Skip to content

Commit e097b93

Browse files
committed
Fix pages that reference removed API groups
Quite some resources have been moved out of the `extensions` API group since 1.18; the `apps/v1beta1` and `apps/v1beta2` group versions are also dropped. This PR updates the pages which still reference such API groups or group versions.
1 parent c452e65 commit e097b93

File tree

9 files changed

+8
-38
lines changed

9 files changed

+8
-38
lines changed

content/en/docs/concepts/cluster-administration/manage-deployment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -323,7 +323,7 @@ When load on your application grows or shrinks, it's easy to scale with `kubectl
323323
kubectl scale deployment/my-nginx --replicas=1
324324
```
325325
```shell
326-
deployment.extensions/my-nginx scaled
326+
deployment.apps/my-nginx scaled
327327
```
328328

329329
Now you only have one pod managed by the deployment.

content/en/docs/concepts/overview/kubernetes-api.md

Lines changed: 1 addition & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,6 @@ The Kubernetes API lets you query and manipulate the state of objects in the Kub
2525
API endpoints, resource types and samples are described in the [API Reference](/docs/reference/kubernetes-api/).
2626

2727

28-
29-
3028
<!-- body -->
3129

3230
## API changes
@@ -87,7 +85,7 @@ Kubernetes implements an alternative Protobuf based serialization format for the
8785

8886
To make it easier to eliminate fields or restructure resource representations, Kubernetes supports
8987
multiple API versions, each at a different API path, such as `/api/v1` or
90-
`/apis/extensions/v1beta1`.
88+
`/apis/rbac.authorization.k8s.io/v1alpha1`.
9189

9290
Versioning is done at the API level rather than at the resource or field level to ensure that the
9391
API presents a clear, consistent view of system resources and behavior, and to enable controlling
@@ -157,14 +155,6 @@ The flag accepts comma separated set of key=value pairs describing runtime confi
157155
{{< note >}}Enabling or disabling groups or resources requires restarting the kube-apiserver and the
158156
kube-controller-manager to pick up the `--runtime-config` changes.{{< /note >}}
159157

160-
## Enabling specific resources in the extensions/v1beta1 group
161-
162-
DaemonSets, Deployments, StatefulSet, NetworkPolicies, PodSecurityPolicies and ReplicaSets in the `extensions/v1beta1` API group are disabled by default.
163-
For example: to enable deployments and daemonsets, set
164-
`--runtime-config=extensions/v1beta1/deployments=true,extensions/v1beta1/daemonsets=true`.
165-
166-
{{< note >}}Individual resource enablement/disablement is only supported in the `extensions/v1beta1` API group for legacy reasons.{{< /note >}}
167-
168158
## Persistence
169159

170160
Kubernetes stores its serialized state in terms of the API resources by writing them into

content/en/docs/concepts/workloads/controllers/deployment.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1155,10 +1155,6 @@ created Pod should be ready without any of its containers crashing, for it to be
11551155
This defaults to 0 (the Pod will be considered available as soon as it is ready). To learn more about when
11561156
a Pod is considered ready, see [Container Probes](/docs/concepts/workloads/pods/pod-lifecycle/#container-probes).
11571157
1158-
### Rollback To
1159-
1160-
Field `.spec.rollbackTo` has been deprecated in API versions `extensions/v1beta1` and `apps/v1beta1`, and is no longer supported in API versions starting `apps/v1beta2`. Instead, `kubectl rollout undo` as introduced in [Rolling Back to a Previous Revision](#rolling-back-to-a-previous-revision) should be used.
1161-
11621158
### Revision History Limit
11631159
11641160
A Deployment's revision history is stored in the ReplicaSets it controls.

content/en/docs/concepts/workloads/controllers/garbage-collection.md

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -111,12 +111,6 @@ To control the cascading deletion policy, set the `propagationPolicy`
111111
field on the `deleteOptions` argument when deleting an Object. Possible values include "Orphan",
112112
"Foreground", or "Background".
113113

114-
Prior to Kubernetes 1.9, the default garbage collection policy for many controller resources was `orphan`.
115-
This included ReplicationController, ReplicaSet, StatefulSet, DaemonSet, and
116-
Deployment. For kinds in the `extensions/v1beta1`, `apps/v1beta1`, and `apps/v1beta2` group versions, unless you
117-
specify otherwise, dependent objects are orphaned by default. In Kubernetes 1.9, for all kinds in the `apps/v1`
118-
group version, dependent objects are deleted by default.
119-
120114
Here's an example that deletes dependents in background:
121115

122116
```shell

content/en/docs/reference/access-authn-authz/admission-controllers.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -677,9 +677,6 @@ for more information.
677677
This admission controller acts on creation and modification of the pod and determines if it should be admitted
678678
based on the requested security context and the available Pod Security Policies.
679679

