You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/en/blog/_posts/2020-06-30-SIG-Windows-Spotlight/index.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@ So when it comes to running containers on Windows, there are actually two very i
35
35
* Native Windows processes running as native Windows Server style containers,
36
36
* and traditional Linux containers running on a Linux Kernel, generally hosted on a lightweight Hyper-V Virtual Machine.
37
37
38
-
You can learn more about Linux and Windows containers in this [tutorial](https://docs.microsoft.com/en-us/virtualization/windowscontainers/deploy-containers/linux-containers) from Microsoft.
38
+
You can learn more about Linux and Windows containers in this [tutorial](https://learn.microsoft.com/en-us/virtualization/windowscontainers/deploy-containers/linux-containers) from Microsoft.
Copy file name to clipboardExpand all lines: content/en/docs/concepts/configuration/windows-resource-management.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ as a pod boundary for resource control. Containers are created within that bound
20
20
for network, process and file system isolation. The Linux cgroup APIs can be used to
21
21
gather CPU, I/O, and memory use statistics.
22
22
23
-
In contrast, Windows uses a [_job object_](https://docs.microsoft.com/windows/win32/procthread/job-objects) per container with a system namespace filter
23
+
In contrast, Windows uses a [_job object_](https://learn.microsoft.com/windows/win32/procthread/job-objects) per container with a system namespace filter
24
24
to contain all processes in a container and provide logical isolation from the
25
25
host.
26
26
(Job objects are a Windows process isolation mechanism and are different from
@@ -49,11 +49,11 @@ Windows can limit the amount of CPU time allocated for different processes but c
49
49
guarantee a minimum amount of CPU time.
50
50
51
51
On Windows, the kubelet supports a command-line flag to set the
52
-
[scheduling priority](https://docs.microsoft.com/windows/win32/procthread/scheduling-priorities) of the
52
+
[scheduling priority](https://learn.microsoft.com/windows/win32/procthread/scheduling-priorities) of the
53
53
kubelet process: `--windows-priorityclass`. This flag allows the kubelet process to get
54
54
more CPU time slices when compared to other processes running on the Windows host.
55
55
More information on the allowable values and their meaning is available at
@@ -34,7 +34,7 @@ processes as specific user. This is roughly equivalent to
34
34
35
35
Windows containers offer two default user accounts, ContainerUser and ContainerAdministrator.
36
36
The differences between these two user accounts are covered in
37
-
[When to use ContainerAdmin and ContainerUser user accounts](https://docs.microsoft.com/virtualization/windowscontainers/manage-containers/container-security#when-to-use-containeradmin-and-containeruser-user-accounts)
37
+
[When to use ContainerAdmin and ContainerUser user accounts](https://learn.microsoft.com/virtualization/windowscontainers/manage-containers/container-security#when-to-use-containeradmin-and-containeruser-user-accounts)
38
38
within Microsoft's _Secure Windows containers_ documentation.
39
39
40
40
Local users can be added to container images during the container build process.
Copy file name to clipboardExpand all lines: content/en/docs/concepts/services-networking/ingress-controllers.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ Kubernetes as a project supports and maintains [AWS](https://github.com/kubernet
27
27
28
28
{{% thirdparty-content %}}
29
29
30
-
*[AKS Application Gateway Ingress Controller](https://docs.microsoft.com/azure/application-gateway/tutorial-ingress-controller-add-on-existing?toc=https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Faks%2Ftoc.json&bc=https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fbread%2Ftoc.json) is an ingress controller that configures the [Azure Application Gateway](https://docs.microsoft.com/azure/application-gateway/overview).
30
+
*[AKS Application Gateway Ingress Controller](https://learn.microsoft.com/azure/application-gateway/tutorial-ingress-controller-add-on-existing?toc=https%3A%2F%2Flearn.microsoft.com%2Fen-us%2Fazure%2Faks%2Ftoc.json&bc=https%3A%2F%2Flearn.microsoft.com%2Fen-us%2Fazure%2Fbread%2Ftoc.json) is an ingress controller that configures the [Azure Application Gateway](https://learn.microsoft.com/azure/application-gateway/overview).
31
31
*[Alibaba Cloud MSE Ingress](https://www.alibabacloud.com/help/en/mse/user-guide/overview-of-mse-ingress-gateways) is an ingress controller that configures the [Alibaba Cloud Native Gateway](https://www.alibabacloud.com/help/en/mse/product-overview/cloud-native-gateway-overview?spm=a2c63.p38356.0.0.20563003HJK9is), which is also the commercial version of [Higress](https://github.com/alibaba/higress).
32
32
*[Apache APISIX ingress controller](https://github.com/apache/apisix-ingress-controller) is an [Apache APISIX](https://github.com/apache/apisix)-based ingress controller.
