Skip to content

Commit

Permalink
art: Adding spaces
Browse files Browse the repository at this point in the history
  • Loading branch information
alchemyDocs committed Nov 26, 2019
1 parent 4f926a9 commit ed7da94
Show file tree
Hide file tree
Showing 102 changed files with 232 additions and 255 deletions.
4 changes: 2 additions & 2 deletions cs_access_reference.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ subcollection: containers
{:important: .important}
{:deprecated: .deprecated}
{:download: .download}
{:preview: .preview}
{:preview: .preview}

# User access permissions
{: #access_reference}
Expand All @@ -32,7 +32,7 @@ When you [assign cluster permissions]<roks311-vpc>(/docs/containers?topic=contai
## {{site.data.keyword.cloud_notm}} IAM platform roles
{: #iam_platform}

{{site.data.keyword.containerlong_notm}} is configured to use {{site.data.keyword.cloud_notm}} Identity and Access Management (IAM) roles. {{site.data.keyword.cloud_notm}} IAM platform roles determine the actions that users can perform on {{site.data.keyword.cloud_notm}} resources such as clusters, worker nodes, and Ingress application load balancers (ALBs). {{site.data.keyword.cloud_notm}} IAM platform roles also automatically set basic infrastructure permissions for users. To set platform roles, see [Assigning {{site.data.keyword.cloud_notm}} IAM platform permissions](/docs/containers?topic=containers-users#platform).
{{site.data.keyword.containerlong_notm}} is configured to use {{site.data.keyword.cloud_notm}} Identity and Access Management (IAM) roles. {{site.data.keyword.cloud_notm}} IAM platform roles determine the actions that users can perform on {{site.data.keyword.cloud_notm}} resources such as clusters, worker nodes, and Ingress application load balancers (ALBs). {{site.data.keyword.cloud_notm}} IAM platform roles also automatically set basic infrastructure permissions for users. To set platform roles, see [Assigning {{site.data.keyword.cloud_notm}} IAM platform permissions](/docs/containers?topic=containers-users#platform).
{: shortdesc}

<p class="tip">Do not assign {{site.data.keyword.cloud_notm}} IAM platform roles at the same time as a service role. You must assign platform and service roles separately.</p>
Expand Down
6 changes: 3 additions & 3 deletions cs_annotations.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

copyright:
years: 2014, 2019
lastupdated: "2019-11-25"
lastupdated: "2019-11-26"

keywords: kubernetes, iks, ingress

Expand All @@ -21,7 +21,7 @@ subcollection: containers
{:important: .important}
{:deprecated: .deprecated}
{:download: .download}
{:preview: .preview}
{:preview: .preview}

# Customizing Ingress routing with annotations
{: #ingress_annotation}
Expand Down Expand Up @@ -411,7 +411,7 @@ metadata:
### Location snippets (`location-snippets`)
{: #location-snippets}

Add a custom location block configuration for a service.
Add a custom location block configuration for a service.
{:shortdesc}

**Description**</br>
Expand Down
6 changes: 3 additions & 3 deletions cs_api_install.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

copyright:
years: 2014, 2019
lastupdated: "2019-11-25"
lastupdated: "2019-11-26"

keywords: kubernetes, iks, ibmcloud, ic, ks, kubectl, api

Expand All @@ -21,7 +21,7 @@ subcollection: containers
{:important: .important}
{:deprecated: .deprecated}
{:download: .download}
{:preview: .preview}
{:preview: .preview}

# Setting up the API
{: #cs_api_install}
Expand Down Expand Up @@ -103,7 +103,7 @@ You can use the version two (`v2`) API to manage both classic and VPC clusters.
## Automating cluster deployments with the API
{: #cs_api}

You can use the {{site.data.keyword.containerlong_notm}} API to automate the creation, deployment, and management of your Kubernetes clusters.
You can use the {{site.data.keyword.containerlong_notm}} API to automate the creation, deployment, and management of your Kubernetes clusters.
{:shortdesc}

