You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
>Note: To allocate from a specific Calico IP Pool, the `--subnet a.b.c.d/xx` command can be passed to `docker network create`. For more details see below.
40
+
> **NOTE**
41
+
>
42
+
> To allocate from a specific Calico IP Pool, the `--subnet a.b.c.d/xx` command can be passed to `docker network create`. For more details see below.
Copy file name to clipboardExpand all lines: master/getting-started/kubernetes/installation/hosted/kubernetes-datastore/index.md
+15-5
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,9 @@ You must have a cluster which meets the following requirements:
26
26
- Your Kubernetes controller manager is configured to allocate pod CIDRs (i.e. by passing `--allocate-node-cidrs=true` to the controller manager)
27
27
- Your Kubernetes controller manager has been provided a cluster-cidr (i.e. by passing `--cluster-cidr=192.168.0.0/16`, which the manifest expects by default).
28
28
29
-
> Note: If you are upgrading from Calico v2.1, the cluster-cidr selected for your controller manager should remain
29
+
> **NOTE**
30
+
>
31
+
> If you are upgrading from Calico v2.1, the cluster-cidr selected for your controller manager should remain
30
32
> unchanged from the v2.1 install (the v2.1 manifests default to `10.244.0.0/16`).
31
33
32
34
## Installation
@@ -39,7 +41,9 @@ This document describes three installation options for Calico using Kubernetes A
39
41
40
42
Ensure you have a cluster which meets the above requirements. There may be additional requirements based on the installation option you choose.
41
43
42
-
> Note: There is currently no upgrade path to switch between different installation options. Therefore,
44
+
> **NOTE**
45
+
>
46
+
> There is currently no upgrade path to switch between different installation options. Therefore,
43
47
> if you are upgrading from Calico v2.1, use the [Calico policy-only with user-supplied networking](#2-calico-policy-only-with-user-supplied-networking) installation instructions
44
48
> to upgrade Calico policy-only which leaves the networking solution unchanged.
45
49
@@ -50,7 +54,9 @@ RBAC roles to allow API access to Calico.
50
54
51
55
Apply the following manifest to create these necessary RBAC roles and bindings.
52
56
53
-
> Note: The following RBAC policy is compatible with the Kubernetes v1.7+ manifests only.
57
+
> **NOTE**
58
+
>
59
+
> The following RBAC policy is compatible with the Kubernetes v1.7+ manifests only.
Copy file name to clipboardExpand all lines: master/getting-started/kubernetes/installation/vagrant/index.md
+3-1
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,9 @@ Run
24
24
25
25
vagrant up
26
26
27
-
> *Note*: This will deploy a Kubernetes master and two Kubernetes nodes. To run more nodes, modify the value `num_instances` in the Vagrantfile before running `vagrant up`.
27
+
> **NOTE**
28
+
>
29
+
> This will deploy a Kubernetes master and two Kubernetes nodes. To run more nodes, modify the value `num_instances` in the Vagrantfile before running `vagrant up`.
Copy file name to clipboardExpand all lines: master/getting-started/mesos/tutorials/policy/universal-containerizer.md
+8-4
Original file line number
Diff line number
Diff line change
@@ -9,10 +9,12 @@ This document will demonstrate how to manipulate policy for Calico using
9
9
- Configure policy based off these labels
10
10
11
11
To demonstrate this, we will use Marathon to launch an nginx webserver using the Universal Containerizer.
12
-
Then, we will launch basic curl task which will repeatedly curl the webserver.
12
+
Then, we will launch basic curl task which will repeatedly curl the webserver.
13
13
14
-
> Note: This example assumes you are running in a DC/OS environment since it uses the DC/OS DNS to access the
15
-
> webserver. It is easy enough to adjust this demo for non-DC/OS environments by replacing the
14
+
> **NOTE**
15
+
>
16
+
> This example assumes you are running in a DC/OS environment since it uses the DC/OS DNS to access the
17
+
> webserver. It is easy enough to adjust this demo for non-DC/OS environments by replacing the
16
18
> `webserver.marathon.containerip.dcos.thisdcos.directory` DNS name with the IP address of the webserver container.
17
19
18
20
## Setting Labels
@@ -92,7 +94,9 @@ calicoctl apply -f - <<EOF
92
94
EOF
93
95
```
94
96
95
-
>Note: You'll need `calicoctl` configured to access your central etcd datastore. see [help]({{site.baseurl}}/{{page.version}}/reference/calicoctl/setup/etcdv2)
97
+
> **NOTE**
98
+
>
99
+
> You'll need `calicoctl` configured to access your central etcd datastore. see [help]({{site.baseurl}}/{{page.version}}/reference/calicoctl/setup/etcdv2)
96
100
97
101
Checking the task's log should show that these connections are no longer successful.
0 commit comments