/#pod-disruption-budgets),
7575
and a [StatefulSet](/docs/concepts/workloads/controllers/statefulset/).
7676

77-
{{% codenew file="application/zookeeper/zookeeper.yaml" %}}
77+
{{% code file="application/zookeeper/zookeeper.yaml" %}}
7878

7979
Open a terminal, and use the
8080
[`kubectl apply`](/docs/reference/generated/kubectl/kubectl-commands/#apply) command to create the

content/en/docs/tutorials/stateless-application/expose-external-ip-address.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ external IP address.
3131

3232
1. Run a Hello World application in your cluster:
3333

34-
{{% codenew file="service/load-balancer-example.yaml" %}}
34+
{{% code file="service/load-balancer-example.yaml" %}}
3535

3636
```shell
3737
kubectl apply -f https://k8s.io/examples/service/load-balancer-example.yaml

0 commit comments

Comments
 (0)