The {{site.data.keyword.containerlong_notm}} API requires header information that you must provide in your API request and that can vary depending on the API that you want to use. To determine what header information is needed for your API, see the [{{site.data.keyword.containerlong_notm}} API documentation ![External link icon](../icons/launch-glyph.svg "External link icon")](https://us-south.containers.cloud.ibm.com/swagger-api).
Expand Down
4 changes: 2 additions & 2 deletions cs_app.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

copyright:
years: 2014, 2019
lastupdated: "2019-11-21"
lastupdated: "2019-11-26"

keywords: kubernetes, iks, node.js, js, java, .net, go, flask, react, python, swift, rails, ruby, spring boot, angular

Expand All @@ -21,7 +21,7 @@ subcollection: containers
{:important: .important}
{:deprecated: .deprecated}
{:download: .download}
{:preview: .preview}
{:preview: .preview}

# Deploying Kubernetes-native apps in clusters
{: #app}
Expand Down
4 changes: 2 additions & 2 deletions cs_app_knative.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

copyright:
years: 2014, 2019
lastupdated: "2019-11-25"
lastupdated: "2019-11-26"

keywords: kubernetes, iks, knative

Expand All @@ -21,7 +21,7 @@ subcollection: containers
{:important: .important}
{:deprecated: .deprecated}
{:download: .download}
{:preview: .preview}
{:preview: .preview}


# Deploying serverless apps with Knative
Expand Down
6 changes: 3 additions & 3 deletions cs_at_events.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

copyright:
years: 2017, 2019
lastupdated: "2019-11-08"
lastupdated: "2019-11-26"

keywords: kubernetes, iks, audit

Expand All @@ -21,12 +21,12 @@ subcollection: containers
{:important: .important}
{:deprecated: .deprecated}
{:download: .download}
{:preview: .preview}
{:preview: .preview}

# {{site.data.keyword.at_full_notm}} events
{: #at_events}

You can view, manage, and audit user-initiated activities in your {{site.data.keyword.containerlong}} community Kubernetes or OpenShift cluster by using the {{site.data.keyword.at_full}} service.
You can view, manage, and audit user-initiated activities in your {{site.data.keyword.containerlong}} community Kubernetes or OpenShift cluster by using the {{site.data.keyword.at_full}} service.
{: shortdesc}

{{site.data.keyword.containerlong_notm}} automatically generates cluster management events and forwards these event logs to {{site.data.keyword.at_full_notm}}. To access these logs, you must [provision an instance of {{site.data.keyword.at_full_notm}}](/docs/services/Activity-Tracker-with-LogDNA?topic=logdnaat-getting-started).
Expand Down
2 changes: 1 addition & 1 deletion cs_cli_changelog.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ subcollection: containers
{:important: .important}
{:deprecated: .deprecated}
{:download: .download}
{:preview: .preview}
{:preview: .preview}

# CLI changelog
{: #cs_cli_changelog}
Expand Down
2 changes: 1 addition & 1 deletion cs_cli_install.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ subcollection: containers
{:important: .important}
{:deprecated: .deprecated}
{:download: .download}
{:preview: .preview}
{:preview: .preview}

# Setting up the CLI
{: #cs_cli_install}
Expand Down
4 changes: 2 additions & 2 deletions cs_cluster_access.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

copyright:
years: 2014, 2019
lastupdated: "2019-11-21"
lastupdated: "2019-11-26"

keywords: kubernetes, iks, clusters

Expand All @@ -19,7 +19,7 @@ subcollection: containers
{:tip: .tip}
{:note: .note}
{:download: .download}
{:preview: .preview}
{:preview: .preview}


# Accessing Kubernetes clusters
Expand Down
4 changes: 2 additions & 2 deletions cs_cluster_plan_ha.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ subcollection: containers
{:important: .important}
{:deprecated: .deprecated}
{:download: .download}
{:preview: .preview}
{:preview: .preview}

# Planning your cluster for high availability
{: #ha_clusters}
Expand All @@ -35,7 +35,7 @@ Your users are less likely to experience downtime when you distribute your apps

1. A [single zone cluster](#single_zone) with multiple worker nodes in a worker pool.
2. A [multizone cluster](#multizone) that spreads worker nodes across zones within one region.
3. **Clusters with public network connectivity**: [Multiple clusters](#multiple_clusters) that are set up across zones or regions and that are connected via a global load balancer.
3. **Clusters with public network connectivity**: [Multiple clusters](#multiple_clusters) that are set up across zones or regions and that are connected via a global load balancer.

