Skip to content

Commit a1e08c1

Browse files
author
Neil Jerram
authored
Merge pull request #1029 from neiljerram/note-regularization
Regularize our indented NOTE box format
2 parents 148ee80 + dfeca52 commit a1e08c1

File tree

31 files changed

+222
-167
lines changed

31 files changed

+222
-167
lines changed

master/getting-started/docker/tutorials/security-using-calico-profiles.md

+3-1
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,9 @@ To create the networks, run the following commands on one of the hosts:
3737
docker network create --driver calico --ipam-driver calico-ipam net2
3838
docker network create --driver calico --ipam-driver calico-ipam net3
3939

40-
>Note: To allocate from a specific Calico IP Pool, the `--subnet a.b.c.d/xx` command can be passed to `docker network create`. For more details see below.
40+
> **NOTE**
41+
>
42+
> To allocate from a specific Calico IP Pool, the `--subnet a.b.c.d/xx` command can be passed to `docker network create`. For more details see below.
4143
4244
## 2. Create the workloads in the networks
4345

master/getting-started/kubernetes/installation/hosted/kubernetes-datastore/index.md

+15-5
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,9 @@ You must have a cluster which meets the following requirements:
2626
- Your Kubernetes controller manager is configured to allocate pod CIDRs (i.e. by passing `--allocate-node-cidrs=true` to the controller manager)
2727
- Your Kubernetes controller manager has been provided a cluster-cidr (i.e. by passing `--cluster-cidr=192.168.0.0/16`, which the manifest expects by default).
2828

29-
> Note: If you are upgrading from Calico v2.1, the cluster-cidr selected for your controller manager should remain
29+
> **NOTE**
30+
>
31+
> If you are upgrading from Calico v2.1, the cluster-cidr selected for your controller manager should remain
3032
> unchanged from the v2.1 install (the v2.1 manifests default to `10.244.0.0/16`).
3133
3234
## Installation
@@ -39,7 +41,9 @@ This document describes three installation options for Calico using Kubernetes A
3941

4042
Ensure you have a cluster which meets the above requirements. There may be additional requirements based on the installation option you choose.
4143

42-
> Note: There is currently no upgrade path to switch between different installation options. Therefore,
44+
> **NOTE**
45+
>
46+
> There is currently no upgrade path to switch between different installation options. Therefore,
4347
> if you are upgrading from Calico v2.1, use the [Calico policy-only with user-supplied networking](#2-calico-policy-only-with-user-supplied-networking) installation instructions
4448
> to upgrade Calico policy-only which leaves the networking solution unchanged.
4549
@@ -50,7 +54,9 @@ RBAC roles to allow API access to Calico.
5054

5155
Apply the following manifest to create these necessary RBAC roles and bindings.
5256

53-
> Note: The following RBAC policy is compatible with the Kubernetes v1.7+ manifests only.
57+
> **NOTE**
58+
>
59+
> The following RBAC policy is compatible with the Kubernetes v1.7+ manifests only.
5460
5561
```
5662
kubectl apply -f {{site.url}}/{{page.version}}/getting-started/kubernetes/installation/hosted/rbac-kdd.yaml
@@ -66,7 +72,9 @@ networking with a full node-to-node mesh and/or explicit configuration of peers.
6672
To install Calico with Calico networking, run one of the commands below based on your Kubernetes version.
6773
This will install Calico and will initially create a full node-to-node mesh.
6874

69-
> Note: Calico `v2.5.0` or higher with Kubernetes backend requires Kubernetes `v1.7.0` or higher.
75+
> **NOTE**
76+
>
77+
> Calico `v2.5.0` or higher with Kubernetes backend requires Kubernetes `v1.7.0` or higher.
7078
7179
```
7280
kubectl apply -f {{site.url}}/{{page.version}}/getting-started/kubernetes/installation/hosted/kubernetes-datastore/calico-networking/1.7/calico.yaml
@@ -99,7 +107,9 @@ CIDR allocations, either through static routes, a Kubernetes cloud-provider inte
99107

