Skip to content

Commit d70c621

Browse files
Merge pull request #34407 from vikram-redhat/consciouslang
[WIP] Conscious lang update: master to control plane
2 parents ad19129 + 9892b47 commit d70c621

File tree

73 files changed

+173
-179
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

73 files changed

+173
-179
lines changed

_unused_topics/monitoring-configuring-etcd-monitoring.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ $ oc -n openshift-monitoring edit configmap cluster-monitoring-config
3939

4040
. Under `config.yaml: |+`, add the `etcd` section.
4141
+
42-
.. If you run `etcd` in static pods on your master nodes, you can specify the `etcd` nodes using the selector:
42+
.. If you run `etcd` in static pods on your control plane nodes (also known as master nodes), you can specify the `etcd` nodes using the selector:
4343
+
4444
[subs="quotes"]
4545
----
@@ -118,7 +118,7 @@ image::etcd-no-certificate.png[]
118118

119119
While `etcd` is being monitored, Prometheus is not yet able to authenticate against `etcd`, and so cannot gather metrics. To configure Prometheus authentication against `etcd`:
120120

121-
. Copy the `/etc/etcd/ca/ca.crt` and `/etc/etcd/ca/ca.key` credentials files from the master node to the local machine:
121+
. Copy the `/etc/etcd/ca/ca.crt` and `/etc/etcd/ca/ca.key` credentials files from the control plane node (also known as the master node) to the local machine:
122122
+
123123
[subs="quotes"]
124124
----

_unused_topics/nodes-nodes-audit-log-advanced.adoc

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ openshift_master_audit_config={"enabled": true, "auditFilePath": "/var/lib/origi
1919

2020
[IMPORTANT]
2121
====
22-
The policy file *_/etc/origin/master/adv-audit.yaml_* must be available on each master node.
22+
The policy file *_/etc/origin/master/adv-audit.yaml_* must be available on each control plane node (also known as the master node).
2323
====
2424

2525

@@ -137,4 +137,3 @@ that group.
137137
For more information on advanced audit, see the
138138
link:https://kubernetes.io/docs/tasks/debug-application-cluster/audit[Kubernetes
139139
documentation]
140-

architecture/understanding-development.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,7 @@ so there is less overhead in running them.
124124

125125
When you ultimately run your containers in {product-title}, you use the
126126
link:https://cri-o.io/[CRI-O] container engine. CRI-O runs on every worker and
127-
master machine in an {product-title} cluster, but CRI-O is not yet supported as
127+
control plane machine (also known as the master machine) in an {product-title} cluster, but CRI-O is not yet supported as
128128
a standalone runtime outside of {product-title}.
129129

130130
[id="base-image-options"]

backup_and_restore/backing-up-etcd.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,13 +19,13 @@ Be sure to take an etcd backup after you upgrade your cluster. This is important
1919

2020
[IMPORTANT]
2121
====
22-
Back up your cluster's etcd data by performing a single invocation of the backup script on a master host. Do not take a backup for each master host.
22+
Back up your cluster's etcd data by performing a single invocation of the backup script on a control plane host (also known as the master host). Do not take a backup for each control plane host.
2323
====
2424

2525
After you have an etcd backup, you can xref:../backup_and_restore/disaster_recovery/scenario-2-restoring-cluster-state.adoc#dr-restoring-cluster-state[restore to a previous cluster state].
2626

2727
You can perform the xref:../backup_and_restore/backing-up-etcd.adoc#backing-up-etcd-data_backup-etcd[etcd data backup process]
28-
on any master host that has a running etcd instance.
28+
on any control plane host that has a running etcd instance.
2929

3030
// Backing up etcd data
3131
include::modules/backup-etcd.adoc[leveloffset=+1]

backup_and_restore/disaster_recovery/about-disaster-recovery.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,13 +13,13 @@ state.
1313

1414
[IMPORTANT]
1515
====
16-
Disaster recovery requires you to have at least one healthy master host.
16+
Disaster recovery requires you to have at least one healthy control plane host (also known as the master host).
1717
====
1818

1919
xref:../../backup_and_restore/disaster_recovery/scenario-2-restoring-cluster-state.adoc#dr-restoring-cluster-state[Restoring to a previous cluster state]::
2020
This solution handles situations where you want to restore your cluster to
2121
a previous state, for example, if an administrator deletes something critical.
22-
This also includes situations where you have lost the majority of your master hosts, leading to etcd quorum loss and the cluster going offline. As long as you have taken an etcd backup, you can follow this procedure to restore your cluster to a previous state.
22+
This also includes situations where you have lost the majority of your control plane hosts, leading to etcd quorum loss and the cluster going offline. As long as you have taken an etcd backup, you can follow this procedure to restore your cluster to a previous state.
2323
+
2424
If applicable, you might also need to xref:../../backup_and_restore/disaster_recovery/scenario-3-expired-certs.adoc#dr-recovering-expired-certs[recover from expired control plane certificates].
2525
+

backup_and_restore/replacing-unhealthy-etcd-member.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,11 +11,11 @@ This process depends on whether the etcd member is unhealthy because the machine
1111

