Skip to content

Commit ca7fd70

Browse files
committed
Updated docs.microsoft.com to learn.microsoft.com in English
1 parent 90804f4 commit ca7fd70

File tree

15 files changed

+30
-30
lines changed

15 files changed

+30
-30
lines changed

content/en/blog/_posts/2020-06-30-SIG-Windows-Spotlight/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ So when it comes to running containers on Windows, there are actually two very i
3535
* Native Windows processes running as native Windows Server style containers,
3636
* and traditional Linux containers running on a Linux Kernel, generally hosted on a lightweight Hyper-V Virtual Machine.
3737

38-
You can learn more about Linux and Windows containers in this [tutorial](https://docs.microsoft.com/en-us/virtualization/windowscontainers/deploy-containers/linux-containers) from Microsoft.
38+
You can learn more about Linux and Windows containers in this [tutorial](https://learn.microsoft.com/en-us/virtualization/windowscontainers/deploy-containers/linux-containers) from Microsoft.
3939

4040

4141

content/en/docs/concepts/configuration/windows-resource-management.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ as a pod boundary for resource control. Containers are created within that bound
2020
for network, process and file system isolation. The Linux cgroup APIs can be used to
2121
gather CPU, I/O, and memory use statistics.
2222

23-
In contrast, Windows uses a [_job object_](https://docs.microsoft.com/windows/win32/procthread/job-objects) per container with a system namespace filter
23+
In contrast, Windows uses a [_job object_](https://learn.microsoft.com/windows/win32/procthread/job-objects) per container with a system namespace filter
2424
to contain all processes in a container and provide logical isolation from the
2525
host.
2626
(Job objects are a Windows process isolation mechanism and are different from
@@ -49,11 +49,11 @@ Windows can limit the amount of CPU time allocated for different processes but c
4949
guarantee a minimum amount of CPU time.
5050

5151
On Windows, the kubelet supports a command-line flag to set the
52-
[scheduling priority](https://docs.microsoft.com/windows/win32/procthread/scheduling-priorities) of the
52+
[scheduling priority](https://learn.microsoft.com/windows/win32/procthread/scheduling-priorities) of the
5353
kubelet process: `--windows-priorityclass`. This flag allows the kubelet process to get
5454
more CPU time slices when compared to other processes running on the Windows host.
5555
More information on the allowable values and their meaning is available at
56-
[Windows Priority Classes](https://docs.microsoft.com/en-us/windows/win32/procthread/scheduling-priorities#priority-class).
56+
[Windows Priority Classes](https://learn.microsoft.com/en-us/windows/win32/procthread/scheduling-priorities#priority-class).
5757
To ensure that running Pods do not starve the kubelet of CPU cycles, set this flag to `ABOVE_NORMAL_PRIORITY_CLASS` or above.
5858

5959
## Resource reservation {#resource-reservation}

content/en/docs/concepts/security/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ Amazon Web Services | https://aws.amazon.com/security |
8686
Google Cloud Platform | https://cloud.google.com/security |
8787
Huawei Cloud | https://www.huaweicloud.com/intl/en-us/securecenter/overallsafety |
8888
IBM Cloud | https://www.ibm.com/cloud/security |
89-
Microsoft Azure | https://docs.microsoft.com/en-us/azure/security/azure-security |
89+
Microsoft Azure | https://learn.microsoft.com/en-us/azure/security/azure-security |
9090
Oracle Cloud Infrastructure | https://www.oracle.com/security |
9191
Tencent Cloud | https://www.tencentcloud.com/solutions/data-security-and-information-protection |
9292
VMware vSphere | https://www.vmware.com/solutions/security/hardening-guides |

content/en/docs/concepts/security/windows-security.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ operator, you should take both of the following additional measures:
2323

2424
1. Use file ACLs to secure the Secrets' file location.
2525
1. Apply volume-level encryption using
26-
[BitLocker](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-how-to-deploy-on-windows-server).
26+
[BitLocker](https://learn.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-how-to-deploy-on-windows-server).
2727

2828
## Container users
2929

@@ -34,7 +34,7 @@ processes as specific user. This is roughly equivalent to
3434

3535
Windows containers offer two default user accounts, ContainerUser and ContainerAdministrator.
3636
The differences between these two user accounts are covered in
37-
[When to use ContainerAdmin and ContainerUser user accounts](https://docs.microsoft.com/virtualization/windowscontainers/manage-containers/container-security#when-to-use-containeradmin-and-containeruser-user-accounts)
37+
[When to use ContainerAdmin and ContainerUser user accounts](https://learn.microsoft.com/virtualization/windowscontainers/manage-containers/container-security#when-to-use-containeradmin-and-containeruser-user-accounts)
3838
within Microsoft's _Secure Windows containers_ documentation.
3939

