Skip to content

Commit fe2efe0

Browse files
authored
Merge pull request #45226 from Princesso/merged-main-dev-1.30
Merge main branch into dev-1.30
2 parents 08fb708 + e1465e0 commit fe2efe0

File tree

81 files changed

+1819
-904
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

81 files changed

+1819
-904
lines changed

.well-known/security.txt

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
Contact: mailto:[email protected]
2+
Expires: 2031-01-11T06:30:00.000Z
3+
Preferred-Languages: en
4+
Canonical: https://kubernetes.io/.well-known/security.txt
5+
Policy: https://github.com/kubernetes/website/blob/main/SECURITY.md
Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
---
2+
title: cAdvisor
3+
id: cadvisor
4+
date: 2021-12-09
5+
full_link: https://github.com/google/cadvisor/
6+
short_description: >
7+
Werkzeug, um Ressourcenverbrauch und Performance Charakteristiken von Container besser zu verstehen
8+
aka:
9+
tags:
10+
- tool
11+
---
12+
cAdvisor (Container Advisor) ermöglicht Benutzer von Container ein besseres Verständnis des Ressourcenverbrauchs und der Performance Charakteristiken ihrer laufenden {{< glossary_tooltip text="Container" term_id="container" >}}.
13+
14+
<!--more-->
15+
16+
Es ist ein laufender Daemon, der Informationen über laufende Container sammelt, aggregiert, verarbeitet, und exportiert. Genauer gesagt, speichert es für jeden Container die Ressourcenisolationsparameter, den historischen Ressourcenverbrauch, die Histogramme des kompletten historischen Ressourcenverbrauchs und die Netzwerkstatistiken. Diese Daten werden pro Container und maschinenweit exportiert.
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
---
2+
title: Zertifikat
3+
id: certificate
4+
date: 2018-04-12
5+
full_link: /docs/tasks/tls/managing-tls-in-a-cluster/
6+
short_description: >
7+
Eine kryptographisch sichere Datei, die verwendet wird um den Zugriff auf das Kubernetes Cluster zu validieren.
8+
9+
aka:
10+
tags:
11+
- security
12+
---
13+
Eine kryptographisch sichere Datei, die verwendet wird um den Zugriff auf das Kubernetes Cluster zu bestätigen.
14+
15+
<!--more-->
16+
17+
Zertfikate ermöglichen es Anwendungen in einem Kubernetes Cluster sicher auf die Kubernetes API zuzugreifen. Zertfikate bestätigen, dass Clients die Erlaubnis haben auf die API zuzugreifen.
18+
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
---
2+
title: CIDR
3+
id: cidr
4+
date: 2019-11-12
5+
full_link:
6+
short_description: >
7+
CIDR ist eine Notation, um Blöcke von IP Adressen zu beschreiben und wird viel verwendet in verschiedenen Netzwerkkonfigurationen.
8+
9+
aka:
10+
tags:
11+
- networking
12+
---
13+
CIDR (Classless Inter-Domain Routing) ist eine Notation, um Blöcke von IP Adressen zu beschreiben und wird viel verwendet in verschiedenen Netzwerkkonfigurationen.
14+
15+
<!--more-->
16+
17+
Im Kubernetes Kontext, erhält jeder {{< glossary_tooltip text="Knoten" term_id="node" >}} eine Reihe von IP Adressen durch die Startadresse und eine Subnetzmaske unter Verwendung von CIDR. Dies erlaubt Knoten jedem {{< glossary_tooltip text="Pod" term_id="pod" >}} eine eigene IP Adresse zuzuweisen. Obwohl es ursprünglich ein Konzept für IPv4 ist, wurde CIDR erweitert um auch IPv6 einzubinden.
18+
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
---
2+
title: CLA (Contributor License Agreement)
3+
id: cla
4+
date: 2018-04-12
5+
full_link: https://github.com/kubernetes/community/blob/master/CLA.md
6+
short_description: >
7+
Bedingungen unter denen ein Mitwirkender eine Lizenz an ein Open Source Projekt erteilt für seine Mitwirkungen.
8+
9+
aka:
10+
tags:
11+
- community
12+
---
13+
Bedingungen unter denen ein {{< glossary_tooltip text="Mitwirkender" term_id="contributor" >}} eine Lizenz an ein Open Source Projekt erteilt für seine Mitwirkungen.
14+
15+
<!--more-->
16+
17+
CLAs helfen dabei rechtliche Streitigkeiten rund um Mitwirkungen und geistigem Eigentum (IP) zu lösen.
18+

content/en/docs/concepts/architecture/garbage-collection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,7 @@ until disk usage reaches the `LowThresholdPercent` value.
139139

