Skip to content

Commit c5c6d10

Browse files
authored
Merge pull request #25397 from tengqm/zh-fix-links-1
[zh] Fix links in zh localization (1)
2 parents 6dee539 + 482351e commit c5c6d10

20 files changed

+229
-180
lines changed

content/zh/docs/concepts/architecture/control-plane-node-communication.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -32,10 +32,10 @@ One or more forms of [authorization](/docs/reference/access-authn-authz/authoriz
3232
Kubernetes 采用的是中心辐射型(Hub-and-Spoke)API 模式。
3333
所有从集群(或所运行的 Pods)发出的 API 调用都终止于 apiserver(其它控制面组件都没有被设计为可暴露远程服务)。
3434
apiserver 被配置为在一个安全的 HTTPS 端口(443)上监听远程连接请求,
35-
并启用一种或多种形式的客户端[身份认证](/docs/reference/access-authn-authz/authentication/)机制。
35+
并启用一种或多种形式的客户端[身份认证](/zh/docs/reference/access-authn-authz/authentication/)机制。
3636
一种或多种客户端[鉴权机制](/zh/docs/reference/access-authn-authz/authorization/)应该被启用,
37-
特别是在允许使用[匿名请求](/docs/reference/access-authn-authz/authentication/#anonymous-requests)
38-
[服务账号令牌](/docs/reference/access-authn-authz/authentication/#service-account-tokens)的时候。
37+
特别是在允许使用[匿名请求](/zh/docs/reference/access-authn-authz/authentication/#anonymous-requests)
38+
[服务账号令牌](/zh/docs/reference/access-authn-authz/authentication/#service-account-tokens)的时候。
3939

4040
<!--
4141
Nodes should be provisioned with the public root certificate for the cluster such that they can connect securely to the apiserver along with valid client credentials. A good approach is that the client credentials provided to the kubelet are in the form of a client certificate. See [kubelet TLS bootstrapping](/docs/reference/command-line-tools-reference/kubelet-tls-bootstrapping/) for automated provisioning of kubelet client certificates.
@@ -61,7 +61,8 @@ The control plane components also communicate with the cluster apiserver over th
6161
<!--
6262
As a result, the default operating mode for connections from the nodes and pods running on the nodes to the control plane is secured by default and can run over untrusted and/or public networks.
6363
-->
64-
这样,从集群节点和节点上运行的 Pod 到控制面的连接的缺省操作模式即是安全的,能够在不可信的网络或公网上运行。
64+
这样,从集群节点和节点上运行的 Pod 到控制面的连接的缺省操作模式即是安全的,
65+
能够在不可信的网络或公网上运行。
6566

6667
<!--
6768
## Control Plane to node
@@ -137,7 +138,6 @@ This tunnel ensures that the traffic is not exposed outside of the network in wh
137138
138139
SSH tunnels are currently deprecated so you shouldn't opt to use them unless you know what you are doing. The Konnectivity service is a replacement for this communication channel.
139140
-->
140-
141141
### SSH 隧道 {#ssh-tunnels}
142142

143143
Kubernetes 支持使用 SSH 隧道来保护从控制面到节点的通信路径。在这种配置下,apiserver
@@ -158,7 +158,6 @@ After enabling the Konnectivity service, all control plane to nodes traffic goes
158158
159159
Follow the [Konnectivity service task](/docs/tasks/extend-kubernetes/setup-konnectivity/) to set up the Konnectivity service in your cluster.
160160
-->
161-
162161
### Konnectivity 服务
163162

164163
{{< feature-state for_k8s_version="v1.18" state="beta" >}}
@@ -168,5 +167,6 @@ Konnectivity 服务包含两个部分:Konnectivity 服务器和 Konnectivity
168167
控制面网络和节点网络中。Konnectivity 代理建立并维持到 Konnectivity 服务器的网络连接。
169168
启用 Konnectivity 服务之后,所有控制面到节点的通信都通过这些连接传输。
170169