## Single zone cluster
{: #single_zone}
Expand Down
4 changes: 2 additions & 2 deletions cs_cluster_plan_network.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ subcollection: containers
{:important: .important}
{:deprecated: .deprecated}
{:download: .download}
{:preview: .preview}
{:preview: .preview}


# Planning your cluster network setup
Expand Down Expand Up @@ -532,7 +532,7 @@ Your worker nodes can automatically, securely communicate with other {{site.data

**External communication to apps that run on worker nodes**

To provide private access to an app in your cluster, you can create a private network load balancer (NLB) or Ingress application load balancer (ALB). These Kubernetes network services expose your app to the private network only so that any on-premises system with a connection to the subnet that the NLB IP is on can access the app.
To provide private access to an app in your cluster, you can create a private network load balancer (NLB) or Ingress application load balancer (ALB). These Kubernetes network services expose your app to the private network only so that any on-premises system with a connection to the subnet that the NLB IP is on can access the app.

Ready to get started with a cluster for this scenario? After you plan your [high availability](/docs/containers?topic=containers-ha_clusters) and [worker node](/docs/containers?topic=containers-planning_worker_nodes) setups, see [Creating clusters](/docs/containers?topic=containers-clusters).

Expand Down
4 changes: 2 additions & 2 deletions cs_cluster_scaling.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ subcollection: containers
{:important: .important}
{:deprecated: .deprecated}
{:download: .download}
{:preview: .preview}
{:preview: .preview}
{:gif: data-image-type='gif'}

# Autoscaling clusters
Expand Down Expand Up @@ -914,7 +914,7 @@ Before you begin: [Log in to your account. If applicable, target the appropriate
## Using the cluster autoscaler for a private network-only cluster
{: #ca_private_cluster}

The cluster autoscaler is available for standard clusters that are set up with public network connectivity. If your cluster cannot access the public network, such as a private cluster behind a firewall or a cluster with only the private service endpoint enabled, you must temporarily open the required ports or temporarily enable the public service endpoint to install, update, or customize the cluster autoscaler. After the cluster autoscaler is installed, you can close the ports or disable the public service endpoint.
The cluster autoscaler is available for standard clusters that are set up with public network connectivity. If your cluster cannot access the public network, such as a private cluster behind a firewall or a cluster with only the private service endpoint enabled, you must temporarily open the required ports or temporarily enable the public service endpoint to install, update, or customize the cluster autoscaler. After the cluster autoscaler is installed, you can close the ports or disable the public service endpoint.
{: shortdesc}

If your account is not enabled for VRF and service endpoints, you can [open the required ports](/docs/containers?topic=containers-firewall#vyatta_firewall) to allow public network connectivity in your cluster.
Expand Down
4 changes: 2 additions & 2 deletions cs_cluster_update.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ subcollection: containers
{:important: .important}
{:deprecated: .deprecated}
{:download: .download}
{:preview: .preview}
{:preview: .preview}

# Updating clusters, worker nodes, and cluster components
{: #update}
Expand Down Expand Up @@ -568,7 +568,7 @@ When you create a logging configuration for a source in your cluster to forward
As of 14 November 2019, a Fluentd component is created for your cluster only if you [create a logging configuration to forward logs to a syslog server](/docs/containers?topic=containers-health#configuring). If no logging configurations for syslog exist in your cluster, the Fluentd component is removed automatically. If you do not forward logs to syslog and want to ensure that the Fluentd component is removed from your cluster, automatic updates to Fluentd must be enabled.
{: important}

You can manage automatic updates of the Fluentd component in the following ways. **Note**: To run the following commands, you must have the [**Administrator** {{site.data.keyword.cloud_notm}} IAM platform role](/docs/containers?topic=containers-users#platform) for the cluster.
You can manage automatic updates of the Fluentd component in the following ways. **Note**: To run the following commands, you must have the [**Administrator** {{site.data.keyword.cloud_notm}} IAM platform role](/docs/containers?topic=containers-users#platform) for the cluster.

