diff --git a/_partials/getting-started/_cluster_observability.mdx b/_partials/getting-started/_cluster_observability.mdx index 43ba13bede..e7b9a211c8 100644 --- a/_partials/getting-started/_cluster_observability.mdx +++ b/_partials/getting-started/_cluster_observability.mdx @@ -12,6 +12,6 @@ environments. Several are av you can use to add additional monitoring capabilities to your cluster. Refer to the -guide to learn how to deploy a monitoring stack using the open-source tool +guide to learn how to deploy a monitoring stack using the open source tool [Prometheus](https://prometheus.io/docs/introduction/overview/) and how to configure a host cluster to forward metrics to the monitoring stack. \ No newline at end of file diff --git a/docs/deprecated/automation/palette-cli/commands/validator.md b/docs/deprecated/automation/palette-cli/commands/validator.md index b87f490ba2..b4a0dd2abd 100644 --- a/docs/deprecated/automation/palette-cli/commands/validator.md +++ b/docs/deprecated/automation/palette-cli/commands/validator.md @@ -7,7 +7,7 @@ sidebar_position: 50 tags: ["palette-cli"] --- -The Palette CLI has built-in support for the open-source [Validator](https://github.com/validator-labs/validator) +The Palette CLI has built-in support for the open source [Validator](https://github.com/validator-labs/validator) framework and its plugins ecosystem. You can use the Validator to verify your environment is ready for an installation of self-hosted Palette, VerteX, or for deployment of Kubernetes clusters through Palette. diff --git a/docs/deprecated/clusters/edge/edgeforge-workflow/build-images.md b/docs/deprecated/clusters/edge/edgeforge-workflow/build-images.md index f03f1ac869..035a98b969 100644 --- a/docs/deprecated/clusters/edge/edgeforge-workflow/build-images.md +++ b/docs/deprecated/clusters/edge/edgeforge-workflow/build-images.md @@ -209,7 +209,7 @@ the edge location. :::info You can use several software tools to create a bootable USB drive, such as [balenaEtcher](https://www.balena.io/etcher). -For a PXE server, there are open-source projects such as [Fog](https://fogproject.org/download.php) or +For a PXE server, there are open source projects such as [Fog](https://fogproject.org/download.php) or [Windows Deployment Services](https://learn.microsoft.com/en-us/windows/deployment/wds-boot-support) for Windows. ::: diff --git a/docs/deprecated/integrations/azure-cni.md b/docs/deprecated/integrations/azure-cni.md index 98f7a38fe7..3530c018e8 100644 --- a/docs/deprecated/integrations/azure-cni.md +++ b/docs/deprecated/integrations/azure-cni.md @@ -44,7 +44,7 @@ wider manifest that also creates a deployment or service. Palette leverages two - **azure**: Azure's own implementation, called Azure Network Policy. -- **calico**: An open-source network and network security solution founded by [Tigera](https://www.tigera.io/). +- **calico**: An open source network and network security solution founded by [Tigera](https://www.tigera.io/). Palette users can choose any one of the above Network Policies and provide it to the pack YAML file as `networkPolicy` as given below: diff --git a/docs/deprecated/integrations/byoos.md b/docs/deprecated/integrations/byoos.md index 42179c8c9c..1b20d1534b 100644 --- a/docs/deprecated/integrations/byoos.md +++ b/docs/deprecated/integrations/byoos.md @@ -18,7 +18,7 @@ needs. Using your custom OS provides several benefits, including the ability to control your own dependencies, improve performance, and ensure compatibility with your existing applications. With BYOOS, you can choose the OS that best fits -your needs, whether it's a commercial or open-source distribution, and integrate it with your Kubernetes clusters. The +your needs, whether it's a commercial or open source distribution, and integrate it with your Kubernetes clusters. The BYOOS pack can be used with both Edge and non-Edge environments. ## Versions Supported diff --git a/docs/deprecated/integrations/calico.md b/docs/deprecated/integrations/calico.md index 3ec0a4370c..c805970e9a 100644 --- a/docs/deprecated/integrations/calico.md +++ b/docs/deprecated/integrations/calico.md @@ -14,7 +14,7 @@ Palette Network Pack(s) helps provision resources for setting up Cluster network Kubernetes network model can be found [here](https://kubernetes.io/docs/concepts/cluster-administration/networking/#the-kubernetes-network-model). -[Project Calico](http://docs.projectcalico.org/) is an open-source