100108
To install Calico in policy-only mode, run one of the following commands based on your Kubernetes version:
101109

102-
> Note: Calico `v2.5.0` or higher with Kubernetes backend requires Kubernetes `v1.7.0` or higher.
110+
> **NOTE**
111+
>
112+
> Calico `v2.5.0` or higher with Kubernetes backend requires Kubernetes `v1.7.0` or higher.
103113
104114
```
105115
kubectl apply -f {{site.url}}/{{page.version}}/getting-started/kubernetes/installation/hosted/kubernetes-datastore/policy-only/1.7/calico.yaml

master/getting-started/kubernetes/installation/integration.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ installation method.
2020
- Calico can share the etcd cluster used by Kubernetes, but in some cases it's recommended that a separate cluster is set up.
2121
A number of production users do share the etcd cluster between the two, but separating them gives better performance at high scale.
2222

23-
> **NOTE:**
23+
> **NOTE**
2424
>
2525
> Calico can also be installed [without a dependency on etcd](hosted/kubernetes-datastore/), but that is not covered in this document.
2626
@@ -104,7 +104,7 @@ WantedBy=multi-user.target
104104
```
105105
> Replace `<ETCD_IP>:<ETCD_PORT>` with your etcd configuration.
106106
107-
> **NOTE:**
107+
> **NOTE**
108108
>
109109
> To ensure reasonable dataplane programming latency on a system under load,
110110
`calico/node` requires a CPU reservation of at least 0.25 cores with additional

master/getting-started/kubernetes/installation/vagrant/index.md

+3-1
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,9 @@ Run
2424

2525
vagrant up
2626

27-
> *Note*: This will deploy a Kubernetes master and two Kubernetes nodes. To run more nodes, modify the value `num_instances` in the Vagrantfile before running `vagrant up`.
27+
> **NOTE**
28+
>
29+
> This will deploy a Kubernetes master and two Kubernetes nodes. To run more nodes, modify the value `num_instances` in the Vagrantfile before running `vagrant up`.
2830
2931
To connect to your servers
3032

master/getting-started/kubernetes/tutorials/advanced-policy.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ kubectl expose --namespace=advanced-policy-demo deployment nginx --port=80
5555

5656
#### Check using calicoctl
5757

58-
> **Note:**
58+
> **NOTE**
5959
>
6060
> This requires the [calicoctl tool to be configured]({{site.baseurl}}/{{page.version}}/reference/calicoctl/setup/etcdv2).
6161
> For example: `export ETCD_ENDPOINTS=http://10.96.232.136:6666`
@@ -70,7 +70,7 @@ $ calicoctl get profile -o wide
7070
NAME TAGS
7171
k8s_ns.advanced-policy-demo k8s_ns.advanced-policy-demo
7272
k8s_ns.default k8s_ns.default
73-
k8s_ns.kube-public k8s_ns.kube-public
73+
k8s_ns.kube-public k8s_ns.kube-public
7474
k8s_ns.kube-system k8s_ns.kube-system
7575
```
7676

@@ -157,7 +157,7 @@ It now shows up as a [Policy]({{site.baseurl}}/{{page.version}}/reference/calico
157157
$ calicoctl get policy -o wide
158158
NAME ORDER SELECTOR
159159
advanced-policy-demo.access-nginx 1000 calico/k8s_ns == 'advanced-policy-demo' && run == 'nginx'
160-
advanced-policy-demo.default-deny 1000 calico/k8s_ns == 'advanced-policy-demo'
160+
advanced-policy-demo.default-deny 1000 calico/k8s_ns == 'advanced-policy-demo'
161161
```
162162

163163
After creating the policy, we can now access the nginx Service. We also see that the pod can

master/getting-started/kubernetes/tutorials/using-calicoctl.md

+5-5
Original file line numberDiff line numberDiff line change
@@ -16,21 +16,21 @@ machine with access to your etcd cluster by setting `ETCD_ENDPOINTS`. For exampl
1616
ETCD_ENDPOINTS=http://etcd:2379 calicoctl get profile
1717
```
1818

19-
>**Note for kubeadm deployments**
19+
> **NOTE for kubeadm deployments**
2020
>
2121
> Calico is not configured to use the etcd run by kubeadm on the Kubernetes master.
2222
> Instead, it launches its own instance of etcd as a pod, available at
23-
`http://10.96.232.136:6666`.
24-
>Ensure you are connecting to the correct etcd or you will not see any of the expected data.
23+
> `http://10.96.232.136:6666`.
24+
> Ensure you are connecting to the correct etcd or you will not see any of the expected data.
2525
2626
### b. Running calicoctl as a Kubernetes Pod
2727

2828
The `calico/ctl` docker image can be deployed as a pod and used to run calicoctl
2929
commands. This pod will need to be configured for the Kubernetes environment it is in.
3030

31-
>**Note**
31+
> **NOTE**
3232
>
33-
>When calicoctl is run as a Pod, the `calicoctl node ...` suite of commands is not available.
33+
> When calicoctl is run as a Pod, the `calicoctl node ...` suite of commands is not available.
3434
3535

3636
For the **etcd backend** (e.g. kubeadm):

master/getting-started/kubernetes/upgrade.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -199,7 +199,7 @@ spec:
199199
podSelector:
200200
```
201201
202-
> **Note**:
202+
> **NOTE**
203203
>
204204
> The above steps should be followed when upgrading to Calico v2.3.0+ using the Kubernetes
205205
> datastore driver, and Calico v2.4.0+ using the etcd datastore,

