@@ -391,8 +391,7 @@ managed by Kubernetes' own control plane.
391
391
# ### Accessing a Service without a selector {#service-no-selector-access}
392
392
393
393
Accessing a Service without a selector works the same as if it had a selector.
394
- In the [example](#services-without-selectors) for a Service without a selector,
395
- traffic is routed to one of the two endpoints defined in
394
+ In the [example](#services-without-selectors) for a Service without a selector, traffic is routed to one of the two endpoints defined in
396
395
the EndpointSlice manifest : a TCP connection to 10.1.2.3 or 10.4.5.6, on port 9376.
397
396
-->
398
397
# ### 访问没有选择算符的 Service {#service-no-selector-access}
@@ -804,7 +803,7 @@ Kubernetes `ServiceTypes` 允许指定你所需要的 Service 类型。
804
803
* `ClusterIP`: Exposes the Service on a cluster-internal IP. Choosing this value
805
804
makes the Service only reachable from within the cluster. This is the
806
805
default that is used if you don't explicitly specify a `type` for a Service.
807
- You can expose the service to the public with an [Ingress](docs/reference/kubernetes-api/service-resources/ ingress-v1 /) or the
806
+ You can expose the service to the public with an [Ingress](/ docs/concepts/services-networking/ ingress/) or the
808
807
[Gateway API](https://gateway-api.sigs.k8s.io/).
809
808
* [`NodePort`](#type-nodeport): Exposes the Service on each Node's IP at a static port
810
809
(the `NodePort`).
@@ -818,7 +817,7 @@ Kubernetes `ServiceTypes` 允许指定你所需要的 Service 类型。
818
817
-->
819
818
* `ClusterIP`:通过集群的内部 IP 暴露服务,选择该值时服务只能够在集群内部访问。
820
819
这也是你没有为服务显式指定 `type` 时使用的默认值。
821
- 你可以使用 [Ingress](/zh-cn/docs/reference/kubernetes-api/service-resources/ ingress-v1 /)
820
+ 你可以使用 [Ingress](/zh-cn/docs/concepts/services-networking/ ingress/)
822
821
或者 [Gateway API](https://gateway-api.sigs.k8s.io/) 向公众暴露服务。
823
822
* [`NodePort`](#type-nodeport):通过每个节点上的 IP 和静态端口(`NodePort`)暴露服务。
824
823
为了让节点端口可用,Kubernetes 设置了集群 IP 地址,这等同于你请求 `type : ClusterIP` 的服务。
@@ -1124,7 +1123,7 @@ cloud provider does not support mixed protocols they will provide only a single
1124
1123
{{< feature-state for_k8s_version="v1.24" state="stable" >}}
1125
1124
1126
1125
<!--
1127
- Starting in v1.20, you can optionally disable node port allocation for a Service Type =LoadBalancer by setting
1126
+ You can optionally disable node port allocation for a Service of `type =LoadBalancer`, by setting
1128
1127
the field `spec.allocateLoadBalancerNodePorts` to `false`. This should only be used for load balancer implementations
1129
1128
that route traffic directly to pods as opposed to using node ports. By default, `spec.allocateLoadBalancerNodePorts`
1130
1129
is `true` and type LoadBalancer Services will continue to allocate node ports. If `spec.allocateLoadBalancerNodePorts`
@@ -1626,7 +1625,7 @@ the NLB Target Group's health check on the auto-assigned
1626
1625
` .spec.healthCheckNodePort` 进行 NLB 目标组的运行状况检查,并且不会收到任何流量。
1627
1626
1628
1627
<!--
1629
- In order to achieve even traffic, either use a DaemonSet, or specify a
1628
+ In order to achieve even traffic, either use a DaemonSet or specify a
1630
1629
[pod anti-affinity](/docs/concepts/scheduling-eviction/assign-pod-node/#affinity-and-anti-affinity)
1631
1630
to not locate on the same node.
1632
1631
0 commit comments