Skip to content

Commit 99e4ae4

Browse files
authored
Merge pull request #51470 from ritazh/5018-beta
kep-5018: DRA Admin Access: move to beta
2 parents 2c0d450 + 6611158 commit 99e4ae4

File tree

3 files changed

+22
-11
lines changed

3 files changed

+22
-11
lines changed

content/en/docs/concepts/scheduling-eviction/dynamic-resource-allocation.md

Lines changed: 14 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -392,14 +392,11 @@ spec:
392392
You may also be able to mutate the incoming Pod, at admission time, to unset
393393
the `.spec.nodeName` field and to use a node selector instead.
394394

395-
## DRA alpha features {#alpha-features}
395+
## DRA beta features {#beta-features}
396396

397-
The following sections describe DRA features that are available in the Alpha
397+
The following sections describe DRA features that are available in the Beta
398398
[feature stage](/docs/reference/command-line-tools-reference/feature-gates/#feature-stages).
399-
To use any of these features, you must also set up DRA in your clusters by
400-
enabling the DynamicResourceAllocation feature gate and the DRA
401-
{{< glossary_tooltip text="API groups" term_id="api-group" >}}. For more
402-
information, see
399+
For more information, see
403400
[Set up DRA in the cluster](/docs/tasks/configure-pod-container/assign-resources/set-up-dra-cluster/).
404401

405402
### Admin access {#admin-access}
@@ -435,7 +432,17 @@ multi-tenant clusters. Starting with Kubernetes v1.33, only users authorized to
435432
create ResourceClaim or ResourceClaimTemplate objects in namespaces labeled with
436433
`resource.k8s.io/admin-access: "true"` (case-sensitive) can use the
437434
`adminAccess` field. This ensures that non-admin users cannot misuse the
438-
feature.
435+
feature. Starting with Kubernetes v1.34, this label has been updated to `resource.kubernetes.io/admin-access: "true"`.
436+
437+
## DRA alpha features {#alpha-features}
438+
439+
The following sections describe DRA features that are available in the Alpha
440+
[feature stage](/docs/reference/command-line-tools-reference/feature-gates/#feature-stages).
441+
To use any of these features, you must also set up DRA in your clusters by
442+
enabling the DynamicResourceAllocation feature gate and the DRA
443+
{{< glossary_tooltip text="API groups" term_id="api-group" >}}. For more
444+
information, see
445+
[Set up DRA in the cluster](/docs/tasks/configure-pod-container/assign-resources/set-up-dra-cluster/).
439446
440447
### Prioritized list {#prioritized-list}
441448

content/en/docs/reference/command-line-tools-reference/feature-gates/DRAAdminAccess.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,14 +9,18 @@ stages:
99
- stage: alpha
1010
defaultValue: false
1111
fromVersion: "1.32"
12+
toVersion: "1.33"
13+
- stage: beta
14+
defaultValue: true
15+
fromVersion: "1.34"
1216
---
1317
Enables support for requesting [admin access](/docs/concepts/scheduling-eviction/dynamic-resource-allocation/#admin-access)
1418
in a ResourceClaim or a ResourceClaimTemplate. Admin access grants access to
1519
in-use devices and may enable additional permissions when making the device
1620
available in a container. Starting with Kubernetes v1.33, only users authorized
1721
to create ResourceClaim or ResourceClaimTemplate objects in namespaces labeled
18-
with `resource.k8s.io/admin-access: "true"` (case-sensitive) can use the
22+
with `resource.kubernetes.io/admin-access: "true"` (case-sensitive) can use the
1923
`adminAccess` field. This ensures that non-admin users cannot misuse the
20-
feature.
24+
feature. Starting with Kubernetes v1.34, this label has been updated to `resource.kubernetes.io/admin-access: "true"`.
2125

2226
This feature gate has no effect unless you also enable the `DynamicResourceAllocation` feature gate.

content/en/docs/reference/labels-annotations-taints/_index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2806,11 +2806,11 @@ workloads to schedule on them. Replaced by the
28062806
[`node-role.kubernetes.io/control-plane`](#node-role-kubernetes-io-control-plane-taint)
28072807
taint. kubeadm no longer sets or uses this deprecated taint.
28082808

2809-
### resource.k8s.io/admin-access {resource-k8s-io-admin-access}
2809+
### resource.kubernetes.io/admin-access {resource-kubernetes-io-admin-access}
28102810

28112811
Type: Label
28122812

2813-
Example: `resource.k8s.io/admin-access: "true"`
2813+
Example: `resource.kubernetes.io/admin-access: "true"`
28142814

28152815
Used on: Namespace
28162816

0 commit comments

Comments
 (0)