Skip to content

Commit c883ec3

Browse files
authored
Merge pull request #32468 from PriyanshuAhlawat/kube_proxy
Mark user-space kube-proxy as deprecated
2 parents 25767f9 + 70574cf commit c883ec3

File tree

1 file changed

+10
-9
lines changed
  • content/en/docs/concepts/services-networking

1 file changed

+10
-9
lines changed

content/en/docs/concepts/services-networking/service.md

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -217,10 +217,10 @@ In the example above, traffic is routed to the single endpoint defined in
217217
the YAML: `192.0.2.42:9376` (TCP).
218218

219219
{{< note >}}
220-
The Kubernetes API server does not allow proxying to endpoints that are not mapped to
221-
pods. Actions such as `kubectl proxy <service-name>` where the service has no
222-
selector will fail due to this constraint. This prevents the Kubernetes API server
223-
from being used as a proxy to endpoints the caller may not be authorized to access.
220+
The Kubernetes API server does not allow proxying to endpoints that are not mapped to
221+
pods. Actions such as `kubectl proxy <service-name>` where the service has no
222+
selector will fail due to this constraint. This prevents the Kubernetes API server
223+
from being used as a proxy to endpoints the caller may not be authorized to access.
224224
{{< /note >}}
225225

226226
An ExternalName Service is a special case of Service that does not have
@@ -284,7 +284,7 @@ There are a few reasons for using proxying for Services:
284284

285285
Later in this page you can read about various kube-proxy implementations work. Overall,
286286
you should note that, when running `kube-proxy`, kernel level rules may be
287-
modified (for example, iptables rules might get created), which won't get cleaned up,
287+
modified (for example, iptables rules might get created), which won't get cleaned up,
288288
in some cases until you reboot. Thus, running kube-proxy is something that should
289289
only be done by an administrator which understands the consequences of having a
290290
low level, privileged network proxying service on a computer. Although the `kube-proxy`
@@ -299,6 +299,7 @@ Note that the kube-proxy starts up in different modes, which are determined by i
299299
- The ConfigMap parameters for the kube-proxy cannot all be validated and verified on startup. For example, if your operating system doesn't allow you to run iptables commands, the standard kernel kube-proxy implementation will not work. Likewise, if you have an operating system which doesn't support `netsh`, it will not run in Windows userspace mode.
300300

301301
### User space proxy mode {#proxy-mode-userspace}
302+
{{< feature-state for_k8s_version="v1.23" state="deprecated" >}}
302303

303304
In this (legacy) mode, kube-proxy watches the Kubernetes control plane for the addition and
304305
removal of Service and Endpoint objects. For each Service it opens a
@@ -741,13 +742,13 @@ Your cluster must have the `ServiceLoadBalancerClass` [feature gate](/docs/refer
741742
other versions of Kubernetes, check the documentation for that release.
742743
By default, `spec.loadBalancerClass` is `nil` and a `LoadBalancer` type of Service uses
743744
the cloud provider's default load balancer implementation if the cluster is configured with
744-
a cloud provider using the `--cloud-provider` component flag.
745+
a cloud provider using the `--cloud-provider` component flag.
745746
If `spec.loadBalancerClass` is specified, it is assumed that a load balancer
746747
implementation that matches the specified class is watching for Services.
747748
Any default load balancer implementation (for example, the one provided by
748749
the cloud provider) will ignore Services that have this field set.
749750
`spec.loadBalancerClass` can be set on a Service of type `LoadBalancer` only.
750-
Once set, it cannot be changed.
751+
Once set, it cannot be changed.
751752
The value of `spec.loadBalancerClass` must be a label-style identifier,
752753
with an optional prefix such as "`internal-vip`" or "`example.com/internal-vip`".
753754
Unprefixed names are reserved for end-users.
@@ -1030,7 +1031,7 @@ There are other annotations to manage Classic Elastic Load Balancers that are de
10301031

10311032
service.beta.kubernetes.io/aws-load-balancer-security-groups: "sg-53fae93f"
10321033
# A list of existing security groups to be configured on the ELB created. Unlike the annotation
1033-
# service.beta.kubernetes.io/aws-load-balancer-extra-security-groups, this replaces all other security groups previously assigned to the ELB and also overrides the creation
1034+
# service.beta.kubernetes.io/aws-load-balancer-extra-security-groups, this replaces all other security groups previously assigned to the ELB and also overrides the creation
10341035
# of a uniquely generated security group for this ELB.
10351036
# The first security group ID on this list is used as a source to permit incoming traffic to target worker nodes (service traffic and health checks).
10361037
# If multiple ELBs are configured with the same security group ID, only a single permit line will be added to the worker node security groups, that means if you delete any
@@ -1040,7 +1041,7 @@ There are other annotations to manage Classic Elastic Load Balancers that are de
10401041
service.beta.kubernetes.io/aws-load-balancer-extra-security-groups: "sg-53fae93f,sg-42efd82e"
10411042
# A list of additional security groups to be added to the created ELB, this leaves the uniquely generated security group in place, this ensures that every ELB
10421043
# has a unique security group ID and a matching permit line to allow traffic to the target worker nodes (service traffic and health checks).
1043-
# Security groups defined here can be shared between services.
1044+
# Security groups defined here can be shared between services.
10441045

10451046
service.beta.kubernetes.io/aws-load-balancer-target-node-labels: "ingress-gw,gw-name=public-api"
10461047
# A comma separated list of key-value pairs which are used

0 commit comments

Comments
 (0)