Skip to content

Commit 8210f9e

Browse files
author
JENNIFER RONDEAU
committed
Merge branch 'release-1.10' of github.com:kubernetes/website into pvcprotection-toc
2 parents 8076a53 + acdcf70 commit 8210f9e

File tree

66 files changed

+1939
-360
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

66 files changed

+1939
-360
lines changed

OWNERS

+1
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@ reviewers:
22
- tengqm
33
- zhangxiaoyu-zidif
44
- xiangpengzhao
5+
- bradtopol
56
approvers:
67
- heckj
78
- a-mccarthy

_data/tasks.yml

+3
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,7 @@ toc:
3232
- docs/tasks/configure-pod-container/configure-pod-initialization.md
3333
- docs/tasks/configure-pod-container/attach-handler-lifecycle-event.md
3434
- docs/tasks/configure-pod-container/configure-pod-configmap.md
35+
- docs/tasks/configure-pod-container/share-process-namespace.md
3536
- docs/tools/kompose/user-guide.md
3637

3738
- title: Inject Data Into Applications
@@ -162,6 +163,7 @@ toc:
162163
- docs/tasks/administer-cluster/reserve-compute-resources.md
163164
- docs/tasks/administer-cluster/guaranteed-scheduling-critical-addon-pods.md
164165
- docs/tasks/administer-cluster/declare-network-policy.md
166+
- docs/tasks/administer-cluster/kms-provider.md
165167
- title: Install Network Policy Provider
166168
section:
167169
- docs/tasks/administer-cluster/calico-network-policy.md
@@ -183,6 +185,7 @@ toc:
183185
- docs/tasks/administer-cluster/dns-custom-nameservers.md
184186
- docs/tasks/administer-cluster/dns-debugging-resolution.md
185187
- docs/tasks/administer-cluster/pvc-protection.md
188+
- docs/tasks/administer-cluster/storage-object-in-use-protection.md
186189

187190
- title: Federation - Run an App on Multiple Clusters
188191
landing_page: /docs/tasks/federation/set-up-cluster-federation-kubefed/

case-studies/index.html

+6
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,12 @@ <h5>A collection of users running Kubernetes in production.</h5>
3838
<!--<p class="attrib">— Simon Lallemand, Infrastructure Engineer at BlaBlaCar</p>-->
3939
<a href="/case-studies/blablacar/">Read about BlaBlaCar</a>
4040
</div>
41+
<div class="case-study">
42+
<img src="/images/case_studies/peardeck.png" alt="peardeck">
43+
<p class="quote">"In terms of the cloud, Kubernetes and Prometheus have so much to offer."</p>
44+
<!--<p class="attrib">— Riley Eynon-Lynch, CEO of Pear Deck</p>-->
45+
<a href="/case-studies/peardeck/">Read about Pear Deck</a>
46+
</div>
4147
</div>
4248
</div>
4349
</main>

cn/docs/admin/kubelet-authentication-authorization.md

+2-6
Original file line numberDiff line numberDiff line change
@@ -33,11 +33,9 @@ To enable X509 client certificate authentication to the kubelet's HTTPS endpoint
3333
To enable API bearer tokens (including service account tokens) to be used to authenticate to the kubelet's HTTPS endpoint:
3434

3535
* ensure the `authentication.k8s.io/v1beta1` API group is enabled in the API server
36-
* start the kubelet with the `--authentication-token-webhook`, `--kubeconfig`, and `--require-kubeconfig` flags
36+
* start the kubelet with the `--authentication-token-webhook` and the `--kubeconfig` flags
3737
* the kubelet calls the `TokenReview` API on the configured API server to determine user information from bearer tokens
3838

39-
**Note:** The flag `--require-kubeconfig` is deprecated as of Kubernetes 1.8, this will be removed in a future version. You no longer need to use `--require-kubeconfig` in Kubernetes 1.8.
40-
4139
## Kubelet authorization
4240

4341
Any request that is successfully authenticated (including an anonymous request) is then authorized. The default authorization mode is `AlwaysAllow`, which allows all requests.
@@ -51,11 +49,9 @@ There are many possible reasons to subdivide access to the kubelet API:
5149
To subdivide access to the kubelet API, delegate authorization to the API server:
5250

5351
* ensure the `authorization.k8s.io/v1beta1` API group is enabled in the API server
54-
* start the kubelet with the `--authorization-mode=Webhook`, `--kubeconfig`, and `--require-kubeconfig` flags
52+
* start the kubelet with the `--authorization-mode=Webhook` and the `--kubeconfig` flags
5553
* the kubelet calls the `SubjectAccessReview` API on the configured API server to determine whether each request is authorized
5654

