Skip to content

Commit 4679ccc

Browse files
authored
Merge branch 'master' into drop-breaking-raw-block
2 parents 3f309ec + 78eafc7 commit 4679ccc

File tree

185 files changed

+52166
-116301
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

185 files changed

+52166
-116301
lines changed

.gitignore

+3
Original file line numberDiff line numberDiff line change
@@ -29,3 +29,6 @@ nohup.out
2929

3030
# Hugo output
3131
public/
32+
33+
# User-specific editorconfig files
34+
.editorconfig

.travis.yml

+6-6
Original file line numberDiff line numberDiff line change
@@ -7,16 +7,16 @@ install:
77
- export PATH=$GOPATH/bin:$PATH
88
- mkdir -p $HOME/gopath/src/k8s.io
99
- mv $TRAVIS_BUILD_DIR $HOME/gopath/src/k8s.io/website && cd $HOME/gopath/src/k8s.io/website
10-
# Fetch dependencies for us to run the tests in test/examples_test.go
11-
- go get -t -v k8s.io/website/test
10+
1211
# Make sure we are testing against the correct branch
12+
- pushd $GOPATH/src/k8s.io && git clone https://github.com/kubernetes/kubernetes && popd
1313
- pushd $GOPATH/src/k8s.io/kubernetes && git checkout release-1.11 && popd
14-
15-
# Simplified deduplication of dependencies.
1614
- cp -L -R $GOPATH/src/k8s.io/kubernetes/vendor/ $GOPATH/src/
1715
- rm -r $GOPATH/src/k8s.io/kubernetes/vendor/
1816

17+
# Fetch additional dependencies to run the tests in examples/examples_test.go
18+
- go get -t -v k8s.io/website/content/en/examples
19+
1920
script:
20-
# TODO(bep)
21-
- go test -v k8s.io/website/test #fixed by https://github.com/kubernetes/website/pull/8388
21+
- go test -v k8s.io/website/content/en/examples
2222
#- ./verify-docs-format.sh

OWNERS

+9-6
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,22 @@
11
# Reviewers can /lgtm /approve but not sufficient for auto-merge without an
22
# approver
33
reviewers:
4-
- zhangxiaoyu-zidif
5-
- xiangpengzhao
4+
- Rajakavitha1
65
- stewart-yu
7-
- Rajakavitha1
6+
- xiangpengzhao
7+
- zhangxiaoyu-zidif
8+
89
# Approvers have all the ability of reviewers but their /approve makes
910
# auto-merge happen if a /lgtm exists, or vice versa, or they can do both
1011
# No need for approvers to also be listed as reviewers
1112
approvers:
12-
- heckj
1313
- bradamant3
1414
- bradtopol
15-
- steveperry-53
16-
- zacharysarah
1715
- chenopis
16+
- kbarnard10
1817
- mistyhacks
18+
- ryanmcginnis
19+
- steveperry-53
1920
- tengqm
21+
- zacharysarah
22+
- zparnold

OWNERS_ALIASES

+27-4
Original file line numberDiff line numberDiff line change
@@ -61,11 +61,25 @@ aliases:
6161
- smarterclayton
6262
- soltysh
6363
- sttts
64-
sig-cluster-lifecycle: #GH: sig-cluster-lifecycle-pr-reviews
64+
sig-cluster-lifecycle-kubeadm-approvers: # Approving changes to kubeadm documentation
6565
- timothysc
66+
- lukemarsden
6667
- luxas
6768
- roberthbailey
68-
- fabriziopandini
69+
- fabriziopandini
70+
sig-cluster-lifecycle-kubeadm-reviewers: # Reviewing kubeadm documentation
71+
- timothysc
72+
- lukemarsden
73+
- luxas
74+
- roberthbailey
75+
- fabriziopandini
76+
- kad
77+
- xiangpengzhao
78+
- stealthybox
79+
- liztio
80+
- chuckha
81+
- detiber
82+
- dixudx
6983
sig-cluster-ops:
7084
- zehicle
7185
- jdumars
@@ -83,10 +97,19 @@ aliases:
8397
- spxtr
8498
sig-docs: #Team: documentation; GH: sig-docs-pr-reviews
8599
- bradamant3
100+
- bradtopol
101+
- chenopis
102+
- kbarnard10
103+
- mistyhacks
104+
- rajakavitha1
105+
- ryanmcginnis
86106
- steveperry-53
107+
- stewart-yu
108+
- tengqm
109+
- xiangpengzhao
87110
- zacharysarah
88-
- bradtopol
89-
- heckj
111+
- zhangxiaoyu-zidif
112+
- zparnold
90113
sig-federation: #Team: Federation; e.g. Federated Clusters
91114
- csbell
92115
sig-gcp: #Google Cloud Platform; GH: sig-gcp-pr-reviews

