Skip to content

Commit d989445

Browse files
committed
resolved conflict as discussed, accepted current change with CRICTL_VERSION=v1.31.0
2 parents bedf5b4 + fb6bf49 commit d989445

File tree

69 files changed

+4563
-229
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

69 files changed

+4563
-229
lines changed

OWNERS_ALIASES

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,6 @@ aliases:
5454
- bene2k1
5555
- rlenferink
5656
sig-docs-en-owners: # Admins for English content
57-
- celestehorgan
5857
- dipesh-rawat
5958
- divya-mohan0209
6059
- katcosgrove
@@ -65,7 +64,6 @@ aliases:
6564
- sftim
6665
- tengqm
6766
sig-docs-en-reviews: # PR reviews for English content
68-
- celestehorgan
6967
- dipesh-rawat
7068
- divya-mohan0209
7169
- katcosgrove
@@ -98,12 +96,12 @@ aliases:
9896
- rekcah78
9997
- remyleone
10098
sig-docs-hi-owners: # Admins for Hindi content
101-
- anubha-v-ardhan
99+
- dipesh-rawat
102100
- divya-mohan0209
103101
sig-docs-hi-reviews: # PR reviews for Hindi content
104-
- anubha-v-ardhan
105102
- Babapool
106103
- bishal7679
104+
- dipesh-rawat
107105
- divya-mohan0209
108106
sig-docs-id-owners: # Admins for Indonesian content
109107
- ariscahyadi

content/de/docs/concepts/architecture/nodes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ Das `conditions` Feld beschreibt den Zustand, aller `Running` Nodes.
4545
| Node Condition | Beschreibung |
4646
|----------------|-------------|
4747
| `OutOfDisk` | `True` wenn auf dem Node nicht genügend freier Speicherplatz zum Hinzufügen neuer Pods vorhanden ist, andernfalls `False` |
48-
| `Ready` | `True` wenn der Node in einem guten Zustand und bereit ist Pods aufzunehmen, `False` wenn der Node nicht in einem guten Zustand ist und nicht bereit ist Pods aufzunehmeb, und `Unknown` wenn der Node-Controller seit der letzten `node-monitor-grace-period` nichts von dem Node gehört hat (Die Standardeinstellung beträgt 40 Sekunden) |
48+
| `Ready` | `True` wenn der Node in einem guten Zustand und bereit ist Pods aufzunehmen, `False` wenn der Node nicht in einem guten Zustand ist und nicht bereit ist Pods aufzunehmen, und `Unknown` wenn der Node-Controller seit der letzten `node-monitor-grace-period` nichts von dem Node gehört hat (Die Standardeinstellung beträgt 40 Sekunden) |
4949
| `MemoryPressure` | `True` wenn der verfügbare Speicher des Nodes niedrig ist; Andernfalls`False` |
5050
| `PIDPressure` | `True` wenn zu viele Prozesse auf dem Node vorhanden sind; Andernfalls`False` |
5151
| `DiskPressure` | `True` wenn die Festplattenkapazität niedrig ist. Andernfalls `False` |

content/en/_index.html

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,12 +47,15 @@ <h2>The Challenges of Migrating 150+ Microservices to Kubernetes</h2>
4747
<button id="desktopShowVideoButton" onclick="kub.showVideo()">Watch Video</button>
4848
<br>
4949
<br>
50-
<a href="https://events.linuxfoundation.org/kubecon-cloudnativecon-europe/" button id="desktopKCButton">Attend KubeCon + CloudNativeCon Europe on March 19-22, 2024</a>
50+
<a href="https://events.linuxfoundation.org/kubecon-cloudnativecon-open-source-summit-ai-dev-china/" button id="desktopKCButton">Attend KubeCon + CloudNativeCon China on August 21-23</a>
5151
<br>
5252
<br>
5353
<br>
54+
<a href="https://events.linuxfoundation.org/kubecon-cloudnativecon-north-america-2024/" button id="desktopKCButton">Attend KubeCon + CloudNativeCon North America on November 12-15</a>
5455
<br>
55-
<a href="https://events.linuxfoundation.org/kubecon-cloudnativecon-north-america-2024/" button id="desktopKCButton">Attend KubeCon + CloudNativeCon North America on November 12-15, 2024</a>
56+
<br>
57+
<br>
58+
<a href="https://events.linuxfoundation.org/kubecon-cloudnativecon-india/" button id="desktopKCButton">Attend KubeCon + CloudNativeCon India on December 11-12</a>
5659
</div>
5760
<div id="videoPlayer">
5861
<iframe data-url="https://www.youtube.com/embed/H06qrNmGqyE?autoplay=1" frameborder="0" allowfullscreen></iframe>