master/getting-started/mesos/installation/dc-os/index.md

+3-1
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,9 @@ be restarted to pick up the change. The Framework then performs the following st
108108
}
109109
}
110110
```
111-
>Note: If not running etcd in proxy mode, be sure to change `etcd_endpoints`
111+
> **NOTE**
112+
>
113+
> If not running etcd in proxy mode, be sure to change `etcd_endpoints`
112114
to your correct etcd endpoint address.
113115

114116
4. Restart the slave process with `systemctl restart dcos-mesos-slave`

master/getting-started/mesos/installation/integration.md

+3-1
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,9 @@ Calico runs as a Docker container on each host. The `calicoctl` command line too
2323
sudo ETCD_ENDPOINTS=http://$ETCD_IP:$ETCD_PORT calicoctl node run --node-image=quay.io/calico/node:{{site.data.versions[page.version].first.title}}
2424
```
2525

26-
>Note: Ensure you've set or replaced `$ETCD_IP` and `$ETCD_PORT` to point to
26+
> **NOTE**
27+
>
28+
> Ensure you've set or replaced `$ETCD_IP` and `$ETCD_PORT` to point to
2729
[your etcd cluster](prerequisites).
2830

2931
Check that `calico/node` is now running:

master/getting-started/mesos/installation/prerequisites.md

+6-2
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,9 @@ Cluster Store: etcd://10.0.0.1:2379
5858
By default, Mesos only enables the "Mesos" Containerizer. Ensure
5959
the Docker Containerizer is also enabled on each Agent.
6060

61-
>Note: You may skip this step if you do not plan on using the Docker Containerizer.
61+
> **NOTE**
62+
>
63+
> You may skip this step if you do not plan on using the Docker Containerizer.
6264
6365
If you are using the default `mesos-init-wrapper` from the official Mesos package,
6466
you can enable the Docker Containerizer with the following command:
@@ -73,7 +75,9 @@ $ systemctl restart mesos-slave.service
7375
If you are planning to use Calico with the Unified containerizer,
7476
[enable the CNI Isolator on each agent](http://mesos.apache.org/documentation/latest/cni/#usage)
7577

76-
>Note: You may skip this step if you do not plan on using the Unified Containerizer.
78+
> **NOTE**
79+
>
80+
> You may skip this step if you do not plan on using the Unified Containerizer.
7781
7882
When enabling CNI, you will have specified a `network_cni_config_dir`
7983
and `network_cni_plugins_dir`. We'll refer to these going forward as

master/getting-started/mesos/tutorials/policy/universal-containerizer.md

+8-4
Original file line numberDiff line numberDiff line change
@@ -9,10 +9,12 @@ This document will demonstrate how to manipulate policy for Calico using
99
- Configure policy based off these labels
1010

1111
To demonstrate this, we will use Marathon to launch an nginx webserver using the Universal Containerizer.
12-
Then, we will launch basic curl task which will repeatedly curl the webserver.
12+
Then, we will launch basic curl task which will repeatedly curl the webserver.
1313