680-
For Kubernetes < 1.6.0, the API Server must enable the extensions/v1beta1/podsecuritypolicy API
681-
extensions group (`--runtime-config=extensions/v1beta1/podsecuritypolicy=true`).
682-
683680
See also [Pod Security Policy documentation](/docs/concepts/policy/pod-security-policy/)
684681
for more information.
685682

@@ -793,4 +790,4 @@ phase, and therefore is the last admission controller to run.
793790
in the mutating phase.
794791

795792
For earlier versions, there was no concept of validating versus mutating and the
796-
admission controllers ran in the exact order specified.
793+
admission controllers ran in the exact order specified.

content/en/docs/reference/access-authn-authz/extensible-admission-controllers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -949,7 +949,7 @@ See https://kubernetes.io/docs/concepts/overview/working-with-objects/labels for
949949
### Matching requests: matchPolicy
950950

951951
API servers can make objects available via multiple API groups or versions.
952-
For example, the Kubernetes API server allows creating and modifying `Deployment` objects
952+
For example, the Kubernetes API server may allow creating and modifying `Deployment` objects
953953
via `extensions/v1beta1`, `apps/v1beta1`, `apps/v1beta2`, and `apps/v1` APIs.
954954

955955
For example, if a webhook only specified a rule for some API groups/versions (like `apiGroups:["apps"], apiVersions:["v1","v1beta1"]`),

content/en/docs/reference/using-api/api-overview.md

Lines changed: 1 addition & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ if you are writing an application using the Kubernetes API.
3333

3434
To eliminate fields or restructure resource representations, Kubernetes supports
3535
multiple API versions, each at a different API path. For example: `/api/v1` or
36-
`/apis/extensions/v1beta1`.
36+
`/apis/rbac.authorization.k8s.io/v1alpha1`.
3737

3838
The version is set at the API level rather than at the resource or field level to:
3939

@@ -106,10 +106,3 @@ When you enable or disable groups or resources, you need to restart the apiserve
106106
to pick up the `--runtime-config` changes.
107107
{{< /note >}}
108108

109-
## Enabling specific resources in the extensions/v1beta1 group
110-
111-
DaemonSets, Deployments, StatefulSet, NetworkPolicies, PodSecurityPolicies and ReplicaSets in the `extensions/v1beta1` API group are disabled by default.
112-
For example: to enable deployments and daemonsets, set
113-
`--runtime-config=extensions/v1beta1/deployments=true,extensions/v1beta1/daemonsets=true`.
114-
115-
{{< note >}}Individual resource enablement/disablement is only supported in the `extensions/v1beta1` API group for legacy reasons.{{< /note >}}

content/en/docs/tasks/access-application-cluster/ingress-minikube.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -132,7 +132,7 @@ The following file is an Ingress resource that sends traffic to your Service via
132132

133133
1. Create `example-ingress.yaml` from the following file:
134134

135-
apiVersion: networking.k8s.io/v1beta1 # for versions before 1.14 use extensions/v1beta1
135+
apiVersion: networking.k8s.io/v1beta1
136136
kind: Ingress
137137
metadata:
138138
name: example-ingress
@@ -243,7 +243,7 @@ The following file is an Ingress resource that sends traffic to your Service via
243243

244244
Output:
245245
```shell
246-
ingress.extensions/example-ingress configured
246+
ingress.networking/example-ingress configured
247247
```
248248

249249
## Test Your Ingress

content/en/docs/tasks/administer-cluster/dns-horizontal-autoscaling.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -160,7 +160,7 @@ kubectl scale deployment --replicas=0 dns-autoscaler --namespace=kube-system
160160

161161
The output is:
162162

163-
deployment.extensions/dns-autoscaler scaled
163+
deployment.apps/dns-autoscaler scaled
164164

165165
Verify that the replica count is zero:
166166

0 commit comments

Comments
 (0)