171-
请浏览 [Konnectivity 服务任务](/docs/tasks/extend-kubernetes/setup-konnectivity/)
170+
请浏览 [Konnectivity 服务任务](/zh/docs/tasks/extend-kubernetes/setup-konnectivity/)
172171
在你的集群中配置 Konnectivity 服务。
172+

content/zh/docs/concepts/architecture/controller.md

Lines changed: 15 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -139,21 +139,23 @@ Controllers that interact with external state find their desired state from
139139
the API server, then communicate directly with an external system to bring
140140
the current state closer in line.
141141
142-
(There actually is a controller that horizontally scales the
143-
nodes in your cluster. See
144-
[Cluster autoscaling](/docs/tasks/administer-cluster/cluster-management/#cluster-autoscaling)).
142+
(There actually is a [controller](https://github.com/kubernetes/autoscaler/)
143+
that horizontally scales the nodes in your cluster.)
145144
-->
146145

147146
### 直接控制 {#direct-control}
148147

149148
相比 Job 控制器,有些控制器需要对集群外的一些东西进行修改。
150149

151-
例如,如果你使用一个控制环来保证集群中有足够的{{< glossary_tooltip text="节点" term_id="node" >}},那么控制就需要当前集群外的一些服务在需要时创建新节点。
150+
例如,如果你使用一个控制回路来保证集群中有足够的
151+
{{< glossary_tooltip text="节点" term_id="node" >}},那么控制器就需要当前集群外的
152+
一些服务在需要时创建新节点。
152153

153-
和外部状态交互的控制器从 API 服务器获取到它想要的状态,然后直接和外部系统进行通信并使当前状态更接近期望状态。
154+
和外部状态交互的控制器从 API 服务器获取到它想要的状态,然后直接和外部系统进行通信
155+
并使当前状态更接近期望状态。
154156

155-
实际上有一个控制器可以水平地扩展集群中的节点。请参阅
156-
[集群自动扩缩容](/zh/docs/tasks/administer-cluster/cluster-management/#cluster-autoscaling))。
157+
实际上有一个[控制器](https://github.com/kubernetes/autoscaler/)
158+
可以水平地扩展集群中的节点。请参阅
157159

158160
<!--
159161
The important point here is that the controller makes some change to bring about
@@ -193,7 +195,8 @@ useful changes, it doesn't matter if the overall state is or is not stable.
193195

194196
Kubernetes 采用了系统的云原生视图,并且可以处理持续的变化。
195197

196-
在任务执行时,集群随时都可能被修改,并且控制回路会自动修复故障。这意味着很可能集群永远不会达到稳定状态。
198+
在任务执行时,集群随时都可能被修改,并且控制回路会自动修复故障。
199+
这意味着很可能集群永远不会达到稳定状态。
197200

198201
只要集群中控制器的在运行并且进行有效的修改,整体状态的稳定与否是无关紧要的。
199202

@@ -278,7 +281,9 @@ Kubernetes 允许你运行一个稳定的控制平面,这样即使某些内置
278281
* If you want to write your own controller, see [Extension Patterns](/docs/concepts/extend-kubernetes/extend-cluster/#extension-patterns) in Extending Kubernetes.
279282
-->
280283
* 阅读 [Kubernetes 控制平面组件](/zh/docs/concepts/overview/components/#control-plane-components)
281-
* 了解 [Kubernetes 对象](/zh/docs/concepts/overview/working-with-objects/kubernetes-objects/) 的一些基本知识
284+
* 了解 [Kubernetes 对象](/zh/docs/concepts/overview/working-with-objects/kubernetes-objects/)
285+
的一些基本知识
282286
* 进一步学习 [Kubernetes API](/zh/docs/concepts/overview/kubernetes-api/)
283-
* 如果你想编写自己的控制器,请看 Kubernetes 的[扩展模式](/zh/docs/concepts/extend-kubernetes/extend-cluster/#extension-patterns)
287+
* 如果你想编写自己的控制器,请看 Kubernetes 的
288+
[扩展模式](/zh/docs/concepts/extend-kubernetes/extend-cluster/#extension-patterns)
284289

content/zh/docs/concepts/architecture/nodes.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -627,11 +627,9 @@ for more information.
627627
* Read the [Node](https://git.k8s.io/community/contributors/design-proposals/architecture/architecture.md#the-kubernetes-node)
628628
section of the architecture design document.
629629
* Read about [taints and tolerations](/docs/concepts/scheduling-eviction/taint-and-toleration/).
630-
* Read about [cluster autoscaling](/docs/tasks/administer-cluster/cluster-management/#cluster-autoscaling).
631630
-->
632631
* 了解有关节点[组件](/zh/docs/concepts/overview/components/#node-components)
633632
* 阅读[节点的 API 定义](/docs/reference/generated/kubernetes-api/{{< param "version" >}}/#node-v1-core)
634633
* 阅读架构设计文档中有关[节点](https://git.k8s.io/community/contributors/design-proposals/architecture/architecture.md#the-kubernetes-node)的章节
635634
* 了解[污点和容忍度](/zh/docs/concepts/scheduling-eviction/taint-and-toleration/)
636-
* 了解[集群自动扩缩](/zh/docs/tasks/administer-cluster/cluster-management/#cluster-autoscaling)
637635

