mirror of
https://github.com/jpetazzo/container.training.git
synced 2026-02-14 17:49:59 +00:00
Fix a few minor typos
This commit is contained in:
committed by
Jérôme Petazzoni
parent
5b39218593
commit
30b1bfde5b
@@ -168,7 +168,7 @@ class: extra-details
|
||||
|
||||
(`O=system:nodes`, `CN=system:node:name-of-the-node`)
|
||||
|
||||
- The Kubernetse API can act as a CA
|
||||
- The Kubernetes API can act as a CA
|
||||
|
||||
(by wrapping an X509 CSR into a CertificateSigningRequest resource)
|
||||
|
||||
|
||||
@@ -157,7 +157,7 @@ class: extra-details
|
||||
|
||||
(as opposed to, e.g., installing a new release each time we run it)
|
||||
|
||||
- Other example: `kubectl -f some-file.yaml`
|
||||
- Other example: `kubectl apply -f some-file.yaml`
|
||||
|
||||
---
|
||||
|
||||
|
||||
@@ -66,7 +66,7 @@
|
||||
|
||||
Where do that `repository` and `version` come from?
|
||||
|
||||
We're assuming here that we did our reserach,
|
||||
We're assuming here that we did our research,
|
||||
or that our resident Helm expert advised us to
|
||||
use Bitnami's Redis chart.
|
||||
|
||||
|
||||
@@ -99,9 +99,9 @@ Pros:
|
||||
|
||||
- That Pod will fetch metrics from all our Nodes
|
||||
|
||||
- It will expose them through the Kubernetes API agregation layer
|
||||
- It will expose them through the Kubernetes API aggregation layer
|
||||
|
||||
(we won't say much more about that agregation layer; that's fairly advanced stuff!)
|
||||
(we won't say much more about that aggregation layer; that's fairly advanced stuff!)
|
||||
|
||||
---
|
||||
|
||||
@@ -128,7 +128,7 @@ Pros:
|
||||
|
||||
- `apiService.create=true`
|
||||
|
||||
register `metrics-server` with the Kubernetes agregation layer
|
||||
register `metrics-server` with the Kubernetes aggregation layer
|
||||
|
||||
(create an entry that will show up in `kubectl get apiservices`)
|
||||
|
||||
|
||||
@@ -127,7 +127,7 @@ class: extra-details
|
||||
- either directly
|
||||
|
||||
- or by extending the API server
|
||||
<br/>(for instance by using the agregation layer, like [metrics server](https://github.com/kubernetes-incubator/metrics-server) does)
|
||||
<br/>(for instance by using the aggregation layer, like [metrics server](https://github.com/kubernetes-incubator/metrics-server) does)
|
||||
|
||||
---
|
||||
|
||||
|
||||
@@ -6,7 +6,7 @@
|
||||
|
||||
- Easier to use
|
||||
|
||||
(doesn't require complex interaction bewteen policies and RBAC)
|
||||
(doesn't require complex interaction between policies and RBAC)
|
||||
|
||||
---
|
||||
|
||||
@@ -206,7 +206,7 @@ class: extra-details
|
||||
|
||||
- If new namespaces are created, they will get default permissions
|
||||
|
||||
- We can change that be using an *admission configuration*
|
||||
- We can change that by using an *admission configuration*
|
||||
|
||||
- Step 1: write an "admission configuration file"
|
||||
|
||||
@@ -232,7 +232,7 @@ Let's use @@LINK[k8s/admission-configuration.yaml]:
|
||||
|
||||
- For convenience, let's copy it do `/etc/kubernetes/pki`
|
||||
|
||||
(it's definitely where it *should* be, but that'll do!)
|
||||
(it's definitely not where it *should* be, but that'll do!)
|
||||
|
||||
|
||||
.lab[
|
||||
|
||||
@@ -72,7 +72,7 @@
|
||||
|
||||
## Accessing private repositories
|
||||
|
||||
- Let's see how to access an image on private registry!
|
||||
- Let's see how to access an image on a private registry!
|
||||
|
||||
- These images are protected by a username + password
|
||||
|
||||
@@ -243,7 +243,7 @@ class: extra-details
|
||||
|
||||
## Encryption at rest
|
||||
|
||||
- It is possible to [encrypted secrets at rest](https://kubernetes.io/docs/tasks/administer-cluster/encrypt-data/)
|
||||
- It is possible to [encrypt secrets at rest](https://kubernetes.io/docs/tasks/administer-cluster/encrypt-data/)
|
||||
|
||||
- This means that secrets will be safe if someone ...
|
||||
|
||||
|
||||
Reference in New Issue
Block a user