README.md

+8-7
Original file line numberDiff line numberDiff line change
@@ -21,10 +21,10 @@ For more information about contributing to the Kubernetes documentation, see:
2121
If you'd like, you can build the Kubernetes docs using Docker. To get started, build the image locally:
2222

2323
```bash
24-
$ make docker-image
24+
make docker-image
2525

2626
# The underlying command:
27-
$ docker build . \
27+
docker build . \
2828
--tag kubernetes-hugo \
2929
--build-arg HUGO_VERSION=0.40.3
3030
```
@@ -33,21 +33,22 @@ You can create an image for a different version of Hugo by changing the value of
3333
Once the `kubernetes-hugo` image has been built locally, you can build the site:
3434

3535
```bash
36-
$ make docker-serve
36+
make stage
3737

3838
# The underlying command:
39-
$ docker run \
39+
docker run \
4040
--rm \
4141
--interactive \
4242
--tty \
4343
--volume $(PWD):/src \
44-
kubernetes-hugo:latest \
45-
hugo
44+
-p 1313:1313 \
45+
kubernetes-hugo \
46+
hugo server --watch --bind 0.0.0.0
4647
```
4748

4849
As when building without using a Docker container, the results of the build will be published to the `public` directory (the default output directory for [Hugo](https://gohugo.io), the static site generator used to build this site).
4950

5051
## Thank you!
5152

5253
Kubernetes thrives on community participation, and we really appreciate your
53-
contributions to our site and our documentation!
54+
contributions to our site and our documentation!

config.toml

+1-1
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ enableRobotsTXT = true
77

88
disableKinds = ["taxonomy", "taxonomyTerm"]
99

10-
ignoreFiles = [ "^OWNERS$", "README.md", "^node_modules$" ]
10+
ignoreFiles = [ "^OWNERS$", "README.md", "^node_modules$", "content/en/docs/doc-contributor-tools" ]
1111

1212
contentDir = "content/en"
1313

content/.gitkeep

Whitespace-only changes.

content/en/_index.html

+5-4
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,7 @@ <h2>The Challenges of Migrating 150+ Microservices to Kubernetes</h2>
4747
<button id="desktopShowVideoButton" onclick="kub.showVideo()">Watch Video</button>
4848
<br>
4949
<br>
50+
<br>
5051
<a href="https://www.lfasiallc.com/events/kubecon-cloudnativecon-china-2018/" button id= "desktopKCButton">Attend KubeCon in Shanghai on Nov. 14-15, 2018</a>
5152
<br>
5253
<br>
@@ -120,14 +121,14 @@ <h4><a href="/docs/concepts/workloads/controllers/jobs-run-to-completion/">Batch
120121
<main>
121122
<h3>Case Studies</h3>
122123
<div id="caseStudiesWrapper">
123-
<div>
124-
<p>Driving Banking Innovation with Cloud Native</p>
125-
<a href="/case-studies/ing">Read more</a>
126-
</div>
127124
<div>
128125
<p>Supporting Fast Decisioning Applications with Kubernetes</p>
129126
<a href="/case-studies/capital-one">Read more</a>
130127
</div>
128+
<div>
129+
<p>Driving Banking Innovation with Cloud Native</p>
130+
<a href="/case-studies/ing">Read more</a>
131+
</div>
131132
<div>
132133
<p>Cloud Native at Northwestern Mutual</p>
133134
<a href="/case-studies/northwestern-mutual/">Read more</a>

content/en/blog/_posts/2015-11-00-Creating-A-Raspberry-Pi-Cluster-Running-Kubernetes-The-Shopping-List-Part-1.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ At Devoxx Belgium and Devoxx Morocco, Ray Tsang and I showed a Raspberry Pi clus
88

99
### Wait! Why the heck build a Raspberry Pi cluster running Kubernetes?&nbsp;
1010

11-
We had two big reasons to build the Pi cluster at Quintor. First of all we wanted to experiment with container technology at scale on real hardware. You can try out container technology using virtual machines, but Kubernetes runs great on on bare metal too. To explore what that’d be like, we built a Raspberry Pi cluster just like we would build a cluster of machines in a production datacenter. This allowed us to understand and simulate how Kubernetes would work when we move it to our data centers.
11+
We had two big reasons to build the Pi cluster at Quintor. First of all we wanted to experiment with container technology at scale on real hardware. You can try out container technology using virtual machines, but Kubernetes runs great on bare metal too. To explore what that’d be like, we built a Raspberry Pi cluster just like we would build a cluster of machines in a production datacenter. This allowed us to understand and simulate how Kubernetes would work when we move it to our data centers.
1212