content/zh/docs/concepts/configuration/pod-priority-preemption.md

Lines changed: 4 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -17,12 +17,12 @@ weight: 70
1717
{{< feature-state for_k8s_version="v1.14" state="stable" >}}
1818

1919
<!--
20-
[Pods](/docs/concepts/workloads/pods/pod/) can have _priority_. Priority indicates the
20+
[Pods](/docs/concepts/workloads/pods/) can have _priority_. Priority indicates the
2121
importance of a Pod relative to other Pods. If a Pod cannot be scheduled, the
2222
scheduler tries to preempt (evict) lower priority Pods to make scheduling of the
2323
pending Pod possible.
2424
-->
25-
[Pods](/zh/docs/concepts/workloads/pods/pod/) 可以有*优先级(Priority)*
25+
[Pods](/zh/docs/concepts/workloads/pods/) 可以有*优先级(Priority)*
2626
优先级体现的是当前 Pod 与其他 Pod 相比的重要程度。如果 Pod 无法被调度,则
2727
调度器会尝试抢占(逐出)低优先级的 Pod,从而使得悬决的 Pod 可被调度。
2828

@@ -460,7 +460,7 @@ despite their PDBs being violated.
460460
-->
461461
#### PodDisruptionBudget 是被支持的,但不提供保证
462462

463-
[PodDisruptionBudget](/docs/concepts/workloads/pods/disruptions/) (PDB)
463+
[PodDisruptionBudget](/zh/docs/concepts/workloads/pods/disruptions/) (PDB)
464464
的存在使得应用的属主能够限制多副本应用因主动干扰而同时离线的 Pod 的个数。
465465
Kubernetes 在抢占 Pod 时是可以支持 PDB 的,但对 PDB 的约束也仅限于尽力而为。
466466
调度器会尝试寻找不会因为抢占而违反其 PDB 约束的 Pod 作为牺牲品,不过如果
@@ -628,17 +628,12 @@ Pod may be created that fits on the same Node. In this case, the scheduler will
628628
schedule the higher priority Pod instead of the preemptor.
629629

630630
This is expected behavior: the Pod with the higher priority should take the place
631-
of a Pod with a lower priority. Other controller actions, such as
632-
[cluster autoscaling](/docs/tasks/administer-cluster/cluster-management/#cluster-autoscaling),
633-
may eventually provide capacity to schedule the pending Pods.
631+
of a Pod with a lower priority.
634632
-->
635633
在抢占者 Pod 等待被牺牲的 Pod 消失期间,可能有更高优先级的 Pod 被创建,且适合
636634
调度到同一节点。如果是这种情况,调度器会调度优先级更高的 Pod 而不是抢占者。
637635

638636
这是期望发生的行为:优先级更高的 Pod 应该取代优先级较低的 Pod。
639-
其他控制器行为,例如
640-
[集群自动扩缩](/zh/docs/tasks/administer-cluster/cluster-management/#cluster-autoscaling)
641-
可能会最终为集群添加容量,以调度悬决 Pod。
642637

643638
<!--
644639
### Higher priority Pods are preempted before lower priority pods

content/zh/docs/concepts/configuration/secret.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -666,7 +666,7 @@ There are several options to create a Secret:
666666

667667
- [使用 `kubectl` 命令创建 Secret](/zh/docs/tasks/configmap-secret/managing-secret-using-kubectl/)
668668
- [使用配置文件来创建 Secret](/zh/docs/tasks/configmap-secret/managing-secret-using-config-file/)
669-
- [使用 kustomize 来创建 Secret](/docs/tasks/configmap-secret/managing-secret-using-kustomize/)
669+
- [使用 kustomize 来创建 Secret](/zh/docs/tasks/configmap-secret/managing-secret-using-kustomize/)
670670

671671
<!--
672672
## Editing a Secret

0 commit comments

Comments
 (0)