content/en/blog/_posts/2023-12-14-disabling-in-tree-cloud-provider-goes-beta.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ These updated default settings affect a large proportion of Kubernetes users,
4040
and **will require changes** for users who were previously using the in-tree
4141
provider integrations. The legacy integrations offered compatibility with
4242
Azure, AWS, GCE, OpenStack, and vSphere; however for AWS and OpenStack the
43-
compiled-in integrations were removed in Kubernetes versions 1.26 and 1.27,
43+
compiled-in integrations were removed in Kubernetes versions 1.27 and 1.26,
4444
respectively.
4545

4646
## What has changed?

content/en/blog/_posts/2024-04-17-kubernetes-1.30.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -145,7 +145,7 @@ You need to enable the `CRDValidationRatcheting` [feature
145145
gate](/docs/reference/command-line-tools-reference/feature-gates/) to use this behavior, which then
146146
applies to all CustomResourceDefinitions in your cluster.
147147

148-
Provided you enabled the feature gate, Kubernetes implements _validation racheting_ for
148+
Provided you enabled the feature gate, Kubernetes implements _validation ratcheting_ for
149149
CustomResourceDefinitions. The API server is willing to accept updates to resources that are not valid
150150
after the update, provided that each part of the resource that failed to validate was not changed by
151151
the update operation. In other words, any invalid part of the resource that remains invalid must

content/en/docs/concepts/architecture/garbage-collection.md

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -148,8 +148,17 @@ To configure the setting, enable the `ImageMaximumGCAge`
148148
[feature gate](/docs/reference/command-line-tools-reference/feature-gates/) for the kubelet,
149149
and also set a value for the `ImageMaximumGCAge` field in the kubelet configuration file.
150150

151-
The value is specified as a Kubernetes _duration_; for example, you can set the configuration
152-
field to `3d12h`, which means 3 days and 12 hours.
151+
The value is specified as a Kubernetes _duration_;
152+
Valid time units for the `ImageMaximumGCAge` field in the kubelet configuration file are:
153+
- "ns" for nanoseconds
154+
- "us" or "µs" for microseconds
155+
- "ms" for milliseconds
156+
- "s" for seconds
157+
- "m" for minutes
158+
- "h" for hours
159+
160+
For example, you can set the configuration field to `12h45m`,
161+
which means 12 hours and 45 minutes.
153162

154163
{{< note >}}
155164
This feature does not track image usage across kubelet restarts. If the kubelet

content/en/docs/concepts/extend-kubernetes/api-extension/custom-resources.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -325,7 +325,7 @@ selectable fields.
325325

326326
{{% code_sample file="customresourcedefinition/shirt-resource-definition.yaml" %}}
327327

328-
Field selectors can then be used to get only resources with with a `color` of `blue`:
328+
Field selectors can then be used to get only resources with a `color` of `blue`:
329329

