You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: Makefile
+13-11Lines changed: 13 additions & 11 deletions
Original file line number
Diff line number
Diff line change
@@ -28,28 +28,30 @@ module-init:
28
28
29
29
all: build ## Build site with production settings and put deliverables in ./public
30
30
31
-
build: module-check ## Build site with production settings and put deliverables in ./public
32
-
hugo --minify
31
+
build: module-check ## Build site with non-production settings and put deliverables in ./public
32
+
hugo --minify --environment development
33
33
34
34
build-preview: module-check ## Build site with drafts and future posts enabled
35
-
hugo --buildDrafts --buildFuture
35
+
hugo --buildDrafts --buildFuture --environment preview
36
36
37
37
deploy-preview: ## Deploy preview site via netlify
38
-
hugo --enableGitInfo --buildFuture -b $(DEPLOY_PRIME_URL)
38
+
hugo --enableGitInfo --buildFuture --environment preview -b $(DEPLOY_PRIME_URL)
39
39
40
40
functions-build:
41
41
$(NETLIFY_FUNC) build functions-src
42
42
43
43
check-headers-file:
44
44
scripts/check-headers-file.sh
45
45
46
-
production-build: build check-headers-file ## Build the production site and ensure that noindex headers aren't added
46
+
production-build: module-check ## Build the production site and ensure that noindex headers aren't added
47
+
hugo --minify --environment production
48
+
HUGO_ENV=production $(MAKE) check-headers-file
47
49
48
-
non-production-build: ## Build the non-production site, which adds noindex headers to prevent indexing
49
-
hugo --enableGitInfo
50
+
non-production-build: module-check ## Build the non-production site, which adds noindex headers to prevent indexing
51
+
hugo --enableGitInfo --environment nonprod
50
52
51
53
serve: module-check ## Boot the development server.
52
-
hugo server --buildFuture
54
+
hugo server --buildFuture --environment development
53
55
54
56
docker-image:
55
57
@echo -e "$(CCRED)**** The use of docker-image is deprecated. Use container-image instead. ****$(CCEND)"
@@ -70,10 +72,10 @@ container-image: ## Build a container image for the preview of the website
70
72
--build-arg HUGO_VERSION=$(HUGO_VERSION)
71
73
72
74
container-build: module-check
73
-
$(CONTAINER_RUN) --read-only --mount type=tmpfs,destination=/tmp,tmpfs-mode=01777 $(CONTAINER_IMAGE) sh -c "npm ci && hugo --minify"
75
+
$(CONTAINER_RUN) --read-only --mount type=tmpfs,destination=/tmp,tmpfs-mode=01777 $(CONTAINER_IMAGE) sh -c "npm ci && hugo --minify --environment development"
74
76
75
77
container-serve: module-check ## Boot the development server using container. Run `make container-image` before this.
76
-
$(CONTAINER_RUN) --cap-drop=ALL --cap-add=AUDIT_WRITE --read-only --mount type=tmpfs,destination=/tmp,tmpfs-mode=01777 -p 1313:1313 $(CONTAINER_IMAGE) hugo server --buildFuture --bind 0.0.0.0 --destination /tmp/hugo --cleanDestinationDir
78
+
$(CONTAINER_RUN) --cap-drop=ALL --cap-add=AUDIT_WRITE --read-only --mount type=tmpfs,destination=/tmp,tmpfs-mode=01777 -p 1313:1313 $(CONTAINER_IMAGE) hugo server --buildFuture --environment development --bind 0.0.0.0 --destination /tmp/hugo --cleanDestinationDir
Copy file name to clipboardExpand all lines: content/en/docs/concepts/cluster-administration/networking.md
+10-5Lines changed: 10 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -67,7 +67,7 @@ Azure CNI is available natively in the [Azure Kubernetes Service (AKS)](https://
67
67
68
68
### Calico
69
69
70
-
[Calico](https://docs.projectcalico.org/) is an open source networking and network security solution for containers, virtual machines, and native host-based workloads. Calico supports multiple data planes including: a pure Linux eBPF dataplane, a standard Linux networking dataplane, and a Windows HNS dataplane. Calico provides a full networking stack but can also be used in conjunction with [cloud provider CNIs](https://docs.projectcalico.org/networking/determine-best-networking#calico-compatible-cni-plugins-and-cloud-provider-integrations) to provide network policy enforcement.