* Check whether automatic updates are enabled by running the `ibmcloud ks logging autoupdate get --cluster <cluster_name_or_ID>` [command](/docs/containers?topic=containers-cli-plugin-kubernetes-service-cli#cs_log_autoupdate_get).
* Disable automatic updates by running the `ibmcloud ks logging autoupdate disable` [command](/docs/containers?topic=containers-cli-plugin-kubernetes-service-cli#cs_log_autoupdate_disable).
Expand Down
4 changes: 2 additions & 2 deletions cs_clusters.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ subcollection: containers
{:important: .important}
{:deprecated: .deprecated}
{:download: .download}
{:preview: .preview}
{:preview: .preview}
{:gif: data-image-type='gif'}

# Creating clusters
Expand Down Expand Up @@ -780,7 +780,7 @@ Create your single zone or multizone VPC Generation 1 compute cluster by using t
{: #next_steps}

When the cluster is up and running, you can check out the following cluster administration tasks:
- If you created the cluster in a multizone capable zone, [spread worker nodes by adding a zone to your cluster](/docs/containers?topic=containers-add_workers).
- If you created the cluster in a multizone capable zone, [spread worker nodes by adding a zone to your cluster](/docs/containers?topic=containers-add_workers).
- [Deploy an app in your cluster.](/docs/containers?topic=containers-app#app_cli)
- [Set up your own private registry in {{site.data.keyword.cloud_notm}} to store and share Docker images with other users.](/docs/services/Registry?topic=registry-getting-started)
- [Set up the cluster autoscaler](/docs/containers?topic=containers-ca#ca) to automatically add or remove worker nodes from your worker pools based on your workload resource requests.
Expand Down
2 changes: 1 addition & 1 deletion cs_dedicated.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ subcollection: containers
{:important: .important}
{:deprecated: .deprecated}
{:download: .download}
{:preview: .preview}
{:preview: .preview}


# Deprecated: Dedicated cloud
Expand Down
4 changes: 2 additions & 2 deletions cs_dns.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

copyright:
years: 2014, 2019
lastupdated: "2019-11-04"
lastupdated: "2019-11-26"

keywords: kubernetes, iks, coredns, kubedns, dns

Expand All @@ -21,7 +21,7 @@ subcollection: containers
{:important: .important}
{:deprecated: .deprecated}
{:download: .download}
{:preview: .preview}
{:preview: .preview}


# Configuring the cluster DNS provider for classic clusters
Expand Down
6 changes: 3 additions & 3 deletions cs_edge.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

copyright:
years: 2014, 2019
lastupdated: "2019-11-14"
lastupdated: "2019-11-26"

keywords: kubernetes, iks, affinity, taint

Expand All @@ -21,7 +21,7 @@ subcollection: containers
{:important: .important}
{:deprecated: .deprecated}
{:download: .download}
{:preview: .preview}
{:preview: .preview}

# Restricting network traffic to edge worker nodes
{: #edge}
Expand Down Expand Up @@ -195,7 +195,7 @@ Trying out a gateway-enabled cluster? See [Isolating networking workloads to edg
{: tip}

Before you begin:
- Ensure you that have the [**Manager** {{site.data.keyword.cloud_notm}} IAM service role for all namespaces](/docs/containers?topic=containers-users#platform).
- Ensure you that have the [**Manager** {{site.data.keyword.cloud_notm}} IAM service role for all namespaces](/docs/containers?topic=containers-users#platform).
- [Log in to your account. If applicable, target the appropriate resource group. Set the context for your cluster.](/docs/containers?topic=containers-cs_cli_install#cs_cli_configure)

</br>To prevent other workloads from running on edge worker nodes:
Expand Down
4 changes: 2 additions & 2 deletions cs_encrypt.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ subcollection: containers
{:important: .important}
{:deprecated: .deprecated}
{:download: .download}
{:preview: .preview}
{:preview: .preview}
{:external: target="_blank" .external}