1212
[NOTE]
1313
====
14-
If you have lost the majority of your master hosts, leading to etcd quorum loss, then you must follow the disaster recovery procedure to xref:../backup_and_restore/disaster_recovery/scenario-2-restoring-cluster-state.adoc#dr-restoring-cluster-state[restore to a previous cluster state] instead of this procedure.
14+
If you have lost the majority of your control plane hosts (also known as the master hosts), leading to etcd quorum loss, then you must follow the disaster recovery procedure to xref:../backup_and_restore/disaster_recovery/scenario-2-restoring-cluster-state.adoc#dr-restoring-cluster-state[restore to a previous cluster state] instead of this procedure.
1515
1616
If the control plane certificates are not valid on the member being replaced, then you must follow the procedure to xref:../backup_and_restore/disaster_recovery/scenario-3-expired-certs.adoc#dr-recovering-expired-certs[recover from expired control plane certificates] instead of this procedure.
1717
18-
If a master node is lost and a new one is created, the etcd cluster Operator handles generating the new TLS certificates and adding the node as an etcd member.
18+
If a control plane node is lost and a new one is created, the etcd cluster Operator handles generating the new TLS certificates and adding the node as an etcd member.
1919
====
2020

2121
== Prerequisites

contributing_to_docs/term_glossary.adoc

Lines changed: 12 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -286,7 +286,7 @@ Usage: Ignition config file or Ignition config files
286286

287287
The file that Ignition uses to configure Red Hat Enterprise Linux CoreOS (RHCOS) during
288288
operating system initialization. The installation program generates different
289-
Ignition config files to initialize bootstrap, master, and worker nodes.
289+
Ignition config files to initialize bootstrap, control plane, and worker nodes.
290290

291291
''''
292292

@@ -332,17 +332,16 @@ Usage: kubelet(s)
332332

333333
The agent that controls a Kubernetes node. Each node runs a kubelet, which
334334
handles starting and stopping containers on a node, based on the desired state
335-
defined by the master.
335+
defined by the control plane (also known as master).
336336

337337
''''
338-
=== Kubernetes master
338+
=== Kubernetes control plane
339339

340-
Usage: Kubernetes master(s)
340+
Usage: Kubernetes control plane
341341

342-
The Kubernetes-native equivalent to the link:#project[OpenShift master].
343-
An OpenShift system runs OpenShift masters, not Kubernetes masters, and
344-
an OpenShift master provides a superset of the functionality of a Kubernetes
345-
master, so it is generally preferred to use the term OpenShift master.
342+
The Kubernetes-native equivalent to the link:#project[OpenShift control plane].
343+
An OpenShift system runs OpenShift control planes (also known as masters), not Kubernetes control planes, and
344+
an OpenShift control plane provides a superset of the functionality of a Kubernetes control plane, so it is generally preferred to use the term OpenShift control plane.
346345

347346
''''
348347
=== Kubernetes API server
@@ -415,16 +414,16 @@ When referencing as a prerequisite for a procedure module, use the following
415414
construction: Install the OpenShift CLI (`oc`).
416415

417416
''''
418-
=== OpenShift master
417+
=== OpenShift control plane (also known as master)
419418

420-
Usage: OpenShift master(s)
419+
Usage: OpenShift control plane
421420

422421
Provides a REST endpoint for interacting with the system and manages the state
423422
of the system, ensuring that all containers expected to be running are actually
424423
running and that other requests such as builds and deployments are serviced.
425424
New deployments and configurations are created with the REST API, and the state
426425
of the system can be interrogated through this endpoint as well. An OpenShift
427-
master comprises the API server, scheduler, and SkyDNS.
426+
control plane comprises the API server, scheduler, and SkyDNS.
428427

429428
''''
430429
=== Operator
@@ -561,7 +560,7 @@ caching, or traffic controls on the service content.
561560

562561
Usage: scheduler(s)
563562

564-
Component of the Kubernetes master or OpenShift master that manages the state of
563+
Component of the Kubernetes control plane or OpenShift control plane that manages the state of
565564
the system, places pods on nodes, and ensures that all containers that are
566565
expected to be running are actually running.
567566

@@ -620,7 +619,7 @@ A service account binds together:
620619

621620
Usage: SkyDNS
622621

623-
Component of the Kubernetes master or OpenShift master that provides
622+
Component of the Kubernetes control plane or OpenShift control plane that provides
624623
cluster-wide DNS resolution of internal host names for services and pods.
625624

626625
''''

machine_management/creating-infrastructure-machinesets.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ You can create a machine set to host only infrastructure components. You apply s
99

1010
[IMPORTANT]
1111
====
12-
Unlike earlier versions of {product-title}, you cannot move the infrastructure components to the master machines. To move the components, you must create a new machine set.
12+
Unlike earlier versions of {product-title}, you cannot move the infrastructure components to the control plane machines (also known as the master machines). To move the components, you must create a new machine set.
1313
====
1414

1515
include::modules/infrastructure-components.adoc[leveloffset=+1]

modules/accessing-hosts-on-aws.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ API is responsive, run privileged pods instead.
4141
master. The host name looks similar to `ip-10-0-1-163.ec2.internal`.
4242

4343
. From the bastion SSH host you manually deployed into Amazon EC2, SSH into that
44-
master host. Ensure that you use the same SSH key you specified during the
44+
control plane host (also known as the master host). Ensure that you use the same SSH key you specified during the
4545
installation:
4646
+
4747
[source,terminal]

modules/architecture-kubernetes-introduction.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ deployment, scaling, and management of containerized applications. The general
1515
concept of Kubernetes is fairly simple:
1616

1717
* Start with one or more worker nodes to run the container workloads.
18-
* Manage the deployment of those workloads from one or more master nodes.
18+
* Manage the deployment of those workloads from one or more control plane nodes (also known as the master nodes).
1919
* Wrap containers in a deployment unit called a pod. Using pods provides extra
2020
metadata with the container and offers the ability to group several containers
2121
in a single deployment entity.

0 commit comments

Comments
 (0)