70
+
[Calico](https://projectcalico.docs.tigera.io/about/about-calico/) is an open source networking and network security solution for containers, virtual machines, and native host-based workloads. Calico supports multiple data planes including: a pure Linux eBPF dataplane, a standard Linux networking dataplane, and a Windows HNS dataplane. Calico provides a full networking stack but can also be used in conjunction with [cloud provider CNIs](https://projectcalico.docs.tigera.io/networking/determine-best-networking#calico-compatible-cni-plugins-and-cloud-provider-integrations) to provide network policy enforcement.
71
71
72
72
### Cilium
73
73
@@ -79,9 +79,9 @@ addressing, and it can be used in combination with other CNI plugins.
79
79
80
80
### CNI-Genie from Huawei
81
81
82
-
[CNI-Genie](https://github.com/Huawei-PaaS/CNI-Genie) is a CNI plugin that enables Kubernetes to [simultaneously have access to different implementations](https://github.com/Huawei-PaaS/CNI-Genie/blob/master/docs/multiple-cni-plugins/README.md#what-cni-genie-feature-1-multiple-cni-plugins-enables) of the [Kubernetes network model](/docs/concepts/cluster-administration/networking/#the-kubernetes-network-model) in runtime. This includes any implementation that runs as a [CNI plugin](https://github.com/containernetworking/cni#3rd-party-plugins), such as [Flannel](https://github.com/coreos/flannel#flannel), [Calico](https://docs.projectcalico.org/), [Weave-net](https://www.weave.works/products/weave-net/).
82
+
[CNI-Genie](https://github.com/cni-genie/CNI-Genie) is a CNI plugin that enables Kubernetes to [simultaneously have access to different implementations](https://github.com/cni-genie/CNI-Genie/blob/master/docs/multiple-cni-plugins/README.md#what-cni-genie-feature-1-multiple-cni-plugins-enables) of the [Kubernetes network model](/docs/concepts/cluster-administration/networking/#the-kubernetes-network-model) in runtime. This includes any implementation that runs as a [CNI plugin](https://github.com/containernetworking/cni#3rd-party-plugins), such as [Flannel](https://github.com/flannel-io/flannel#flannel), [Calico](https://projectcalico.docs.tigera.io/about/about-calico/), [Weave-net](https://www.weave.works/oss/net/).
83
83
84
-
CNI-Genie also supports [assigning multiple IP addresses to a pod](https://github.com/Huawei-PaaS/CNI-Genie/blob/master/docs/multiple-ips/README.md#feature-2-extension-cni-genie-multiple-ip-addresses-per-pod), each from a different CNI plugin.
84
+
CNI-Genie also supports [assigning multiple IP addresses to a pod](https://github.com/cni-genie/CNI-Genie/blob/master/docs/multiple-ips/README.md#feature-2-extension-cni-genie-multiple-ip-addresses-per-pod), each from a different CNI plugin.
85
85
86
86
### cni-ipvlan-vpc-k8s
87
87
[cni-ipvlan-vpc-k8s](https://github.com/lyft/cni-ipvlan-vpc-k8s) contains a set
@@ -104,6 +104,11 @@ network complexity required to deploy Kubernetes at scale within AWS.
104
104
[Coil](https://github.com/cybozu-go/coil) is a CNI plugin designed for ease of integration, providing flexible egress networking.
105
105
Coil operates with a low overhead compared to bare metal, and allows you to define arbitrary egress NAT gateways for external networks.