1313
Secondly, we did not want to blow the budget to do this exploration. And what is cheaper than a Raspberry Pi! If you want to build a cluster comprising many nodes, each node should have a good cost to performance ratio. Our Pi cluster has 20 CPU cores, which is more than many servers, yet cost us less than $400. Additionally, the total power consumption is low and the form factor is small, which is great for these kind of demo systems.
1414

content/en/blog/_posts/2016-03-00-1000-Nodes-And-Beyond-Updates-To-Kubernetes-Performance-And-Scalability-In-12.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ While we could have decreased the “pod startup time” substantially by exclud
5757

5858
### Metrics from Kubernetes 1.2&nbsp;
5959

60-
So what was the result?We run our tests on Google Compute Engine, setting the size of the master VM based on on the size of the Kubernetes cluster. In particular for 1000-node clusters we use a n1-standard-32 VM for the master (32 cores, 120GB RAM).
60+
So what was the result?We run our tests on Google Compute Engine, setting the size of the master VM based on the size of the Kubernetes cluster. In particular for 1000-node clusters we use a n1-standard-32 VM for the master (32 cores, 120GB RAM).
6161

6262

6363
#### API responsiveness&nbsp;

content/en/blog/_posts/2016-08-00-Security-Best-Practices-Kubernetes-Deployment.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ There is work in progress being done in Kubernetes for image authorization plugi
3030
**Limit Direct Access to Kubernetes Nodes**
3131
You should limit SSH access to Kubernetes nodes, reducing the risk for unauthorized access to host resource. Instead you should ask users to use "kubectl exec", which will provide direct access to the container environment without the ability to access the host.
3232

33-
You can use Kubernetes [Authorization Plugins](http://kubernetes.io/docs/admin/authorization/) to further control user access to resources. This allows defining fine-grained-access control rules for specific namespace, containers and operations.
33+
You can use Kubernetes [Authorization Plugins](http://kubernetes.io/docs/reference/access-authn-authz/authorization/) to further control user access to resources. This allows defining fine-grained-access control rules for specific namespace, containers and operations.
3434

3535
**Create Administrative Boundaries between Resources**
3636
Limiting the scope of user permissions can reduce the impact of mistakes or malicious activities. A Kubernetes namespace allows you to partition created resources into logically named groups. Resources created in one namespace can be hidden from other namespaces. By default, each resource created by a user in Kubernetes cluster runs in a default namespace, called default. You can create additional namespaces and attach resources and users to them. You can use Kubernetes Authorization plugins to create policies that segregate access to namespace resources between different users.

content/en/blog/_posts/2017-03-00-Kubernetes-1.6-Multi-User-Multi-Workloads-At-Scale.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ For users who want to scale beyond 5,000 nodes or spread across multiple regions
1616

1717
**Security and Setup** : Users concerned with security will find that [RBAC](https://kubernetes.io//docs/admin/authorization/rbac), now _beta_ adds a significant security benefit through more tightly scoped default roles for system components. The default RBAC policies in 1.6 grant scoped permissions to control-plane components, nodes, and controllers. RBAC allows cluster administrators to selectively grant particular users or service accounts fine-grained access to specific resources on a per-namespace basis. RBAC users upgrading from 1.5 to 1.6 should view the guidance [here](https://kubernetes.io//docs/admin/authorization/rbac.md#upgrading-from-15).&nbsp;
1818

19-
Users looking for an easy way to provision a secure cluster on physical or cloud servers can use [kubeadm](https://kubernetes.io/docs/getting-started-guides/kubeadm/), which is now _beta_. kubeadm has been enhanced with a set of command line flags and a base feature set that includes RBAC setup, use of the [Bootstrap Token system](http://kubernetes.io/docs/admin/bootstrap-tokens/) and an enhanced [Certificates API](https://kubernetes.io/docs/tasks/tls/managing-tls-in-a-cluster/).
19+
Users looking for an easy way to provision a secure cluster on physical or cloud servers can use [kubeadm](https://kubernetes.io/docs/getting-started-guides/kubeadm/), which is now _beta_. kubeadm has been enhanced with a set of command line flags and a base feature set that includes RBAC setup, use of the [Bootstrap Token system](http://kubernetes.io/docs/reference/access-authn-authz/bootstrap-tokens/) and an enhanced [Certificates API](https://kubernetes.io/docs/tasks/tls/managing-tls-in-a-cluster/).
2020