container networking provider and network policy +[Project Calico](http://docs.projectcalico.org/) is an open source container networking provider and network policy engine. Calico provides highly scalable networking and network policy solution for connecting Kubernetes pods based on the same diff --git a/docs/deprecated/integrations/cilium-tetragon.md b/docs/deprecated/integrations/cilium-tetragon.md index e70e033c73..91b8950df6 100644 --- a/docs/deprecated/integrations/cilium-tetragon.md +++ b/docs/deprecated/integrations/cilium-tetragon.md @@ -12,7 +12,7 @@ tags: ["packs", "cilium-tetragon", "monitoring"] [Tetragon](https://github.com/cilium/tetragon) is an eBPF based security observability and runtime enforcement. eBPF is used to safely and efficiently extend the kernel's capabilities without requiring changing the kernel source code or -loading kernel modules. Tetragon is a Cilium community open-source project that enables profound visibility with +loading kernel modules. Tetragon is a Cilium community open source project that enables profound visibility with filtering and aggregation with the eBPF collector support to deliver visibility at depth with minimal overhead. Palette supports Cilium Tetragon as an add-on pack for monitoring services. Refer to the diff --git a/docs/deprecated/integrations/cilium.md b/docs/deprecated/integrations/cilium.md index f77a25ff0d..5e33c86324 100644 --- a/docs/deprecated/integrations/cilium.md +++ b/docs/deprecated/integrations/cilium.md @@ -14,7 +14,7 @@ Palette Network Pack(s) helps provision resources for setting up Cluster network network model design goals visit [here](https://kubernetes.io/docs/concepts/cluster-administration/networking/#the-kubernetes-network-model). -Palette supports **Cilium**, an open-source software for securing and observing network connectivity between +Palette supports **Cilium**, an open source software for securing and observing network connectivity between cloud-native container workloads. Cilium is underpinned by a Linux Kernel technology called eBPF, to enable dynamic and strong security visibility and control logic within Linux. As eBPF runs within the Linux Kernel, Cilium security policies are applied and updated independent of the application code or container configuration. diff --git a/docs/deprecated/integrations/harbor-edge.md b/docs/deprecated/integrations/harbor-edge.md index 340c99c834..30b8e61c86 100644 --- a/docs/deprecated/integrations/harbor-edge.md +++ b/docs/deprecated/integrations/harbor-edge.md @@ -10,7 +10,7 @@ logoUrl: "https://registry.spectrocloud.com/v1/harbor/blobs/sha256:5cf19a83449d4 tags: ["packs", "harbor-edge-native-config", "system-app"] --- -Harbor is an open-source registry that secures artifacts with policies and role-based access control. You can install +Harbor is an open source registry that secures artifacts with policies and role-based access control. You can install Harbor on your Edge clusters and use it to store all the images used by the cluster, including your provider images and all packs used by your cluster. After the initial download, the cluster can pull images from Harbor instead of an external registry, allowing your cluster to reboot containers or add new nodes without a connection to the external diff --git a/docs/deprecated/integrations/konvoy.md b/docs/deprecated/integrations/konvoy.md index fe9f805e7e..a5ab8ecbba 100644 --- a/docs/deprecated/integrations/konvoy.md +++ b/docs/deprecated/integrations/konvoy.md @@ -10,7 +10,7 @@ logoUrl: "https://registry.spectrocloud.com/v1/k8s-dashboard/blobs/sha256:2de5d8 tags: ["packs", "konvoy", "kubernetes"] --- -[Konvoy](https://d2iq.com/products/konvoy) is a Kubernetes distribution by D2iQ. It is built on pure open-source +[Konvoy](https://d2iq.com/products/konvoy) is a Kubernetes distribution by D2iQ. It is built on pure open source Kubernetes and includes a full suite of integrated and supported best-of-breed Day-2 platform applications for an out-of-the-box, production-ready experience. diff --git a/docs/deprecated/integrations/kubehunter.md b/docs/deprecated/integrations/kubehunter.md index ea72bf5784..c15e035517 100644 --- a/docs/deprecated/integrations/kubehunter.md +++ b/docs/deprecated/integrations/kubehunter.md @@ -10,7 +10,7 @@ logoUrl: "https://registry.dev.spectrocloud.com/v1/kubehunter/blobs/sha256:6b6b9 tags: ["packs", "kube-hunter", "security"] --- -Kube Hunter is an open-source