14-
> Note: This example assumes you are running in a DC/OS environment since it uses the DC/OS DNS to access the
15-
> webserver. It is easy enough to adjust this demo for non-DC/OS environments by replacing the
14+
> **NOTE**
15+
>
16+
> This example assumes you are running in a DC/OS environment since it uses the DC/OS DNS to access the
17+
> webserver. It is easy enough to adjust this demo for non-DC/OS environments by replacing the
1618
> `webserver.marathon.containerip.dcos.thisdcos.directory` DNS name with the IP address of the webserver container.
1719
1820
## Setting Labels
@@ -92,7 +94,9 @@ calicoctl apply -f - <<EOF
9294
EOF
9395
```
9496

95-
>Note: You'll need `calicoctl` configured to access your central etcd datastore. see [help]({{site.baseurl}}/{{page.version}}/reference/calicoctl/setup/etcdv2)
97+
> **NOTE**
98+
>
99+
> You'll need `calicoctl` configured to access your central etcd datastore. see [help]({{site.baseurl}}/{{page.version}}/reference/calicoctl/setup/etcdv2)
96100
97101
Checking the task's log should show that these connections are no longer successful.
98102

master/getting-started/openstack/neutron-api.md

+2-3
Original file line numberDiff line numberDiff line change
@@ -145,9 +145,8 @@ attempt to create one will fail.
145145

146146
> **NOTE**
147147
>
148-
> : It is possible that in a future version of Calico LBaaS may be
149-
> : functional. Watch this space.
150-
>
148+
> It is possible that in a future version of Calico LBaaS may be
149+
> functional. Watch this space.
151150
152151
## Horizon
153152

master/reference/advanced/etcd-rbac/calico-etcdv2-paths.md

+4-4
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,10 @@ title: Calico key and path prefixes in etcd v2
55
The Paths listed here are the key or path prefixes that a particular calico
66
component needs access to in etcd to function successfully.
77

8-
> **Note:** The paths listed here may change in the future and at that point
9-
anything referencing them (like etcd roles) would need to be updated
10-
appropriately.
8+
> **NOTE**
9+
>
10+
> The paths listed here may change in the future and at that point anything
11+
> referencing them (like etcd roles) would need to be updated appropriately.
1112
1213
## calico/node
1314

@@ -90,4 +91,3 @@ appropriately.
9091
| /calico/v1/ipam\* | RW |
9192
| /calico/ipam/v2\* | RW |
9293
| /calico/bgp/v1\* | RW |
93-

master/reference/advanced/etcd-rbac/users-and-roles.md

+8-6
Original file line numberDiff line numberDiff line change
@@ -9,12 +9,14 @@ Providing role based access control within etcd requires the following:
99

1010
This document helps with the creation of both of those.
1111

12-
> **Note:** The etcd release 3.x+ supports both v2 and v3 of its API.
13-
The etcd server keeps the roles and users separate, this means that if a
14-
user/role is created with the v2 API it will not appear in the v3 API.
15-
When adding roles and users they must be added through the API version that
16-
matches the version the component will be using. This concern can be ignored
17-
if all roles and users are added through both API versions.
12+
> **NOTE**
13+
>
14+
> The etcd release 3.x+ supports both v2 and v3 of its API. The etcd server
15+
> keeps the roles and users separate, this means that if a user/role is created
16+
> with the v2 API it will not appear in the v3 API. When adding roles and users
17+
> they must be added through the API version that matches the version the
18+
> component will be using. This concern can be ignored if all roles and users
19+
> are added through both API versions.
1820
1921
## Users and Roles creation guides
2022

master/reference/architecture/components.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,9 @@ The [calicoctl repostiory](https://github.com/projectcalico/calicoctl) contains
1616
configuration files that are used to configure and "glue" these components
1717
together.
1818

19-
> Note that the `calico/node` may be run in *policy only mode* in which Felix
19+
> **NOTE**
20+
>
21+
> `calico/node` may be run in *policy only mode* in which Felix
2022
> runs, but both BIRD and confd are removed. This provides policy management
2123
> without route distribution between hosts. This mode can be enabled by
2224
> setting the environment variable `CALICO_NETWORKING=false` before starting
@@ -65,5 +67,3 @@ For more information on confd, please refer to the [confd project](https://githu
6567
Calico uses a fork of the main confd repo which includes an additional change
6668
to improve performance with the handling of watch prefixes
6769
[calico-bird repo](https://github.com/projectcalico/calico-bird) for more details.
68-
69-

master/reference/calicoctl/commands/node/run.md

+8-7
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ Options:
6767
destination IP or domain name.
6868
> interface=<IFACE NAME REGEX LIST>
6969
Use the first valid IP address found on interfaces