106
106
107
+
### Contiv-VPP
108
+
109
+
[Contiv-VPP](https://contivpp.io/) is a user-space, performance-oriented network plugin for
110
+
Kubernetes, using the [fd.io](https://fd.io/) data plane.
111
+
107
112
### Contrail / Tungsten Fabric
108
113
109
114
[Contrail](https://www.juniper.net/us/en/products-services/sdn/contrail/contrail-networking/), based on [Tungsten Fabric](https://tungsten.io), is a truly open, multi-cloud network virtualization and policy management platform. Contrail and Tungsten Fabric are integrated with various orchestration systems such as Kubernetes, OpenShift, OpenStack and Mesos, and provide different isolation modes for virtual machines, containers/pods and bare metal workloads.
@@ -122,7 +127,7 @@ With this toolset DANM is able to provide multiple separated network interfaces,
122
127
123
128
### Flannel
124
129
125
-
[Flannel](https://github.com/coreos/flannel#flannel) is a very simple overlay
130
+
[Flannel](https://github.com/flannel-io/flannel#flannel) is a very simple overlay
126
131
network that satisfies the Kubernetes requirements. Many
127
132
people have reported success with Flannel and Kubernetes.
128
133
@@ -188,7 +193,7 @@ at [ovn-kubernetes](https://github.com/openvswitch/ovn-kubernetes).
188
193
189
194
### Weave Net from Weaveworks
190
195
191
-
[Weave Net](https://www.weave.works/products/weave-net/) is a
196
+
[Weave Net](https://www.weave.works/oss/net/) is a
192
197
resilient and simple to use network for Kubernetes and its hosted applications.
193
198
Weave Net runs as a [CNI plug-in](https://www.weave.works/docs/net/latest/cni-plugin/)
194
199
or stand-alone. In either version, it doesn't require any configuration or extra code
Copy file name to clipboardExpand all lines: content/en/docs/reference/kubectl/conventions.md
-23Lines changed: 0 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,29 +31,6 @@ For `kubectl run` to satisfy infrastructure as code:
31
31
32
32
You can use the `--dry-run=client` flag to preview the object that would be sent to your cluster, without really submitting it.
33
33
34
-
{{< note >}}
35
-
All `kubectl run` generators are deprecated. See the Kubernetes v1.17 documentation for a [list](https://v1-17.docs.kubernetes.io/docs/reference/kubectl/conventions/#generators) of generators and how they were used.
36
-
{{< /note >}}
37
-
38
-
#### Generators
39
-
You can generate the following resources with a kubectl command, `kubectl create --dry-run=client -o yaml`:
40
-
41
-
*`clusterrole`: Create a ClusterRole.
42
-
*`clusterrolebinding`: Create a ClusterRoleBinding for a particular ClusterRole.
43
-
*`configmap`: Create a ConfigMap from a local file, directory or literal value.
44
-
*`cronjob`: Create a CronJob with the specified name.
45
-
*`deployment`: Create a Deployment with the specified name.
46
-
*`job`: Create a Job with the specified name.
47
-
*`namespace`: Create a Namespace with the specified name.
48
-
*`poddisruptionbudget`: Create a PodDisruptionBudget with the specified name.
49
-
*`priorityclass`: Create a PriorityClass with the specified name.
50
-
*`quota`: Create a Quota with the specified name.
51
-
*`role`: Create a Role with single rule.
52
-
*`rolebinding`: Create a RoleBinding for a particular Role or ClusterRole.
53
-
*`secret`: Create a Secret using specified subcommand.
54
-
*`service`: Create a Service using specified subcommand.
55
-
*`serviceaccount`: Create a ServiceAccount with the specified name.
56
-
57
34
### `kubectl apply`
58
35
59
36
* You can use `kubectl apply` to create or update resources. For more information about using kubectl apply to update resources, see [Kubectl Book](https://kubectl.docs.kubernetes.io).
0 commit comments