tool that hunts for security issues in your Kubernetes clusters. It’s designed to increase +Kube Hunter is an open source tool that hunts for security issues in your Kubernetes clusters. It’s designed to increase awareness and visibility of the security controls in Kubernetes environments. Kube-hunter probes a domain or address range for open Kubernetes-related ports, and tests for any configuration issues that leave your cluster exposed to attackers. It can be run on a machine in the cluster, and select the option to probe all the local network interfaces. diff --git a/docs/deprecated/integrations/kubernetes-edge.md b/docs/deprecated/integrations/kubernetes-edge.md index 83d3a5452f..1e7fa1966d 100644 --- a/docs/deprecated/integrations/kubernetes-edge.md +++ b/docs/deprecated/integrations/kubernetes-edge.md @@ -28,12 +28,12 @@ Review our [Maintenance Policy](maintenance-policy.md) to learn about pack updat ## What is PXK-E? -PXK-E is a customized version of the open-source Cloud Native Computing Foundation (CNCF) distribution of Kubernetes. +PXK-E is a customized version of the open source Cloud Native Computing Foundation (CNCF) distribution of Kubernetes. This Kubernetes distribution is customized and optimized for edge computing environments and can be deployed through Palette. PXK-E is the Kubernetes distribution Palette defaults to when deploying Edge clusters. -PXK-E differs from the upstream open-source Kubernetes version by optimizing for operations in an edge computing -environment. PXK-E also differentiates itself by using the Kairos open-source project as the base operating system (OS). +PXK-E differs from the upstream open source Kubernetes version by optimizing for operations in an edge computing +environment. PXK-E also differentiates itself by using the Kairos open source project as the base operating system (OS). PXK-E’s use of Kairos means the OS is immutable, which significantly improves the security posture and reduces potential attack surfaces. @@ -50,13 +50,13 @@ PXK-E manages the underlying OS and the Kubernetes layer together, which reduces maintaining two separate components. PXK-E allows you to apply different flavors of container storage interfaces (CSI) and container network interfaces -(CNI). Other open-source Kubernetes distributions such as MicroK8s, RKE2, and K3s come with a default CSI and CNI. There +(CNI). Other open source Kubernetes distributions such as MicroK8s, RKE2, and K3s come with a default CSI and CNI. There is additional complexity and overhead when you want to consume different interface plugins with traditional Kubernetes distributions. Using PXK-E, you select the interface plugin you want to apply without additional overhead and complexity. There are no changes to the Kubernetes source code used in PXK-E, and it follows the same versioning schema as the -upstream open-source Kubernetes distribution. +upstream open source Kubernetes distribution. :::info @@ -107,7 +107,7 @@ four months. Once we stop supporting the minor version, we initiate the deprecat | `cluster.config.initConfiguration.nodeRegistration.kubeletExtraArgs` | This parameter contains extra arguments for kubelet during node registration, such as setting feature gates, protecting kernel defaults, and disabling the read-only port. | | `pack.palette.config.oidc.identityProvider` | Dynamically enabled OpenID Connect (OIDC) Identity Provider (IDP) setting based on your UI selection when you add the PXK-E pack to your profile. This parameter appears in the YAML file after you make a selection. Refer to [Configure OIDC Identity Provider](#configure-custom-oidc). | -You can add cloud-init stages exposed by [Kairos](https://kairos.io/docs/architecture/cloud-init/), an open-source +You can add cloud-init stages exposed by [Kairos](https://kairos.io/docs/architecture/cloud-init/), an open source project. For more information, check out the [Cloud Init Stages](../clusters/edge/edge-configuration/cloud-init.md) reference. @@ -492,7 +492,7 @@ In this example, Palette is used as the IDP, and all users in the `dev-east-2` w | `cluster.config.initConfiguration.nodeRegistration.kubeletExtraArgs` | This parameter contains extra arguments for kubelet during node registration, such as setting feature gates, protecting kernel defaults, and disabling the read-only port. | | `pack.palette.config.oidc.identityProvider` | Dynamically enabled OpenID Connect (OIDC) Identity