330330
```shell
331331
kubectl get shirts.stable.example.com --field-selector spec.color=blue

content/en/docs/concepts/policy/resource-quotas.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -185,17 +185,17 @@ a poorly configured CronJob. CronJobs that create too many Jobs in a namespace c
185185
There is another syntax only to set the same type of quota for certain resources.
186186
The following types are supported:
187187

188-
| Resource Name | Description |
189-
| ------------------------------- | ------------------------------------------------- |
190-
| `configmaps` | The total number of ConfigMaps that can exist in the namespace. |
191-
| `persistentvolumeclaims` | The total number of [PersistentVolumeClaims](/docs/concepts/storage/persistent-volumes/#persistentvolumeclaims) that can exist in the namespace. |
192-
| `pods` | The total number of Pods in a non-terminal state that can exist in the namespace. A pod is in a terminal state if `.status.phase in (Failed, Succeeded)` is true. |
193-
| `replicationcontrollers` | The total number of ReplicationControllers that can exist in the namespace. |
194-
| `resourcequotas` | The total number of ResourceQuotas that can exist in the namespace. |
195-
| `services` | The total number of Services that can exist in the namespace. |
196-
| `services.loadbalancers` | The total number of Services of type `LoadBalancer` that can exist in the namespace. |
197-
| `services.nodeports` | The total number of Services of type `NodePort` that can exist in the namespace. |
198-
| `secrets` | The total number of Secrets that can exist in the namespace. |
188+
| Resource Name | Description |
189+
| ------------------------------- |--------------------------------------------------------------------------------------------------------------------------------------------------------------------|
190+
| `configmaps` | The total number of ConfigMaps that can exist in the namespace. |
191+
| `persistentvolumeclaims` | The total number of [PersistentVolumeClaims](/docs/concepts/storage/persistent-volumes/#persistentvolumeclaims) that can exist in the namespace. |
192+
| `pods` | The total number of Pods in a non-terminal state that can exist in the namespace. A pod is in a terminal state if `.status.phase in (Failed, Succeeded)` is true. |
193+
| `replicationcontrollers` | The total number of ReplicationControllers that can exist in the namespace. |
194+
| `resourcequotas` | The total number of ResourceQuotas that can exist in the namespace. |
195+
| `services` | The total number of Services that can exist in the namespace. |
196+
| `services.loadbalancers` | The total number of Services of type `LoadBalancer` that can exist in the namespace. |
197+
| `services.nodeports` | The total number of `NodePorts` allocated to Services of type `NodePort` or `LoadBalancer` that can exist in the namespace. |
198+
| `secrets` | The total number of Secrets that can exist in the namespace. |
199199

200200
For example, `pods` quota counts and enforces a maximum on the number of `pods`
201201
created in a single namespace that are not terminal. You might want to set a `pods`

content/en/docs/concepts/services-networking/dual-stack.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -91,9 +91,8 @@ set the `.spec.ipFamilyPolicy` field to one of the following values:
9191

9292
* `SingleStack`: Single-stack service. The control plane allocates a cluster IP for the Service,
9393
using the first configured service cluster IP range.
94-
* `PreferDualStack`:
95-
* Allocates IPv4 and IPv6 cluster IPs for the Service.
96-
* `RequireDualStack`: Allocates Service `.spec.ClusterIPs` from both IPv4 and IPv6 address ranges.
94+
* `PreferDualStack`: Allocates both IPv4 and IPv6 cluster IPs for the Service when dual-stack is enabled. If dual-stack is not enabled or supported, it falls back to single-stack behavior.
95+
* `RequireDualStack`: Allocates Service `.spec.clusterIPs` from both IPv4 and IPv6 address ranges when dual-stack is enabled. If dual-stack is not enabled or supported, the Service API object creation fails.
9796
* Selects the `.spec.ClusterIP` from the list of `.spec.ClusterIPs` based on the address family
9897
of the first element in the `.spec.ipFamilies` array.
9998

content/en/docs/concepts/services-networking/windows-networking.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -52,9 +52,9 @@ with recommendations on when to use each CNI:
5252

5353
| Network Driver | Description | Container Packet Modifications | Network Plugins | Network Plugin Characteristics |
5454
| -------------- | ----------- | ------------------------------ | --------------- | ------------------------------ |
55-