4040
Local users can be added to container images during the container build process.

content/en/docs/concepts/services-networking/dns-pod-service.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -379,7 +379,7 @@ this problem.
379379
Windows treats all names with a `.` as a FQDN and skips FQDN resolution.
380380
- On Windows, there are multiple DNS resolvers that can be used. As these come with
381381
slightly different behaviors, using the
382-
[`Resolve-DNSName`](https://docs.microsoft.com/powershell/module/dnsclient/resolve-dnsname)
382+
[`Resolve-DNSName`](https://learn.microsoft.com/powershell/module/dnsclient/resolve-dnsname)
383383
powershell cmdlet for name query resolutions is recommended.
384384
- On Linux, you have a DNS suffix list, which is used after resolution of a name as fully
385385
qualified has failed.

content/en/docs/concepts/services-networking/ingress-controllers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Kubernetes as a project supports and maintains [AWS](https://github.com/kubernet
2727

2828
{{% thirdparty-content %}}
2929

30-
* [AKS Application Gateway Ingress Controller](https://docs.microsoft.com/azure/application-gateway/tutorial-ingress-controller-add-on-existing?toc=https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Faks%2Ftoc.json&bc=https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fbread%2Ftoc.json) is an ingress controller that configures the [Azure Application Gateway](https://docs.microsoft.com/azure/application-gateway/overview).
30+
* [AKS Application Gateway Ingress Controller](https://learn.microsoft.com/azure/application-gateway/tutorial-ingress-controller-add-on-existing?toc=https%3A%2F%2Flearn.microsoft.com%2Fen-us%2Fazure%2Faks%2Ftoc.json&bc=https%3A%2F%2Flearn.microsoft.com%2Fen-us%2Fazure%2Fbread%2Ftoc.json) is an ingress controller that configures the [Azure Application Gateway](https://learn.microsoft.com/azure/application-gateway/overview).
3131
* [Alibaba Cloud MSE Ingress](https://www.alibabacloud.com/help/en/mse/user-guide/overview-of-mse-ingress-gateways) is an ingress controller that configures the [Alibaba Cloud Native Gateway](https://www.alibabacloud.com/help/en/mse/product-overview/cloud-native-gateway-overview?spm=a2c63.p38356.0.0.20563003HJK9is), which is also the commercial version of [Higress](https://github.com/alibaba/higress).
3232
* [Apache APISIX ingress controller](https://github.com/apache/apisix-ingress-controller) is an [Apache APISIX](https://github.com/apache/apisix)-based ingress controller.
3333
* [Avi Kubernetes Operator](https://github.com/vmware/load-balancer-and-ingress-services-for-kubernetes) provides L4-L7 load-balancing using [VMware NSX Advanced Load Balancer](https://avinetworks.com/).