| L2bridge | Containers are attached to an external vSwitch. Containers are attached to the underlay network, although the physical network doesn't need to learn the container MACs because they are rewritten on ingress/egress. | MAC is rewritten to host MAC, IP may be rewritten to host IP using HNS OutboundNAT policy. |[win-bridge](https://www.cni.dev/plugins/current/main/win-bridge/), [Azure-CNI](https://github.com/Azure/azure-container-networking/blob/master/docs/cni.md), [Flannel host-gateway](https://github.com/flannel-io/flannel/blob/master/Documentation/backends.md#host-gw) uses win-bridge | win-bridge uses L2bridge network mode, connects containers to the underlay of hosts, offering best performance. Requires user-defined routes (UDR) for inter-node connectivity. |
56
-
| L2Tunnel | This is a special case of l2bridge, but only used on Azure. All packets are sent to the virtualization host where SDN policy is applied. | MAC rewritten, IP visible on the underlay network |[Azure-CNI](https://github.com/Azure/azure-container-networking/blob/master/docs/cni.md)| Azure-CNI allows integration of containers with Azure vNET, and allows them to leverage the set of capabilities that [Azure Virtual Network provides](https://azure.microsoft.com/en-us/services/virtual-network/). For example, securely connect to Azure services or use Azure NSGs. See [azure-cni for some examples](https://docs.microsoft.com/azure/aks/concepts-network#azure-cni-advanced-networking)|
56
+
| L2Tunnel | This is a special case of l2bridge, but only used on Azure. All packets are sent to the virtualization host where SDN policy is applied. | MAC rewritten, IP visible on the underlay network |[Azure-CNI](https://github.com/Azure/azure-container-networking/blob/master/docs/cni.md)| Azure-CNI allows integration of containers with Azure vNET, and allows them to leverage the set of capabilities that [Azure Virtual Network provides](https://azure.microsoft.com/en-us/services/virtual-network/). For example, securely connect to Azure services or use Azure NSGs. See [azure-cni for some examples](https://learn.microsoft.com/azure/aks/concepts-network#azure-cni-advanced-networking)|
57
57
| Overlay | Containers are given a vNIC connected to an external vSwitch. Each overlay network gets its own IP subnet, defined by a custom IP prefix.The overlay network driver uses VXLAN encapsulation. | Encapsulated with an outer header. |[win-overlay](https://www.cni.dev/plugins/current/main/win-overlay/), [Flannel VXLAN](https://github.com/flannel-io/flannel/blob/master/Documentation/backends.md#vxlan) (uses win-overlay) | win-overlay should be used when virtual container networks are desired to be isolated from underlay of hosts (e.g. for security reasons). Allows for IPs to be re-used for different overlay networks (which have different VNID tags) if you are restricted on IPs in your datacenter. This option requires [KB4489899](https://support.microsoft.com/help/4489899) on Windows Server 2019. |
58
58
| Transparent (special use case for [ovn-kubernetes](https://github.com/openvswitch/ovn-kubernetes)) | Requires an external vSwitch. Containers are attached to an external vSwitch which enables intra-pod communication via logical networks (logical switches and routers). | Packet is encapsulated either via [GENEVE](https://datatracker.ietf.org/doc/draft-gross-geneve/) or [STT](https://datatracker.ietf.org/doc/draft-davie-stt/) tunneling to reach pods which are not on the same host. <br/> Packets are forwarded or dropped via the tunnel metadata information supplied by the ovn network controller. <br/> NAT is done for north-south communication. |[ovn-kubernetes](https://github.com/openvswitch/ovn-kubernetes)|[Deploy via ansible](https://github.com/openvswitch/ovn-kubernetes/tree/master/contrib). Distributed ACLs can be applied via Kubernetes policies. IPAM support. Load-balancing can be achieved without kube-proxy. NATing is done without using iptables/netsh. |
59
59
| NAT (*not used in Kubernetes*) | Containers are given a vNIC connected to an internal vSwitch. DNS/DHCP is provided using an internal component called [WinNAT](https://techcommunity.microsoft.com/t5/virtualization/windows-nat-winnat-capabilities-and-limitations/ba-p/382303)| MAC and IP is rewritten to host MAC/IP. |[nat](https://github.com/Microsoft/windows-container-networking/tree/master/plugins/nat)| Included here for completeness |
@@ -91,7 +91,7 @@ The following IPAM options are supported on Windows:
*[Windows Server IPAM](https://docs.microsoft.com/windows-server/networking/technologies/ipam/ipam-top) (fallback option if no IPAM is set)
94
+
*[Windows Server IPAM](https://learn.microsoft.com/windows-server/networking/technologies/ipam/ipam-top) (fallback option if no IPAM is set)
95
95
96
96
## Direct Server Return (DSR) {#dsr}
97
97
@@ -117,7 +117,7 @@ In a cluster that includes Windows nodes, you can use the following types of Ser
117
117
*`ExternalName`
118
118
119
119
Windows container networking differs in some important ways from Linux networking.
120
-
The [Microsoft documentation for Windows Container Networking](https://docs.microsoft.com/en-us/virtualization/windowscontainers/container-networking/architecture)
120
+
The [Microsoft documentation for Windows Container Networking](https://learn.microsoft.com/en-us/virtualization/windowscontainers/container-networking/architecture)
121
121
provides additional details and background.
122
122
123
123
On Windows, you can use the following settings to configure Services and load
Kubernetes allows 39 volumes to be attached to a Node.
61
61
62
-
* On Azure, up to 64 disks can be attached to a node, depending on the node type. For more details, refer to [Sizes for virtual machines in Azure](https://docs.microsoft.com/en-us/azure/virtual-machines/windows/sizes).
62
+
* On Azure, up to 64 disks can be attached to a node, depending on the node type. For more details, refer to [Sizes for virtual machines in Azure](https://learn.microsoft.com/en-us/azure/virtual-machines/windows/sizes).
63
63
64
64
* If a CSI storage driver advertises a maximum number of volumes for a Node (using `NodeGetInfo`), the {{< glossary_tooltip text="kube-scheduler" term_id="kube-scheduler" >}} honors that limit.
65
65
Refer to the [CSI specifications](https://github.com/container-storage-interface/spec/blob/master/spec.md#nodegetinfo) for details.
0 commit comments