| L2bridge | Containers are attached to an external vSwitch. Containers are attached to the underlay network, although the physical network doesn't need to learn the container MACs because they are rewritten on ingress/egress. | MAC is rewritten to host MAC, IP may be rewritten to host IP using HNS OutboundNAT policy. | [win-bridge](https://github.com/containernetworking/plugins/tree/master/plugins/main/windows/win-bridge), [Azure-CNI](https://github.com/Azure/azure-container-networking/blob/master/docs/cni.md), Flannel host-gateway uses win-bridge | win-bridge uses L2bridge network mode, connects containers to the underlay of hosts, offering best performance. Requires user-defined routes (UDR) for inter-node connectivity. |
55+
| L2bridge | Containers are attached to an external vSwitch. Containers are attached to the underlay network, although the physical network doesn't need to learn the container MACs because they are rewritten on ingress/egress. | MAC is rewritten to host MAC, IP may be rewritten to host IP using HNS OutboundNAT policy. | [win-bridge](https://www.cni.dev/plugins/current/main/win-bridge/), [Azure-CNI](https://github.com/Azure/azure-container-networking/blob/master/docs/cni.md), [Flannel host-gateway](https://github.com/flannel-io/flannel/blob/master/Documentation/backends.md#host-gw) uses win-bridge | win-bridge uses L2bridge network mode, connects containers to the underlay of hosts, offering best performance. Requires user-defined routes (UDR) for inter-node connectivity. |
5656
| L2Tunnel | This is a special case of l2bridge, but only used on Azure. All packets are sent to the virtualization host where SDN policy is applied. | MAC rewritten, IP visible on the underlay network | [Azure-CNI](https://github.com/Azure/azure-container-networking/blob/master/docs/cni.md) | Azure-CNI allows integration of containers with Azure vNET, and allows them to leverage the set of capabilities that [Azure Virtual Network provides](https://azure.microsoft.com/en-us/services/virtual-network/). For example, securely connect to Azure services or use Azure NSGs. See [azure-cni for some examples](https://docs.microsoft.com/azure/aks/concepts-network#azure-cni-advanced-networking) |
57-
| Overlay | Containers are given a vNIC connected to an external vSwitch. Each overlay network gets its own IP subnet, defined by a custom IP prefix.The overlay network driver uses VXLAN encapsulation. | Encapsulated with an outer header. | [win-overlay](https://github.com/containernetworking/plugins/tree/master/plugins/main/windows/win-overlay), Flannel VXLAN (uses win-overlay) | win-overlay should be used when virtual container networks are desired to be isolated from underlay of hosts (e.g. for security reasons). Allows for IPs to be re-used for different overlay networks (which have different VNID tags) if you are restricted on IPs in your datacenter. This option requires [KB4489899](https://support.microsoft.com/help/4489899) on Windows Server 2019. |
57+
| Overlay | Containers are given a vNIC connected to an external vSwitch. Each overlay network gets its own IP subnet, defined by a custom IP prefix.The overlay network driver uses VXLAN encapsulation. | Encapsulated with an outer header. | [win-overlay](https://www.cni.dev/plugins/current/main/win-overlay/), [Flannel VXLAN](https://github.com/flannel-io/flannel/blob/master/Documentation/backends.md#vxlan) (uses win-overlay) | win-overlay should be used when virtual container networks are desired to be isolated from underlay of hosts (e.g. for security reasons). Allows for IPs to be re-used for different overlay networks (which have different VNID tags) if you are restricted on IPs in your datacenter. This option requires [KB4489899](https://support.microsoft.com/help/4489899) on Windows Server 2019. |
5858
| Transparent (special use case for [ovn-kubernetes](https://github.com/openvswitch/ovn-kubernetes)) | Requires an external vSwitch. Containers are attached to an external vSwitch which enables intra-pod communication via logical networks (logical switches and routers). | Packet is encapsulated either via [GENEVE](https://datatracker.ietf.org/doc/draft-gross-geneve/) or [STT](https://datatracker.ietf.org/doc/draft-davie-stt/) tunneling to reach pods which are not on the same host. <br/> Packets are forwarded or dropped via the tunnel metadata information supplied by the ovn network controller. <br/> NAT is done for north-south communication. | [ovn-kubernetes](https://github.com/openvswitch/ovn-kubernetes) | [Deploy via ansible](https://github.com/openvswitch/ovn-kubernetes/tree/master/contrib). Distributed ACLs can be applied via Kubernetes policies. IPAM support. Load-balancing can be achieved without kube-proxy. NATing is done without using iptables/netsh. |
5959
| NAT (*not used in Kubernetes*) | Containers are given a vNIC connected to an internal vSwitch. DNS/DHCP is provided using an internal component called [WinNAT](https://techcommunity.microsoft.com/t5/virtualization/windows-nat-winnat-capabilities-and-limitations/ba-p/382303) | MAC and IP is rewritten to host MAC/IP. | [nat](https://github.com/Microsoft/windows-container-networking/tree/master/plugins/nat) | Included here for completeness |
6060

0 commit comments

Comments
 (0)