content/en/docs/concepts/services-networking/windows-networking.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ with recommendations on when to use each CNI:
5353
| Network Driver | Description | Container Packet Modifications | Network Plugins | Network Plugin Characteristics |
5454
| -------------- | ----------- | ------------------------------ | --------------- | ------------------------------ |
5555
| L2bridge | Containers are attached to an external vSwitch. Containers are attached to the underlay network, although the physical network doesn't need to learn the container MACs because they are rewritten on ingress/egress. | MAC is rewritten to host MAC, IP may be rewritten to host IP using HNS OutboundNAT policy. | [win-bridge](https://www.cni.dev/plugins/current/main/win-bridge/), [Azure-CNI](https://github.com/Azure/azure-container-networking/blob/master/docs/cni.md), [Flannel host-gateway](https://github.com/flannel-io/flannel/blob/master/Documentation/backends.md#host-gw) uses win-bridge | win-bridge uses L2bridge network mode, connects containers to the underlay of hosts, offering best performance. Requires user-defined routes (UDR) for inter-node connectivity. |
56-
| L2Tunnel | This is a special case of l2bridge, but only used on Azure. All packets are sent to the virtualization host where SDN policy is applied. | MAC rewritten, IP visible on the underlay network | [Azure-CNI](https://github.com/Azure/azure-container-networking/blob/master/docs/cni.md) | Azure-CNI allows integration of containers with Azure vNET, and allows them to leverage the set of capabilities that [Azure Virtual Network provides](https://azure.microsoft.com/en-us/services/virtual-network/). For example, securely connect to Azure services or use Azure NSGs. See [azure-cni for some examples](https://docs.microsoft.com/azure/aks/concepts-network#azure-cni-advanced-networking) |
56+
| L2Tunnel | This is a special case of l2bridge, but only used on Azure. All packets are sent to the virtualization host where SDN policy is applied. | MAC rewritten, IP visible on the underlay network | [Azure-CNI](https://github.com/Azure/azure-container-networking/blob/master/docs/cni.md) | Azure-CNI allows integration of containers with Azure vNET, and allows them to leverage the set of capabilities that [Azure Virtual Network provides](https://azure.microsoft.com/en-us/services/virtual-network/). For example, securely connect to Azure services or use Azure NSGs. See [azure-cni for some examples](https://learn.microsoft.com/azure/aks/concepts-network#azure-cni-advanced-networking) |
5757
| Overlay | Containers are given a vNIC connected to an external vSwitch. Each overlay network gets its own IP subnet, defined by a custom IP prefix.The overlay network driver uses VXLAN encapsulation. | Encapsulated with an outer header. | [win-overlay](https://www.cni.dev/plugins/current/main/win-overlay/), [Flannel VXLAN](https://github.com/flannel-io/flannel/blob/master/Documentation/backends.md#vxlan) (uses win-overlay) | win-overlay should be used when virtual container networks are desired to be isolated from underlay of hosts (e.g. for security reasons). Allows for IPs to be re-used for different overlay networks (which have different VNID tags) if you are restricted on IPs in your datacenter. This option requires [KB4489899](https://support.microsoft.com/help/4489899) on Windows Server 2019. |
5858
| Transparent (special use case for [ovn-kubernetes](https://github.com/openvswitch/ovn-kubernetes)) | Requires an external vSwitch. Containers are attached to an external vSwitch which enables intra-pod communication via logical networks (logical switches and routers). | Packet is encapsulated either via [GENEVE](https://datatracker.ietf.org/doc/draft-gross-geneve/) or [STT](https://datatracker.ietf.org/doc/draft-davie-stt/) tunneling to reach pods which are not on the same host. <br/> Packets are forwarded or dropped via the tunnel metadata information supplied by the ovn network controller. <br/> NAT is done for north-south communication. | [ovn-kubernetes](https://github.com/openvswitch/ovn-kubernetes) | [Deploy via ansible](https://github.com/openvswitch/ovn-kubernetes/tree/master/contrib). Distributed ACLs can be applied via Kubernetes policies. IPAM support. Load-balancing can be achieved without kube-proxy. NATing is done without using iptables/netsh. |
5959
| NAT (*not used in Kubernetes*) | Containers are given a vNIC connected to an internal vSwitch. DNS/DHCP is provided using an internal component called [WinNAT](https://techcommunity.microsoft.com/t5/virtualization/windows-nat-winnat-capabilities-and-limitations/ba-p/382303) | MAC and IP is rewritten to host MAC/IP. | [nat](https://github.com/Microsoft/windows-container-networking/tree/master/plugins/nat) | Included here for completeness |
@@ -91,7 +91,7 @@ The following IPAM options are supported on Windows:
9191

9292
* [host-local](https://github.com/containernetworking/plugins/tree/master/plugins/ipam/host-local)
9393
* [azure-vnet-ipam](https://github.com/Azure/azure-container-networking/blob/master/docs/ipam.md) (for azure-cni only)
94-
* [Windows Server IPAM](https://docs.microsoft.com/windows-server/networking/technologies/ipam/ipam-top) (fallback option if no IPAM is set)
94+
* [Windows Server IPAM](https://learn.microsoft.com/windows-server/networking/technologies/ipam/ipam-top) (fallback option if no IPAM is set)
9595

9696
## Direct Server Return (DSR) {#dsr}
9797

@@ -117,7 +117,7 @@ In a cluster that includes Windows nodes, you can use the following types of Ser
117117
* `ExternalName`
118118

119119
Windows container networking differs in some important ways from Linux networking.
120-
The [Microsoft documentation for Windows Container Networking](https://docs.microsoft.com/en-us/virtualization/windowscontainers/container-networking/architecture)
120+
The [Microsoft documentation for Windows Container Networking](https://learn.microsoft.com/en-us/virtualization/windowscontainers/container-networking/architecture)
121121
provides additional details and background.
122122

123123
On Windows, you can use the following settings to configure Services and load

content/en/docs/concepts/storage/storage-limits.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ volumes to be attached to a Node. For other instance types on
5959
<a href="https://aws.amazon.com/ec2/">Amazon Elastic Compute Cloud (EC2)</a>,
6060
Kubernetes allows 39 volumes to be attached to a Node.
6161

62-
* On Azure, up to 64 disks can be attached to a node, depending on the node type. For more details, refer to [Sizes for virtual machines in Azure](https://docs.microsoft.com/en-us/azure/virtual-machines/windows/sizes).
62+
* On Azure, up to 64 disks can be attached to a node, depending on the node type. For more details, refer to [Sizes for virtual machines in Azure](https://learn.microsoft.com/en-us/azure/virtual-machines/windows/sizes).
6363

