Skip to content

Commit 69b5ebb

Browse files
authored
Merge pull request #44655 from jboxman-rh/fix-rogue-pods
Apply lowercase pod convention
2 parents 54e714f + 7778101 commit 69b5ebb

32 files changed

+40
-40
lines changed

logging/cluster-logging-release-notes.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ To see these metrics, open the *Administrator* perspective in the {product-title
111111

112112
* Before this update, some log entries had unrecognized UTF-8 bytes, which caused Elasticsearch to reject the messages and block the entire buffered payload. With this update, rejected payloads drop the invalid log entries and resubmit the remaining entries to resolve the issue. (link:https://issues.redhat.com/browse/LOG-1499[LOG-1499])
113113

114-
* Before this update, the `kibana-proxy` Pod sometimes entered the `CrashLoopBackoff` state and logged the following message `Invalid configuration: cookie_secret must be 16, 24, or 32 bytes to create an AES cipher when pass_access_token == true or cookie_refresh != 0, but is 29 bytes.` The exact actual number of bytes could vary. With this update, the generation of the Kibana session secret has been corrected, and the kibana-proxy Pod no longer enters a `CrashLoopBackoff` state due to this error. (link:https://issues.redhat.com/browse/LOG-1446[LOG-1446])
114+
* Before this update, the `kibana-proxy` pod sometimes entered the `CrashLoopBackoff` state and logged the following message `Invalid configuration: cookie_secret must be 16, 24, or 32 bytes to create an AES cipher when pass_access_token == true or cookie_refresh != 0, but is 29 bytes.` The exact actual number of bytes could vary. With this update, the generation of the Kibana session secret has been corrected, and the kibana-proxy pod no longer enters a `CrashLoopBackoff` state due to this error. (link:https://issues.redhat.com/browse/LOG-1446[LOG-1446])
115115

116116
* Before this update, the AWS CloudWatch Fluentd plug-in logged its AWS API calls to the Fluentd log at all log levels, consuming additional {product-title} node resources. With this update, the AWS CloudWatch Fluentd plug-in logs AWS API calls only at the "debug" and "trace" log levels. This way, at the default "warn" log level, Fluentd does not consume extra node resources. (link:https://issues.redhat.com/browse/LOG-1071[LOG-1071])
117117

modules/builds-using-secrets.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ stringData:
5757
<3> File contains the provided string.
5858
<4> File contains the provided data.
5959
+
60-
.YAML of a Pod Populating Files in a Volume with Secret Data
60+
.YAML of a pod populating files in a volume with secret data
6161
[source,yaml]
6262
----
6363
apiVersion: v1
@@ -81,7 +81,7 @@ spec:
8181
restartPolicy: Never
8282
----
8383
+
84-
.YAML of a Pod Populating Environment Variables with Secret Data
84+
.YAML of a pod populating environment variables with secret data
8585
[source,yaml]
8686
----
8787
apiVersion: v1

modules/certificate-injection-using-operators.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ injects certificates across any namespace when an empty ConfigMap is created wit
3131
`config.openshift.io/inject-trusted-cabundle=true` label.
3232

3333
The ConfigMap can reside in any namespace, but the ConfigMap must be mounted as
34-
a volume to each container within a Pod that requires a custom CA. For example:
34+
a volume to each container within a pod that requires a custom CA. For example:
3535

3636
[source,yaml]
3737
----

modules/cluster-logging-collector-log-forward-cloudwatch.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ $ oc get Infrastructure/cluster -ojson | jq .status.infrastructureName
9292
"mycluster-7977k"
9393
----
9494

95-
To generate log data for this example, you run a `busybox` Pod in a namespace called `app`. The `busybox` Pod writes a message to stdout every three seconds:
95+
To generate log data for this example, you run a `busybox` pod in a namespace called `app`. The `busybox` pod writes a message to stdout every three seconds:
9696

9797
[source,terminal]
9898
----
@@ -105,7 +105,7 @@ My life is my message
105105
----
106106

107107

108-
You can look up the UUID of the `app` namespace where the `busybox` Pod runs:
108+
You can look up the UUID of the `app` namespace where the `busybox` pod runs:
109109