# Protecting sensitive information in your cluster
Expand Down Expand Up @@ -244,7 +244,7 @@ Before you begin: [Log in to your account. If applicable, target the appropriate
etcdCACertFile: '/Users/<user>/.bluemix/plugins/container-service/clusters/<cluster_name>-admin/ca-<location>-<cluster_name>.pem'
```
{: screen}
5. Confirm that the Kubernetes secrets for the cluster are encrypted. Replace the `cluster_name`, `etcdEndpoints`, `etcdCACertFile`, `etcdKeyFile`, and `etcdCertFile` fields with the values that you previously retrieved. The output is unreadable and scrambled, indicating that the secrets are encrypted.
5. Confirm that the Kubernetes secrets for the cluster are encrypted. Replace the `cluster_name`, `etcdEndpoints`, `etcdCACertFile`, `etcdKeyFile`, and `etcdCertFile` fields with the values that you previously retrieved. The output is unreadable and scrambled, indicating that the secrets are encrypted.
```
etcdctl get /registry/secrets/default/<cluster_name> --endpoints <etcdEndpoints> --cacert="<etcdCACertFile>" --key="<etcdKeyFile>" --cert="<etcdCertFile>"
```
Expand Down
6 changes: 3 additions & 3 deletions cs_firewall.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

copyright:
years: 2014, 2019
lastupdated: "2019-11-21"
lastupdated: "2019-11-26"

keywords: kubernetes, iks, firewall, vyatta, ips

Expand All @@ -21,7 +21,7 @@ subcollection: containers
{:important: .important}
{:deprecated: .deprecated}
{:download: .download}
{:preview: .preview}
{:preview: .preview}

# Opening required ports and IP addresses in your firewall
{: #firewall}
Expand Down Expand Up @@ -550,7 +550,7 @@ If you want to access services that run inside or outside {{site.data.keyword.cl
1. [Log in to your account. If applicable, target the appropriate resource group. Set the context for your cluster.](/docs/containers?topic=containers-cs_cli_install#cs_cli_configure)

2. Get the worker node subnets or the worker node IP addresses.
* **Worker node subnets**: If you anticipate changing the number of worker nodes in your cluster frequently, such as if you enable the [cluster autoscaler](/docs/containers?topic=containers-ca#ca), you might not want to update your firewall for each new worker node. Instead, you can whitelist the VLAN subnets that the cluster uses. Keep in mind that the VLAN subnet might be shared by worker nodes in other clusters.
* **Worker node subnets**: If you anticipate changing the number of worker nodes in your cluster frequently, such as if you enable the [cluster autoscaler](/docs/containers?topic=containers-ca#ca), you might not want to update your firewall for each new worker node. Instead, you can whitelist the VLAN subnets that the cluster uses. Keep in mind that the VLAN subnet might be shared by worker nodes in other clusters.
<p class="note">The **primary public subnets** that {{site.data.keyword.containerlong_notm}} provisions for your cluster come with 14 available IP addresses, and can be shared by other clusters on the same VLAN. When you have more than 14 worker nodes, another subnet is ordered, so the subnets that you need to whitelist can change. To reduce the frequency of change, create worker pools with worker node flavors of higher CPU and memory resources so that you don't need to add worker nodes as often.</p>
1. List the worker nodes in your cluster.
```
Expand Down
6 changes: 3 additions & 3 deletions cs_ha.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

copyright:
years: 2014, 2019
lastupdated: "2019-11-19"
lastupdated: "2019-11-26"

keywords: kubernetes, iks, disaster recovery, dr, ha, hadr

Expand All @@ -21,7 +21,7 @@ subcollection: containers
{:important: .important}
{:deprecated: .deprecated}
{:download: .download}
{:preview: .preview}
{:preview: .preview}



Expand All @@ -41,7 +41,7 @@ You can achieve high availability on different levels in your IT infrastructure
The {{site.data.keyword.containerlong_notm}} architecture and infrastructure is designed to ensure reliability, low processing latency, and a maximum uptime of the service. However, failures can happen. Depending on the service that you host in {{site.data.keyword.cloud_notm}}, you might not be able to tolerate failures, even if failures last for only a few minutes.
{: shortdesc}

{{site.data.keyword.containerlong_notm}} provides several approaches to add more availability to your cluster by adding redundancy and anti-affinity. Review the following image to learn about potential points of failure and how to eliminate them.
{{site.data.keyword.containerlong_notm}} provides several approaches to add more availability to your cluster by adding redundancy and anti-affinity. Review the following image to learn about potential points of failure and how to eliminate them.

<img src="images/cs_failure_ov.png" alt="Overview of fault domains in a high availability cluster within an {{site.data.keyword.cloud_notm}} region." width="250" style="width:250px; border-style: none"/>

Expand Down
Loading

0 comments on commit ed7da94

Please sign in to comment.