Skip to content

Commit efd61ae

Browse files
committed
correct invalid urls
1 parent 674695c commit efd61ae

File tree

4 files changed

+8
-10
lines changed

4 files changed

+8
-10
lines changed

CHANGELOG-1.6.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -756,14 +756,14 @@ filename | sha256 hash
756756

757757
## Known Issues for v1.6.5
758758

759-
* If you use the [GLBC Ingress Controller](https://github.com/kubernetes/ingress/tree/master/controllers/gce),
759+
* If you use the [GLBC Ingress Controller](https://github.com/kubernetes/ingress-nginx/tree/0.9.0-beta.1/controllers/gce),
760760
upgrading an existing pre-v1.6.4 cluster to Kubernetes v1.6.5 will cause an unintentional
761761
[overwrite of manual edits to GCP Health Checks](https://github.com/kubernetes/ingress/issues/842)
762762
managed by the GLBC Ingress Controller. This can cause the health checks to start failing,
763763
requiring you to reapply the manual edits.
764764
* This issue does not affect clusters that were already running Kubernetes v1.6.4 or higher.
765765
* This issue does not affect Health Checks that were left in the configuration
766-
[originally set by the GLBC Ingress Controller](https://github.com/kubernetes/ingress/tree/master/controllers/gce#health-checks).
766+
[originally set by the GLBC Ingress Controller](https://github.com/kubernetes/ingress-nginx/tree/0.9.0-beta.1/controllers/gce#health-checks).
767767

768768
## Downloads for v1.6.5
769769

@@ -852,14 +852,14 @@ filename | sha256 hash
852852

853853
## Known Issues for v1.6.4
854854

855-
* If you use the [GLBC Ingress Controller](https://github.com/kubernetes/ingress/tree/master/controllers/gce),
855+
* If you use the [GLBC Ingress Controller](https://github.com/kubernetes/ingress-nginx/tree/0.9.0-beta.1/controllers/gce),
856856
upgrading an existing cluster to Kubernetes v1.6.4 will cause an unintentional
857857
[overwrite of manual edits to GCP Health Checks](https://github.com/kubernetes/ingress/issues/842)
858858
managed by the GLBC Ingress Controller. This can cause the health checks to start failing,
859859
requiring you to reapply the manual edits.
860860
* This issue does not affect clusters that start out with Kubernetes v1.6.4 or higher.
861861
* This issue does not affect Health Checks that were left in the configuration
862-
[originally set by the GLBC Ingress Controller](https://github.com/kubernetes/ingress/tree/master/controllers/gce#health-checks).
862+
[originally set by the GLBC Ingress Controller](https://github.com/kubernetes/ingress-nginx/tree/0.9.0-beta.1/controllers/gce#health-checks).
863863

864864
## Downloads for v1.6.4
865865

cluster/addons/fluentd-elasticsearch/README.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,7 @@ you need these features, please consider building the images from either the
2626
"basic" or "platinum" version. After enabling these features, follow [official
2727
documentation][setupCreds] to set up credentials in Elasticsearch and Kibana.
2828
Don't forget to propagate those credentials also to Fluentd in its
29-
[configuration][fluentdCreds], using for example [environment
30-
variables][fluentdEnvVar]. You can utilize [ConfigMaps][configMap] and
29+
[configuration][fluentdCreds]. You can utilize [ConfigMaps][configMap] and
3130
[Secrets][secret] to store credentials in the Kubernetes apiserver.
3231

3332
### Initialization
@@ -72,7 +71,6 @@ avoid Fluentd pods scheduling there.
7271
[xPack]: https://www.elastic.co/products/x-pack
7372
[setupCreds]: https://www.elastic.co/guide/en/x-pack/current/setting-up-authentication.html#reset-built-in-user-passwords
7473
[fluentdCreds]: https://github.com/uken/fluent-plugin-elasticsearch#user-password-path-scheme-ssl_verify
75-
[fluentdEnvVar]: https://docs.fluentd.org/v0.12/articles/faq#how-can-i-use-environment-variables-to-configure-parameters-dynamically
7674
[configMap]: https://kubernetes.io/docs/tasks/configure-pod-container/configure-pod-configmap/
7775
[secret]: https://kubernetes.io/docs/concepts/configuration/secret/
7876
[statefulSet]: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset

staging/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ for an example.
8888

8989
2. Setup branch protection and enable access to the `stage-bots` team
9090
by adding the repo in
91-
[`prow/config.yaml`](https://github.com/kubernetes/test-infra/blob/master/prow/config.yaml).
91+
[`prow/config.yaml`](https://github.com/kubernetes/test-infra/blob/master/config/prow/config.yaml).
9292
See [#kubernetes/test-infra#9292](https://github.com/kubernetes/test-infra/pull/9292)
9393
for an example.
9494

staging/src/k8s.io/kubectl/docs/book/pages/examples/kustomize.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ values that should be copied from this file or that are recommended.
1717
In practice, fields with no value should simply be omitted from kustomization.yaml
1818
to reduce the content visible in configuration reviews.
1919

20-
Example copied from the [kustomize repo](https://github.com/kubernetes-sigs/kustomize/blob/master/docs/kustomization.yaml)
20+
Example copied from the [kustomize repo](https://github.com/kubernetes-sigs/kustomize/tree/master/examples)
2121

2222
{% sample lang="yaml" %}
2323
```yaml
@@ -270,7 +270,7 @@ vars:
270270
# specified by kustomize's configuration data.
271271
#
272272
# The default config data for vars is at
273-
# https://github.com/kubernetes-sigs/kustomize/blob/master/pkg/transformers/config/defaultconfig/varreference.go
273+
# https://github.com/kubernetes-sigs/kustomize/blob/v3.3.1/pkg/transformers/config/defaultconfig/varreference.go
274274
# Long story short, the default targets are all
275275
# container command args and env value fields.
276276
#

0 commit comments

Comments
 (0)