140140
#### Garbage collection for unused container images {#image-maximum-age-gc}
141141

142-
{{< feature-state for_k8s_version="v1.29" state="alpha" >}}
142+
{{< feature-state feature_gate_name="ImageMaximumGCAge" >}}
143143

144144
As an alpha feature, you can specify the maximum time a local image can be unused for,
145145
regardless of disk usage. This is a kubelet setting that you configure for each node.

content/en/docs/concepts/architecture/leases.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ instances are on stand-by.
3333

3434
## API server identity
3535

36-
{{< feature-state for_k8s_version="v1.26" state="beta" >}}
36+
{{< feature-state feature_gate_name="APIServerIdentity" >}}
3737

3838
Starting in Kubernetes v1.26, each `kube-apiserver` uses the Lease API to publish its identity to the
3939
rest of the system. While not particularly useful on its own, this provides a mechanism for clients to

content/en/docs/concepts/architecture/mixed-version-proxy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ weight: 220
88

99
<!-- overview -->
1010

11-
{{< feature-state state="alpha" for_k8s_version="v1.28" >}}
11+
{{< feature-state feature_gate_name="UnknownVersionInteroperabilityProxy" >}}
1212

1313
Kubernetes {{< skew currentVersion >}} includes an alpha feature that lets an
1414
{{< glossary_tooltip text="API Server" term_id="kube-apiserver" >}}

content/en/docs/concepts/architecture/nodes.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -280,7 +280,7 @@ If you want to explicitly reserve resources for non-Pod processes, see
280280

281281
## Node topology
282282

283-
{{< feature-state state="stable" for_k8s_version="v1.27" >}}
283+
{{< feature-state feature_gate_name="TopologyManager" >}}
284284

285285
If you have enabled the `TopologyManager`
286286
[feature gate](/docs/reference/command-line-tools-reference/feature-gates/), then
@@ -290,7 +290,7 @@ for more information.
290290

291291
## Graceful node shutdown {#graceful-node-shutdown}
292292

293-
{{< feature-state state="beta" for_k8s_version="v1.21" >}}
293+
{{< feature-state feature_gate_name="GracefulNodeShutdown" >}}
294294

295295
The kubelet attempts to detect node system shutdown and terminates pods running on the node.
296296

@@ -374,7 +374,7 @@ Message: Pod was terminated in response to imminent node shutdown.
374374

375375
### Pod Priority based graceful node shutdown {#pod-priority-graceful-node-shutdown}
376376

377-
{{< feature-state state="beta" for_k8s_version="v1.24" >}}
377+
{{< feature-state feature_gate_name="GracefulNodeShutdownBasedOnPodPriority" >}}
378378

379379
To provide more flexibility during graceful node shutdown around the ordering
380380
of pods during shutdown, graceful node shutdown honors the PriorityClass for
@@ -471,7 +471,7 @@ are emitted under the kubelet subsystem to monitor node shutdowns.
471471

472472
## Non-graceful node shutdown handling {#non-graceful-node-shutdown}
473473

474-
{{< feature-state state="stable" for_k8s_version="v1.28" >}}
474+
{{< feature-state feature_gate_name="NodeOutOfServiceVolumeDetach" >}}
475475

476476
A node shutdown action may not be detected by kubelet's Node Shutdown Manager,
477477
either because the command does not trigger the inhibitor locks mechanism used by
@@ -515,7 +515,7 @@ During a non-graceful shutdown, Pods are terminated in the two phases:
515515

516516
## Swap memory management {#swap-memory}
517517

518-
{{< feature-state state="beta" for_k8s_version="v1.28" >}}
518+
{{< feature-state feature_gate_name="NodeSwap" >}}
519519

520520
To enable swap on a node, the `NodeSwap` feature gate must be enabled on
521521
the kubelet, and the `--fail-swap-on` command line flag or `failSwapOn`

content/en/docs/concepts/cluster-administration/system-logs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -238,7 +238,7 @@ The `logrotate` tool rotates logs daily, or once the log size is greater than 10
238238

239239
## Log query
240240

241-
{{< feature-state for_k8s_version="v1.27" state="alpha" >}}
241+
{{< feature-state feature_gate_name="NodeLogQuery" >}}
242242

243243
To help with debugging issues on nodes, Kubernetes v1.27 introduced a feature that allows viewing logs of services
244244
running on the node. To use the feature, ensure that the `NodeLogQuery`

0 commit comments

Comments
 (0)