57-
**Note:** The flag `--require-kubeconfig` is deprecated as of Kubernetes 1.8, this will be removed in a future version. You no longer need to use `--require-kubeconfig` in Kubernetes 1.8.
58-
5955
The kubelet authorizes API requests using the same [request attributes](/docs/admin/authorization/#request-attributes) approach as the apiserver.
6056

6157
The verb is determined from the incoming request's HTTP verb:

cn/docs/admin/kubelet-tls-bootstrapping.md

-1
Original file line numberDiff line numberDiff line change
@@ -190,7 +190,6 @@ When starting the kubelet, if the file specified by `--kubeconfig` does not exis
190190
**Note:** The following flags are required to enable this bootstrapping when starting the kubelet:
191191

192192
```
193-
--require-kubeconfig
194193
--bootstrap-kubeconfig="/path/to/bootstrap/kubeconfig"
195194
```
196195

cn/docs/tasks/administer-cluster/kubelet-config-file.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ title: 通过配置文件设置 Kubelet 参数
4545
## 启动通过配置文件配置的 Kubelet 进程
4646

4747

48-
启动 Kubelet,需要打开 `KubeletConfigFile` 特性开关(feature gate)并将其 `--init-config-dir` 标志设置为包含 `kubelet` 文件的文件夹路径。Kubelet 将从 `kubelet` 文件中读取由 `KubeletConfiguration` 定义的参数,而不是从参数相关的命令行标志中读取。
48+
启动 Kubelet 需要将其 `--init-config-dir` 标志设置为包含 `kubelet` 文件的文件夹路径。Kubelet 将从 `kubelet` 文件中读取由 `KubeletConfiguration` 定义的参数,而不是从参数相关的命令行标志中读取。
4949

5050
{% endcapture %}
5151

cn/docs/user-guide/kubectl-overview.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ Operation | Syntax | Description
9393
`configmaps` |`cm`
9494
`controllerrevisions` |
9595
`cronjobs` |
96-
`customresourcedefinition` |`crd`
96+
`customresourcedefinition` |`crd`, `crds`
9797
`daemonsets` |`ds`
9898
`deployments` |`deploy`
9999
`endpoints` |`ep`

docs/admin/admission-controllers.md

+44-32
Original file line numberDiff line numberDiff line change
@@ -31,8 +31,7 @@ controllers may modify the objects they admit; validating controllers may not.
3131
The admission control process proceeds in two phases. In the first phase,
3232
mutating admission controllers are run. In the second phase, validating
3333
admission controllers are run. Note again that some of the controllers are
34-
both. In both phases, the controllers are run in the order specified by the
35-
`--admission-control` flag of `kube-apiserver`.
34+
both.
3635

3736
If any of the controllers in either phase reject the request, the entire
3837
request is rejected immediately and an error is returned to the end-user.
@@ -54,13 +53,12 @@ support all the features you expect.
5453

5554
## How do I turn on an admission controller?
5655

57-
The Kubernetes API server supports a flag, `admission-control` that takes a comma-delimited,
58-
ordered list of admission control choices to invoke prior to modifying objects in the cluster.
59-
For example, the following command line turns on the `NamespaceLifecycle` and the `LimitRanger`
60-
admission controller:
56+
The Kubernetes API server flag `enable-admission-plugins` takes a comma-delimited list of admission control plugins to invoke prior to modifying objects in the cluster.
57+
For example, the following command line enables the `NamespaceLifecycle` and the `LimitRanger`
58+
admission control plugins:
6159

6260
```shell
63-
kube-apiserver --admission-control=NamespaceLifecyle,LimitRanger ...
61+
kube-apiserver --enable-admission-plugins=NamespaceLifecyle,LimitRanger ...
6462
```
6563

6664
**Note**: Depending on the way your Kubernetes cluster is deployed and how the
@@ -70,11 +68,19 @@ deployed as a systemd service, you may modify the manifest file for the API
7068
server if Kubernetes is deployed in a self-hosted way.
7169
{: .note}
7270

71+
## How do I turn off an admission controller?
72+
73+
The Kubernetes API server flag `disable-admission-plugins` takes a comma-delimited list of admission control plugins to be disabled, even if they are in the list of plugins enabled by default.
74+
75+
```shell
76+
kube-apiserver --disable-admission-plugins=PodNodeSelector,AlwaysDeny ...
77+
```
78+
7379
## What does each admission controller do?
7480

75-
### AlwaysAdmit
81+
### AlwaysAdmit (DEPRECATED)
7682

77-
Use this admission controller by itself to pass-through all requests.
83+
Use this admission controller by itself to pass-through all requests. AlwaysAdmit is DEPRECATED as no real meaning.
7884