Provider (IDP) setting based on your UI selection when you add the PXK-E pack to your profile. This parameter appears in the YAML file after you make a selection. Refer to [Configure OIDC Identity Provider](#configure-custom-oidc). | -You can add cloud-init stages exposed by [Kairos](https://kairos.io/docs/architecture/cloud-init/), an open-source +You can add cloud-init stages exposed by [Kairos](https://kairos.io/docs/architecture/cloud-init/), an open source project. For more information, check out the [Cloud Init Stages](../clusters/edge/edge-configuration/cloud-init.md) reference. @@ -877,7 +877,7 @@ In this example, Palette is used as the IDP, and all users in the `dev-east-2` w | `cluster.config.initConfiguration.nodeRegistration.kubeletExtraArgs` | This parameter contains extra arguments for kubelet during node registration, such as setting feature gates, protecting kernel defaults, and disabling the read-only port. | | `pack.palette.config.oidc.identityProvider` | Dynamically enabled OpenID Connect (OIDC) Identity Provider (IDP) setting based on your UI selection when you add the PXK-E pack to your profile. This parameter appears in the YAML file after you make a selection. Refer to [Configure OIDC Identity Provider](#configure-custom-oidc). | -You can add cloud-init stages exposed by [Kairos](https://kairos.io/docs/architecture/cloud-init/), an open-source +You can add cloud-init stages exposed by [Kairos](https://kairos.io/docs/architecture/cloud-init/), an open source project. For more information, check out the [Cloud Init Stages](../clusters/edge/edge-configuration/cloud-init.md) reference. diff --git a/docs/deprecated/integrations/kubernetes.md b/docs/deprecated/integrations/kubernetes.md index 8fb6195aae..4a9bb53c2a 100644 --- a/docs/deprecated/integrations/kubernetes.md +++ b/docs/deprecated/integrations/kubernetes.md @@ -31,25 +31,25 @@ Review our [Maintenance Policy](maintenance-policy.md) to learn about pack updat ## What is PXK? -Palette eXtended Kubernetes (PXK) is a recompiled version of the open-source Cloud Native Computing Foundation (CNCF) +Palette eXtended Kubernetes (PXK) is a recompiled version of the open source Cloud Native Computing Foundation (CNCF) distribution of Kubernetes. This Kubernetes version can be deployed through Palette to all major infrastructure providers, public cloud providers, and private data center providers. This is the default distribution when deploying a Kubernetes cluster through Palette. You have the option to choose other Kubernetes distributions, such as MicroK8s, Konvoy, and more, should you want to consume a different Kubernetes distribution. -PXK is different from the upstream open-source Kubernetes version primarily because of the carefully reviewed and +PXK is different from the upstream open source Kubernetes version primarily because of the carefully reviewed and applied hardening of the operating system (OS) and Kubernetes. The hardening ranges from removing unused kernel modules to using an OS configuration that follows industry best practices. Our recompiled Kubernetes configuration addresses common Kubernetes deployment security pitfalls and implements industry best practices. A benefit of Palette when used with PXK is the ability to apply different flavors of container storage interface (CSI) -plugins and container network interface (CNI) plugins. Other open-source Kubernetes distributions, such as MicroK8s, +plugins and container network interface (CNI) plugins. Other open source Kubernetes distributions, such as MicroK8s, RKE2, and K3s, come with a default CSI and CNI. Additional complexity and overhead are required from you to enable different interfaces. PXK supports the ability to select other interface plugins out of the box without any additional overhead or complexity needed from your side. -There are no changes to the Kubernetes source code and we also follow the same versioning schema as the upstream -open-source Kubernetes distribution. +There are no changes to the Kubernetes source code and we also follow the same versioning schema as the upstream open +source Kubernetes distribution. :::info diff --git a/docs/deprecated/integrations/ngrok.md b/docs/deprecated/integrations/ngrok.md index 10e6755471..0afafac347 100644 --- a/docs/deprecated/integrations/ngrok.md +++ b/docs/deprecated/integrations/ngrok.md @@ -13,7 +13,7 @@ tags: ["packs", "ngrok", "network", "kubernetes"] The ngrok [Ingress Controller for Kubernetes](https://github.com/ngrok/kubernetes-ingress-controller) adds public and secure ingress traffic to Kubernetes applications. Enforce authentication and authorization at the edge with ngrok, preventing unauthorized traffic from ever reaching your cluster and rogue webhooks from looping and spamming your -service. This open-source +service. This open source [Ingress Controller](https://kubernetes.io/docs/concepts/services-networking/ingress-controllers) works with Palette to provide ingress to your applications, APIs, or other resources while also offloading network ingress and middleware execution to ngrok's platform. Balance traffic between multiple redundant Points of Presence (PoPs) in ngrok’s global diff --git a/docs/deprecated/integrations/prometheus-agent.md b/docs/deprecated/integrations/prometheus-agent.md index f1404b62de..49c59e37d0 100644 --- a/docs/deprecated/integrations/prometheus-agent.md +++ b/docs/deprecated/integrations/prometheus-agent.md @@ -10,7 +10,7 @@ logoUrl: "https://registry.spectrocloud.com/v1/prometheus-operator/blobs/sha256: tags: ["packs", "prometheus-agent", "monitoring"] --- -Prometheus is an open-source monitoring and alerting system that is designed to collect and analyze metrics from various +Prometheus is an open source monitoring and alerting system that is designed to collect and analyze metrics from various systems and services. Prometheus is built around a time-series database that stores metrics data. It uses a flexible querying language called diff --git a/docs/deprecated/integrations/prometheus-operator.md b/docs/deprecated/integrations/prometheus-operator.md index 4dc1dc506d..b3f8df7ee6 100644 --- a/docs/deprecated/integrations/prometheus-operator.md +++ b/docs/deprecated/integrations/prometheus-operator.md @@ -10,7 +10,7 @@ logoUrl: "https://registry.spectrocloud.com/v1/prometheus-operator/blobs/sha256: tags: ["packs", "prometheus-operator", "monitoring"] --- -Prometheus is an open-source monitoring system that is designed to collect and analyze metrics from various sources, +Prometheus is an open source monitoring system that is designed to collect and analyze metrics from various sources, such as applications, servers, and networks. It is widely used in the DevOps world to monitor the health and performance of applications and infrastructure. Prometheus stores metrics in a time-series database and provides a query language for analyzing the data. It also includes a powerful alerting system that can notify operators when thresholds are @@ -161,7 +161,7 @@ Toggle the **Enable** button to enable the use of Ingress. #### Thanos SideCar -[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open-source system for running large-scale, +[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open source system for running large-scale, distributed, and highly available Prometheus setups. Thanos allows Prometheus to store data for extended periods in object storage, such as Amazon S3 or Google Cloud Storage, instead of a local disk. This enables Prometheus to scale horizontally without the risk of using up local storage space. @@ -382,7 +382,7 @@ Toggle the **Enable** button to enable the use of Ingress. #### Thanos SideCar -[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open-source system for running large-scale, +[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open source system for running large-scale, distributed, and highly available Prometheus setups. Thanos allows Prometheus to store data for extended periods in object storage, such as Amazon S3 or Google Cloud Storage, instead of a local disk. This enables Prometheus to scale horizontally without the risk of using up local storage space. @@ -603,7 +603,7 @@ Toggle the **Enable** button to enable the use of Ingress. #### Thanos SideCar -[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open-source system for running large-scale, +[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open source system for running large-scale, distributed, and highly available Prometheus setups. Thanos allows Prometheus to store data for extended periods in object storage, such as Amazon S3 or Google Cloud Storage, instead of a local disk. This enables Prometheus to scale horizontally without the risk of using up local storage space. @@ -824,7 +824,7 @@ Toggle the **Enable** button to enable the use of Ingress. #### Thanos SideCar -[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open-source system for running large-scale, +[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open source system for running large-scale, distributed, and highly available Prometheus setups. Thanos allows Prometheus to store data for extended periods in object storage, such as Amazon S3 or Google Cloud Storage, instead of a local disk. This enables Prometheus to scale horizontally without the risk of using up local storage space. @@ -1007,7 +1007,7 @@ Toggle the **Enable** button to enable the use of Ingress. #### Thanos SideCar -[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open-source system for running large-scale, +[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open source system for running large-scale, distributed, and highly available Prometheus setups. Thanos allows Prometheus to store data for extended periods in object storage, such as Amazon S3 or Google Cloud Storage, instead of a local disk. This enables Prometheus to scale horizontally without the risk of using up local storage space. @@ -1148,7 +1148,7 @@ Toggle the **Enable** button to enable the use of Ingress. #### Thanos SideCar -[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open-source system for running large-scale, +[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open source system for running large-scale, distributed, and highly available Prometheus setups. Thanos allows Prometheus to store data for extended periods in object storage, such as Amazon S3 or Google Cloud Storage, instead of a local disk. This enables Prometheus to scale horizontally without the risk of using up local storage space. diff --git a/docs/deprecated/integrations/rook-ceph.md b/docs/deprecated/integrations/rook-ceph.md index e36eca9b65..027c4e6f13 100644 --- a/docs/deprecated/integrations/rook-ceph.md +++ b/docs/deprecated/integrations/rook-ceph.md @@ -1,7 +1,7 @@ --- sidebar_label: "rook-ceph" title: "Rook Ceph" -description: "Rook is an open-source cloud-native storage orchestrator that provides the platform, framework, and support for Ceph +description: "Rook is an open source cloud-native storage orchestrator that provides the platform, framework, and support for Ceph storage to natively integrate with cloud-native environments. Ceph is a distributed storage system that provides file, block, and object storage and is deployed in large-scale production clusters. This page talks about how to use the Rook Ceph storage pack in Spectro Cloud" hide_table_of_contents: true @@ -13,7 +13,7 @@ logoUrl: tags: ["packs", "rook-ceph", "storage"] --- -Rook is an open-source cloud-native storage orchestrator that provides the platform, framework, and support for Ceph +Rook is an open source cloud-native storage orchestrator that provides the platform, framework, and support for Ceph storage to natively integrate with cloud-native environments. Ceph is a distributed storage system that provides file, block, and object storage and is deployed in large-scale production clusters. diff --git a/docs/deprecated/integrations/trident.md b/docs/deprecated/integrations/trident.md index f4f26a5cff..ebbccb6291 100644 --- a/docs/deprecated/integrations/trident.md +++ b/docs/deprecated/integrations/trident.md @@ -10,7 +10,7 @@ logoUrl: "https://registry.spectrocloud.com/v1/csi-trident/blobs/sha256:d4dd2ecf tags: ["packs", "trident", "storage"] --- -Astra Trident, is an open-source project backed and maintained by [NetApp](https://www.netapp.com/) and is designed to +Astra Trident, is an open source project backed and maintained by [NetApp](https://www.netapp.com/) and is designed to provide persistence storage to containerized applications using industry-standard interfaces, such as the Container Storage Interface (CSI). diff --git a/docs/deprecated/integrations/ubuntu.md b/docs/deprecated/integrations/ubuntu.md index 4b2e2905b6..6348035cfb 100644 --- a/docs/deprecated/integrations/ubuntu.md +++ b/docs/deprecated/integrations/ubuntu.md @@ -10,7 +10,7 @@ logoUrl: "https://registry.spectrocloud.com/v1/ubuntu-vsphere/blobs/sha256:09a72 tags: ["packs", "ubuntu", "operating system"] --- -[Ubuntu](https://ubuntu.com) is an open-source operating system based on the Linux kernel. Developed by Canonical Ltd., +[Ubuntu](https://ubuntu.com) is an open source operating system based on the Linux kernel. Developed by Canonical Ltd., Ubuntu is a popular choice for