6464
* If a CSI storage driver advertises a maximum number of volumes for a Node (using `NodeGetInfo`), the {{< glossary_tooltip text="kube-scheduler" term_id="kube-scheduler" >}} honors that limit.
6565
Refer to the [CSI specifications](https://github.com/container-storage-interface/spec/blob/master/spec.md#nodegetinfo) for details.

content/en/docs/concepts/windows/intro.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ Windows Server 2019 or Windows Server 2022.
4141

4242
This document uses the term *Windows containers* to mean Windows containers with
4343
process isolation. Kubernetes does not support running Windows containers with
44-
[Hyper-V isolation](https://docs.microsoft.com/en-us/virtualization/windowscontainers/manage-containers/hyperv-container).
44+
[Hyper-V isolation](https://learn.microsoft.com/en-us/virtualization/windowscontainers/manage-containers/hyperv-container).
4545

4646
## Compatibility and limitations {#limitations}
4747

@@ -168,7 +168,7 @@ At a high level, these OS concepts are different:
168168
are represented as integer types. User and group names
169169
are not canonical - they are just an alias in `/etc/groups`
170170
or `/etc/passwd` back to UID+GID. Windows uses a larger binary
171-
[security identifier](https://docs.microsoft.com/en-us/windows/security/identity-protection/access-control/security-identifiers) (SID)
171+
[security identifier](https://learn.microsoft.com/en-us/windows/security/identity-protection/access-control/security-identifiers) (SID)
172172
which is stored in the Windows Security Access Manager (SAM) database. This
173173
database is not shared between the host and containers, or between containers.
174174
* File permissions - Windows uses an access control list based on (SIDs), whereas
@@ -195,7 +195,7 @@ work between Windows and Linux:
195195

196196
* Huge pages are not implemented in the Windows container
197197
runtime, and are not available. They require [asserting a user
198-
privilege](https://docs.microsoft.com/en-us/windows/desktop/Memory/large-page-support)
198+
privilege](https://learn.microsoft.com/en-us/windows/desktop/Memory/large-page-support)
199199
that's not configurable for containers.
200200
* `requests.cpu` and `requests.memory` - requests are subtracted
201201
from node available resources, so they can be used to avoid overprovisioning a
@@ -293,7 +293,7 @@ is available on GitHub.
293293
Microsoft maintains a different multi-architecture image, with Linux and Windows
294294
amd64 support, that you can find as `mcr.microsoft.com/oss/kubernetes/pause:3.6`.
295295
This image is built from the same source as the Kubernetes maintained image but
296-
all of the Windows binaries are [authenticode signed](https://docs.microsoft.com/en-us/windows-hardware/drivers/install/authenticode) by Microsoft.
296+
all of the Windows binaries are [authenticode signed](https://learn.microsoft.com/en-us/windows-hardware/drivers/install/authenticode) by Microsoft.
297297
The Kubernetes project recommends using the Microsoft maintained image if you are
298298
deploying to a production or production-like environment that requires signed
299299
binaries.
@@ -424,8 +424,8 @@ The Kubernetes [cluster API](https://cluster-api.sigs.k8s.io/) project also prov
424424
## Windows distribution channels
425425

426426
For a detailed explanation of Windows distribution channels see the
427-
[Microsoft documentation](https://docs.microsoft.com/en-us/windows-server/get-started-19/servicing-channels-19).
427+
[Microsoft documentation](https://learn.microsoft.com/en-us/windows-server/get-started-19/servicing-channels-19).
428428

429429
Information on the different Windows Server servicing channels
430430
including their support models can be found at
431-
[Windows Server servicing channels](https://docs.microsoft.com/en-us/windows-server/get-started/servicing-channels-comparison).
431+
[Windows Server servicing channels](https://learn.microsoft.com/en-us/windows-server/get-started/servicing-channels-comparison).

content/en/docs/contribute/style/style-guide.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ in the [API Reference](/docs/reference/kubernetes-api/). When writing
5050
general documentation, it's better to use upper camel case, calling it "ConfigMap" instead.
5151

5252
When you are generally discussing an API object, use
53-
[sentence-style capitalization](https://docs.microsoft.com/en-us/style-guide/text-formatting/using-type/use-sentence-style-capitalization).
53+
[sentence-style capitalization](https://learn.microsoft.com/en-us/style-guide/text-formatting/using-type/use-sentence-style-capitalization).
5454

5555
The following examples focus on capitalization. For more information about formatting
5656
API object names, review the related guidance on [Code Style](#code-style-inline-code).

0 commit comments

Comments
 (0)