2121
**Advanced Scheduling** : This release adds a set of [powerful and versatile scheduling constructs](https://kubernetes.io/docs/user-guide/node-selection/) to give you greater control over how pods are scheduled, including rules to restrict pods to particular nodes in heterogeneous clusters, and rules to spread or pack pods across failure domains such as nodes, racks, and zones.
2222

content/en/blog/_posts/2017-04-00-Rbac-Support-In-Kubernetes.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ The focus of this post is to highlight some of the interesting new capabilities
1313

1414
**RBAC vs ABAC**
1515

16-
Currently there are several [authorization mechanisms](https://kubernetes.io/docs/admin/authorization/) available for use with Kubernetes. Authorizers are the mechanisms that decide who is permitted to make what changes to the cluster using the Kubernetes API. This affects things like kubectl, system components, and also certain applications that run in the cluster and manipulate the state of the cluster, like Jenkins with the Kubernetes plugin, or [Helm](https://github.com/kubernetes/helm) that runs in the cluster and uses the Kubernetes API to install applications in the cluster. Out of the available authorization mechanisms, ABAC and RBAC are the mechanisms local to a Kubernetes cluster that allow configurable permissions policies.
16+
Currently there are several [authorization mechanisms](https://kubernetes.io/docs/reference/access-authn-authz/authorization/) available for use with Kubernetes. Authorizers are the mechanisms that decide who is permitted to make what changes to the cluster using the Kubernetes API. This affects things like kubectl, system components, and also certain applications that run in the cluster and manipulate the state of the cluster, like Jenkins with the Kubernetes plugin, or [Helm](https://github.com/kubernetes/helm) that runs in the cluster and uses the Kubernetes API to install applications in the cluster. Out of the available authorization mechanisms, ABAC and RBAC are the mechanisms local to a Kubernetes cluster that allow configurable permissions policies.
1717

1818
ABAC, Attribute Based Access Control, is a powerful concept. However, as implemented in Kubernetes, ABAC is difficult to manage and understand. It requires ssh and root filesystem access on the master VM of the cluster to make authorization policy changes. For permission changes to take effect the cluster API server must be restarted.
1919

content/en/blog/_posts/2017-06-00-Kubernetes-1.7-Security-Hardening-Stateful-Application-Extensibility-Updates.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ Also, for power users, API aggregation in this release allows user-provided apis
1616
Security:
1717

1818
- [The Network Policy API](https://kubernetes.io/docs/concepts/services-networking/network-policies/) is promoted to stable. Network policy, implemented through a network plug-in, allows users to set and enforce rules governing which pods can communicate with each other.&nbsp;
19-
- [Node authorizer](https://kubernetes.io/docs/admin/authorization/node/) and admission control plugin are new additions that restrict kubelet’s access to secrets, pods and other objects based on its node.
19+
- [Node authorizer](https://kubernetes.io/docs/reference/access-authn-authz/node/) and admission control plugin are new additions that restrict kubelet’s access to secrets, pods and other objects based on its node.
2020
- [Encryption for Secrets](https://kubernetes.io/docs/tasks/administer-cluster/encrypt-data/), and other resources in etcd, is now available as alpha.&nbsp;
2121
- [Kubelet TLS bootstrapping](https://kubernetes.io/docs/admin/kubelet-tls-bootstrapping/) now supports client and server certificate rotation.
2222
- [Audit logs](https://kubernetes.io/docs/tasks/debug-application-cluster/audit/) stored by the API server are now more customizable and extensible with support for event filtering and webhooks. They also provide richer data for system audit.
@@ -36,7 +36,7 @@ Extensibility:
3636

3737
Additional Features:
3838

39-
- Alpha support for [external admission controllers](https://kubernetes.io/docs/admin/extensible-admission-controllers/) is introduced, providing two options for adding custom business logic to the API server for modifying objects as they are created and validating policy.&nbsp;
39+
- Alpha support for [external admission controllers](https://kubernetes.io/docs/reference/access-authn-authz/extensible-admission-controllers/) is introduced, providing two options for adding custom business logic to the API server for modifying objects as they are created and validating policy.&nbsp;
4040
- [Policy-based Federated Resource Placement](https://kubernetes.io/docs/tasks/federation/set-up-placement-policies-federation/) is introduced as Alpha providing placement policies for the federated clusters, based on custom requirements such as regulation, pricing or performance.
4141

4242
Deprecation:&nbsp;

content/en/blog/_posts/2017-11-00-Kubernetes-Easy-Way.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ Once you log in, all of your clusters are available within Codefresh.
7171

7272

7373
### Add Cluster
74-
To add your cluster, click the down arrow, and then click **add cluste** r, select the project and cluster name. You can now deploy images!
74+
To add your cluster, click the down arrow, and then click **add cluster**, select the project and cluster name. You can now deploy images!
7575

7676

7777

0 commit comments

Comments
 (0)