7985
### AlwaysPullImages
8086

@@ -86,9 +92,9 @@ scheduled onto the right node), without any authorization check against the imag
8692
is enabled, images are always pulled prior to starting containers, which means valid credentials are
8793
required.
8894

89-
### AlwaysDeny
95+
### AlwaysDeny (DEPRECATED)
9096

91-
Rejects all requests. Used for testing.
97+
Rejects all requests. AlwaysDeny is DEPRECATED as no real meaning.
9298

9399
### DefaultStorageClass
94100

@@ -134,7 +140,7 @@ enabling this admission controller.
134140

135141
### EventRateLimit (alpha)
136142

137-
This admission controller is introduced in v1.9 to mitigate the problem where the API server gets flooded by
143+
This admission controller mitigates the problem where the API server gets flooded by
138144
event requests. The cluster admin can specify event rate limits by:
139145

140146
* Ensuring that `eventratelimit.admission.k8s.io/v1alpha1=true` is included in the
@@ -180,19 +186,15 @@ for more details.
180186
181187
### ExtendedResourceToleration
182188
183-
This plug-in is introduced in v1.9 to facilitate creation of dedicated nodes with extended resources.
189+
This plug-in facilitates creation of dedicated nodes with extended resources.
184190
If operators want to create dedicated nodes with extended resources (like GPUs, FPGAs etc.), they are expected to
185191
taint the node with the extended resource name as the key. This admission controller, if enabled, automatically
186192
adds tolerations for such taints to pods requesting extended resources, so users don't have to manually
187193
add these tolerations.
188194
189195
### ImagePolicyWebhook
190196
191-
The ImagePolicyWebhook admission controller allows a backend webhook to make admission decisions. You enable this admission controller by setting the admission-control option as follows:
192-
193-
```shell
194-
--admission-control=ImagePolicyWebhook
195-
```
197+
The ImagePolicyWebhook admission controller allows a backend webhook to make admission decisions.
196198
197199
#### Configuration File Format
198200
@@ -314,7 +316,6 @@ In any case, the annotations are provided by the user and are not validated by K
314316

315317
### Initializers (alpha)
316318

317-
This admission controller is introduced in v1.7.
318319
The admission controller determines the initializers of a resource based on the existing
319320
`InitializerConfiguration`s. It sets the pending initializers by modifying the
320321
metadata of the resource to be created.
@@ -331,7 +332,7 @@ The annotations added contain the information on what compute resources were aut
331332

332333
See the [InitialResources proposal](https://git.k8s.io/community/contributors/design-proposals/autoscaling/initial-resources.md) for more details.
333334

334-
### LimitPodHardAntiAffinity
335+
### LimitPodHardAntiAffinityTopology
335336

336337
This admission controller denies any pod that defines `AntiAffinity` topology key other than
337338
`kubernetes.io/hostname` in `requiredDuringSchedulingRequiredDuringExecution`.
@@ -414,27 +415,23 @@ This admission controller also protects the access to `metadata.ownerReferences[
414415
of an object, so that only users with "update" permission to the `finalizers`
415416
subresource of the referenced *owner* can change it.
416417

417-
### Persistent Volume Claim Protection (alpha)
418-
{% assign for_k8s_version="v1.9" %}{% include feature-state-alpha.md %}
419-
The `PVCProtection` plugin adds the `kubernetes.io/pvc-protection` finalizer to newly created Persistent Volume Claims (PVCs). In case a user deletes a PVC the PVC is not removed until the finalizer is removed from the PVC by PVC Protection Controller. Refer to the [PVC Protection](/docs/concepts/storage/persistent-volumes/#persistent-volume-claim-protection) for more detailed information.
420-
421-
### PersistentVolumeLabel
418+
### PersistentVolumeLabel (DEPRECATED)
422419

423420
This admission controller automatically attaches region or zone labels to PersistentVolumes
424421
as defined by the cloud provider (for example, GCE or AWS).
425422
It helps ensure the Pods and the PersistentVolumes mounted are in the same
426423
region and/or zone.
427424
If the admission controller doesn't support automatic labelling your PersistentVolumes, you
428425
may need to add the labels manually to prevent pods from mounting volumes from
429-
a different zone.
426+
a different zone. PersistentVolumeLabel is DEPRECATED and labeling persistent volumes has been taken over by [cloud controller manager](/docs/tasks/administer-cluster/running-cloud-controller/).
430427

