Skip to content

Commit 6611158

Browse files
committed
DRAAdminAccess: updates for v1.34
Signed-off-by: Rita Zhang <rita.z.zhang@gmail.com>
1 parent 8255f3f commit 6611158

File tree

3 files changed

+22
-11
lines changed

3 files changed

+22
-11
lines changed

content/en/docs/concepts/scheduling-eviction/dynamic-resource-allocation.md

Lines changed: 14 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -379,14 +379,11 @@ spec:
379379
You may also be able to mutate the incoming Pod, at admission time, to unset
380380
the `.spec.nodeName` field and to use a node selector instead.
381381

382-
## DRA alpha features {#alpha-features}
382+
## DRA beta features {#beta-features}
383383

384-
The following sections describe DRA features that are available in the Alpha
384+
The following sections describe DRA features that are available in the Beta
385385
[feature stage](/docs/reference/command-line-tools-reference/feature-gates/#feature-stages).
386-
To use any of these features, you must also set up DRA in your clusters by
387-
enabling the DynamicResourceAllocation feature gate and the DRA
388-
{{< glossary_tooltip text="API groups" term_id="api-group" >}}. For more
389-
information, see
386+
For more information, see
390387
[Set up DRA in the cluster](/docs/tasks/configure-pod-container/assign-resources/set-up-dra-cluster/).
391388

392389
### Admin access {#admin-access}
@@ -422,7 +419,17 @@ multi-tenant clusters. Starting with Kubernetes v1.33, only users authorized to
422419
create ResourceClaim or ResourceClaimTemplate objects in namespaces labeled with
423420
`resource.k8s.io/admin-access: "true"` (case-sensitive) can use the
424421
`adminAccess` field. This ensures that non-admin users cannot misuse the
425-
feature.
422+
feature. Starting with Kubernetes v1.34, this label has been updated to `resource.kubernetes.io/admin-access: "true"`.
423+
424+
## DRA alpha features {#alpha-features}
425+
426+
The following sections describe DRA features that are available in the Alpha
427+
[feature stage](/docs/reference/command-line-tools-reference/feature-gates/#feature-stages).
428+
To use any of these features, you must also set up DRA in your clusters by
429+
enabling the DynamicResourceAllocation feature gate and the DRA
430+
{{< glossary_tooltip text="API groups" term_id="api-group" >}}. For more
431+
information, see
432+
[Set up DRA in the cluster](/docs/tasks/configure-pod-container/assign-resources/set-up-dra-cluster/).
426433
427434
### Prioritized list {#prioritized-list}
428435

content/en/docs/reference/command-line-tools-reference/feature-gates/DRAAdminAccess.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,14 +9,18 @@ stages:
99
- stage: alpha
1010
defaultValue: false
1111
fromVersion: "1.32"
12+
toVersion: "1.33"
13+
- stage: beta
14+
defaultValue: true
15+
fromVersion: "1.34"
1216
---
1317
Enables support for requesting [admin access](/docs/concepts/scheduling-eviction/dynamic-resource-allocation/#admin-access)
1418
in a ResourceClaim or a ResourceClaimTemplate. Admin access grants access to
1519
in-use devices and may enable additional permissions when making the device
1620
available in a container. Starting with Kubernetes v1.33, only users authorized
1721
to create ResourceClaim or ResourceClaimTemplate objects in namespaces labeled
18-
with `resource.k8s.io/admin-access: "true"` (case-sensitive) can use the
22+
with `resource.kubernetes.io/admin-access: "true"` (case-sensitive) can use the
1923
`adminAccess` field. This ensures that non-admin users cannot misuse the
20-
feature.
24+
feature. Starting with Kubernetes v1.34, this label has been updated to `resource.kubernetes.io/admin-access: "true"`.
2125

2226
This feature gate has no effect unless you also enable the `DynamicResourceAllocation` feature gate.

content/en/docs/reference/labels-annotations-taints/_index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2806,11 +2806,11 @@ workloads to schedule on them. Replaced by the
28062806
[`node-role.kubernetes.io/control-plane`](#node-role-kubernetes-io-control-plane-taint)
28072807
taint. kubeadm no longer sets or uses this deprecated taint.
28082808

2809-
### resource.k8s.io/admin-access {resource-k8s-io-admin-access}
2809+
### resource.kubernetes.io/admin-access {resource-kubernetes-io-admin-access}
28102810

28112811
Type: Label
28122812

2813-
Example: `resource.k8s.io/admin-access: "true"`
2813+
Example: `resource.kubernetes.io/admin-access: "true"`
28142814

28152815
Used on: Namespace
28162816

0 commit comments

Comments
 (0)