70-
named as per the first matching supplied interface
70+
named as per the first matching supplied interface
7171
name regex. Regexes are separated by commas
7272
(e.g. eth.*,enp0s.*).
7373
> skip-interface=<IFACE NAME REGEX LIST>
@@ -125,7 +125,7 @@ Description:
125125

126126
### Kubernetes as the datastore
127127

128-
When Calico is configured to use the Kubernetes API as the datastore, BGP routing is *currently*
128+
When Calico is configured to use the Kubernetes API as the datastore, BGP routing is *currently*
129129
not supported. Many of the command line options related to BGP routing will
130130
have no effect. These include:
131131
- `--ip`, `--ip6`, `--ip-autodetection-method`, `--ip6-autodetection-method`
@@ -179,9 +179,10 @@ force autodetection of an IPv6 address, use the option `--ip6=autodetect`.
179179
To set the autodetection method for IPv4, use the `--ip-autodetection-method` option.
180180
To set the autodetection method for IPv6, use the `--ip6-autodetection-method` option.
181181

182-
> **Note**
182+
> **NOTE**
183+
>
183184
> If you are starting the calico/node container directly (and not using the
184-
> `calicoctl run` helper command), the options are passed in an environment
185+
> `calicoctl run` helper command), the options are passed in environment
185186
> variables. These are described in the [calico/node configuration guide]({{site.baseurl}}/{{page.version}}/reference/node/configuration)).
186187
187188
**first-found**
@@ -223,8 +224,8 @@ sudo calicoctl node run --ip autodetect --ip-autodetection-method can-reach=www.
223224

224225
The `interface` method uses the supplied interface regular expressions (golang
225226
syntax) to enumerate matching interfaces and to return the first IP address on
226-
the first interface that matches any of the interface regexes provided. The
227-
order that both the interfaces and the IP addresses are listed is system
227+
the first interface that matches any of the interface regexes provided. The
228+
order that both the interfaces and the IP addresses are listed is system
228229
dependent.
229230

230231
e.g.
@@ -292,7 +293,7 @@ terminating `,` character does not need to be specified for those cases.
292293
destination IP or domain name.
293294
> interface=<IFACE NAME REGEX LIST>
294295
Use the first valid IP address found on interfaces
295-
named as per the first matching supplied interface
296+
named as per the first matching supplied interface
296297
name regex. Regexes are separated by commas
297298
(e.g. eth.*,enp0s.*).
298299
> skip-interface=<IFACE NAME REGEX LIST>

master/reference/calicoctl/resources/workloadendpoint.md

+8-8
Original file line numberDiff line numberDiff line change
@@ -2,20 +2,20 @@
22
title: Workload Endpoint Resource (workloadEndpoint)
33
---
44

5-
A Workload Endpoint resource (workloadEndpoint) represents an interface
5+
A Workload Endpoint resource (workloadEndpoint) represents an interface
66
connecting a Calico networked container or VM to its host.
77

8-
Each endpoint may specify a set of labels and list of profiles that Calico will use
8+
Each endpoint may specify a set of labels and list of profiles that Calico will use
99
to apply policy to the interface.
1010

1111
For `calicoctl` commands that specify a resource type on the CLI, the following
1212
aliases are supported (all case insensitive): `workloadendpoint`, `workloadendpoints`, `wep`, `weps`.
1313

14-
> **Note**
14+
> **NOTE**
1515
>
1616
> While `calicoctl` allows the user to fully manage Workload Endpoint resources,
17-
the lifecylce of these resources is generally handled by an orchestrator specific
18-
plugin such as the Calico CNI plugin, the Calico Docker network plugin,
17+
the lifecycle of these resources is generally handled by an orchestrator specific
18+
plugin such as the Calico CNI plugin, the Calico Docker network plugin,
1919
or the Calico OpenStack Neutron Driver. In general, we recommend that you only
2020
use `calicoctl` to view this resource type.
2121

@@ -25,7 +25,7 @@ use `calicoctl` to view this resource type.
2525
apiVersion: v1
2626
kind: workloadEndpoint
2727
metadata:
28-
name: eth0
28+
name: eth0
2929
workload: default.frontend-5gs43
3030
orchestrator: k8s
3131
node: rack1-host1
@@ -34,7 +34,7 @@ metadata:
3434
calico/k8s_ns: default
3535
spec:
3636
interfaceName: cali0ef24ba
37-
mac: ca:fe:1d:52:bb:e9
37+
mac: ca:fe:1d:52:bb:e9
3838
ipNetworks:
3939
- 192.168.0.0/16
4040
profiles:
@@ -68,4 +68,4 @@ spec:
6868
| Datastore type | Create/Delete | Update | Get/List | Notes
6969
|-----------------------|---------------|--------|----------|------
7070
| etcdv2 | Yes | Yes | Yes |
71-
| Kubernetes API server | No | Yes | Yes | WorkloadEndpoints are directly tied to a Kuberenetes Pod.
71+
| Kubernetes API server | No | Yes | Yes | WorkloadEndpoints are directly tied to a Kuberenetes Pod.

0 commit comments

Comments
 (0)