110110
[source,terminal]
111111
----

modules/cluster-logging-configuration-of-json-log-data-for-default-elasticsearch.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ If you forward JSON logs to the default Elasticsearch instance managed by OpenSh
1313
You can use the following structure types in the `ClusterLogForwarder` CR to construct index names for the Elasticsearch log store:
1414

1515
* `structuredTypeKey` (string, optional) is the name of a message field. The value of that field, if present, is used to construct the index name.
16-
** `kubernetes.labels.<key>` is the Kubernetes Pod label whose value is used to construct the index name.
16+
** `kubernetes.labels.<key>` is the Kubernetes pod label whose value is used to construct the index name.
1717
** `openshift.labels.<key>` is the `pipeline.label.<key>` element in the `ClusterLogForwarder` CR whose value is used to construct the index name.
1818
** `kubernetes.container_name` uses the container name to construct the index name.
1919
* `structuredTypeName`: (string, optional) If `structuredTypeKey` is not set or its key is not present, OpenShift Logging uses the value of `structuredTypeName` as the structured type. When you use both `structuredTypeKey` and `structuredTypeName` together, `structuredTypeName` provides a fallback index name if the key in `structuredTypeKey` is missing from the JSON log data.

modules/cnf-creating-the-performance-profile-object.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ realTimeKernel:
5353
+
5454
`reserved` - The housekeeping CPUs. Threads in the reserved group tend to be very busy, so latency-sensitive
5555
applications should be run in the isolated group.
56-
See link:https://kubernetes.io/docs/tasks/configure-pod-container/quality-service-pod/#create-a-pod-that-gets-assigned-a-qos-class-of-guaranteed[Create a Pod that gets assigned a QoS class of `Guaranteed`].
56+
See link:https://kubernetes.io/docs/tasks/configure-pod-container/quality-service-pod/#create-a-pod-that-gets-assigned-a-qos-class-of-guaranteed[Create a pod that gets assigned a QoS class of `Guaranteed`].
5757

5858
For example, you can reserve cores (threads) from a single NUMA node and put your workloads on another NUMA node.
5959
The reason for this is that the housekeeping CPUs may be touching caches in the CPU.

modules/customize-certificates-add-service-serving-configmap.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
[id="add-service-certificate-configmap_{context}"]
77
= Add the service CA bundle to a config map
88

9-
A Pod can access the service CA certificate by mounting a `ConfigMap` object that
9+
A pod can access the service CA certificate by mounting a `ConfigMap` object that
1010
is annotated with `service.beta.openshift.io/inject-cabundle=true`.
1111
Once annotated, the cluster automatically injects the service CA
1212
certificate into the `service-ca.crt` key on the config map. Access to

modules/dedicated-aws-vpc-verifying-troubleshooting.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ working correctly.
3030
helpful troubleshooting tool. It is included in the default image and provides
3131
quick and clear output if a connection can be established:
3232
33-
.. Create a temporary Pod using the `busybox` image, which cleans up after itself:
33+
.. Create a temporary pod using the `busybox` image, which cleans up after itself:
3434
+
3535
----
3636
$ oc run netcat-test \

modules/dedicated-aws-vpn-verifying.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ To test network connectivity to an endpoint device, `nc` (or `netcat`) is a
2828
helpful troubleshooting tool. It is included in the default image and provides
2929
quick and clear output if a connection can be established:
3030

31-
.. Create a temporary Pod using the `busybox` image, which cleans up after itself:
31+
.. Create a temporary pod using the `busybox` image, which cleans up after itself:
3232
+
3333
----
3434
$ oc run netcat-test \

modules/dedicated-cluster-install-deploy.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ If either operator does not appear as installed, to troubleshoot further:
6464
+
6565
* Switch to the *Operators* → *Installed Operators* page and inspect
6666
the *Status* column for any errors or failures.
67-
* Switch to the *Workloads* → *Pods* page and check the logs in each Pod in the
67+
* Switch to the *Workloads* → *Pods* page and check the logs in each pod in the
6868
`openshift-logging` project that is reporting issues.
6969

7070
. Create and deploy an OpenShift Logging instance:

0 commit comments

Comments
 (0)