431428
### PodNodeSelector
432429

433430
This admission controller defaults and limits what node selectors may be used within a namespace by reading a namespace annotation and a global configuration.
434431

435432
#### Configuration File Format
436433

437-
PodNodeSelector uses a configuration file to set options for the behavior of the backend.
434+
`PodNodeSelector` uses a configuration file to set options for the behavior of the backend.
438435
Note that the configuration file format will move to a versioned file in a future release.
439436
This file may be json or yaml and has the following format:
440437

@@ -445,7 +442,7 @@ podNodeSelectorPluginConfig:
445442
namespace2: <node-selectors-labels>
446443
```
447444

448-
Reference the PodNodeSelector configuration file from the file provided to the API server's command line flag `--admission-control-config-file`:
445+
Reference the `PodNodeSelector` configuration file from the file provided to the API server's command line flag `--admission-control-config-file`:
449446

450447
```yaml
451448
kind: AdmissionConfiguration
@@ -457,7 +454,7 @@ plugins:
457454
```
458455

459456
#### Configuration Annotation Format
460-
PodNodeSelector uses the annotation key `scheduler.alpha.kubernetes.io/node-selector` to assign node selectors to namespaces.
457+
`PodNodeSelector` uses the annotation key `scheduler.kubernetes.io/node-selector` to assign node selectors to namespaces.
461458

462459
```yaml
463460
apiVersion: v1
@@ -468,6 +465,19 @@ metadata:
468465
name: namespace3
469466
```
470467

468+
#### Internal Behavior
469+
This admission controller has the following behavior:
470+
1. If the `Namespace` has an annotation with a key `scheduler.kubernetes.io/nodeSelector`, use its value as the
471+
node selector.
472+
1. If the namespace lacks such an annotation, use the `clusterDefaultNodeSelector` defined in the `PodNodeSelector`
473+
plugin configuration file as the node selector.
474+
1. Evaluate the pod's node selector against the namespace node selector for conflicts. Conflicts result in rejection.
475+
1. Evaluate the pod's node selector against the namespace-specific whitelist defined the plugin configuration file.
476+
Conflicts result in rejection.
477+
478+
**Note:** `PodTolerationRestriction` is more versatile and powerful than `PodNodeSelector` and can encompass the scenarios supported by `PodNodeSelector`.
479+
{: .note}
480+
471481
### PersistentVolumeClaimResize
472482

473483
This admission controller implements additional validations for checking incoming `PersistentVolumeClaim` resize requests.
@@ -545,8 +555,6 @@ objects in your Kubernetes deployment, you MUST use this admission controller to
545555

546556
See the [resourceQuota design doc](https://git.k8s.io/community/contributors/design-proposals/resource-management/admission_control_resource_quota.md) and the [example of Resource Quota](/docs/concepts/policy/resource-quotas/) for more details.
547557

548-
It is strongly encouraged that this admission controller is configured last in the sequence of admission controllers. This is
549-
so that quota is not prematurely incremented only for the request to be rejected later in admission control.
550558

551559
### SecurityContextDeny
552560

@@ -557,6 +565,10 @@ This admission controller will deny any pod that attempts to set certain escalat
557565
This admission controller implements automation for [serviceAccounts](/docs/user-guide/service-accounts).
558566
We strongly recommend using this admission controller if you intend to make use of Kubernetes `ServiceAccount` objects.
559567

568+
### Storage Object in Use Protection (beta)
569+
{% assign for_k8s_version="v1.10" %}{% include feature-state-beta.md %}
570+
The `StorageObjectInUseProtection` plugin adds the `kubernetes.io/pvc-protection` or `kubernetes.io/pv-protection` finalizers to newly created Persistent Volume Claims (PVCs) or Persistent Volumes (PV). In case a user deletes a PVC or PV the PVC or PV is not removed until the finalizer is removed from the PVC or PV by PVC or PV Protection Controller. Refer to the [Storage Object in Use Protection](/docs/concepts/storage/persistent-volumes/#storage-object-in-use-protection) for more detailed information.
571+
560572
### ValidatingAdmissionWebhook (alpha in 1.8; beta in 1.9)
561573

562574
This admission controller calls any validating webhooks which match the request. Matching
@@ -577,7 +589,7 @@ versions >= 1.9).
577589
## Is there a recommended set of admission controllers to use?
578590

579591
Yes.
580-
For Kubernetes >= 1.9.0, we strongly recommend running the following set of admission controllers (order matters):
592+
For Kubernetes >= 1.9.0, we strongly recommend running the following set of admission controllers (order matters for 1.9 but not >1.10):
581593

582594
```shell
583595
--admission-control=NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota

0 commit comments

Comments
 (0)