desktops, servers, and cloud environments due to its ease of use, robustness, and versatility. diff --git a/docs/docs-content/architecture/grps-proxy.md b/docs/docs-content/architecture/grps-proxy.md index cdd72bd2b6..8c71525225 100644 --- a/docs/docs-content/architecture/grps-proxy.md +++ b/docs/docs-content/architecture/grps-proxy.md @@ -10,7 +10,7 @@ sidebar_custom_props: --- Palette uses [gRPC](https://grpc.io) to communicate between the management platform and the workload cluster. gRPC is a -high-performance, open-source universal Remote Procedure Call (RPC) framework. It is used to build distributed +high-performance, open source universal Remote Procedure Call (RPC) framework. It is used to build distributed applications and services. gRPC is based on HTTP/2 protocol and uses protocol buffers ([protobuf](https://protobuf.dev/)) as the underlying data serialization framework. @@ -125,7 +125,7 @@ to some vendors' documentation that addresses HTTP/2 and gRPC support. ### Squid Proxy With SSL Bump -A common open-source proxy server is [Squid](https://wiki.squid-cache.org). Squid is a caching proxy for the Web +A common open source proxy server is [Squid](https://wiki.squid-cache.org). Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Squid supports gRPC but requires additional configuration. gRPC with SSL bump does not work with all versions of Squid, such as versions 5 and 6. Review the [SSL Bump issue](https://bugs.squid-cache.org/show_bug.cgi?id=5245) to learn more about the issue and track the progress diff --git a/docs/docs-content/automation/crossplane/crossplane.md b/docs/docs-content/automation/crossplane/crossplane.md index 1bc71d2633..c04a5a36d4 100644 --- a/docs/docs-content/automation/crossplane/crossplane.md +++ b/docs/docs-content/automation/crossplane/crossplane.md @@ -7,7 +7,7 @@ sidebar_position: 0 tags: ["crossplane", "iac", "automation", "infrastructure as code"] --- -Palette supports the open-source Cloud Native Computing Foundation (CNCF) project +Palette supports the open source Cloud Native Computing Foundation (CNCF) project [Crossplane](https://www.crossplane.io/). Crossplane transforms Kubernetes clusters into universal control planes, extending the Kubernetes API and enabling infrastructure resource provisioning and management across major infrastructure providers. diff --git a/docs/docs-content/automation/palette-cli/commands/ec.md b/docs/docs-content/automation/palette-cli/commands/ec.md index cf39ced4e3..1472ac8682 100644 --- a/docs/docs-content/automation/palette-cli/commands/ec.md +++ b/docs/docs-content/automation/palette-cli/commands/ec.md @@ -164,7 +164,7 @@ configuration for the operating system that will be used to install the Enterpri ## Validate Environment You can use the `--validate` flag to scan the environment and conduct validation before the Enterprise Cluster is -installed. The validation uses the open-source project [Validator](https://github.com/validator-labs/validator) to check +installed. The validation uses the open source project [Validator](https://github.com/validator-labs/validator) to check for the following prerequisites: - The required vSphere permissions and privileges are available for the provided user. diff --git a/docs/docs-content/byoos/byoos.md b/docs/docs-content/byoos/byoos.md index 26348a6dde..15fd27c8d0 100644 --- a/docs/docs-content/byoos/byoos.md +++ b/docs/docs-content/byoos/byoos.md @@ -15,7 +15,7 @@ specific requirements. This feature is especially useful for organizations with compliance, or specific hardware configurations. The ability to bring your own OS to Palette gives you more control over dependencies in your environment and ensures -compatibility with your existing applications. The OS you bring can be commercial or an open-source distribution. +compatibility with your existing applications. The OS you bring can be commercial or an open source distribution. ## Get Started diff --git a/docs/docs-content/clusters/cluster-management/backup-restore/backup-restore.md b/docs/docs-content/clusters/cluster-management/backup-restore/backup-restore.md index 2ebbe12cdc..ee8a318c0a 100644 --- a/docs/docs-content/clusters/cluster-management/backup-restore/backup-restore.md +++ b/docs/docs-content/clusters/cluster-management/backup-restore/backup-restore.md @@ -64,7 +64,7 @@ object storage solutions as backup locations. :::info -Palette uses open-source Velero to provide backup and restore capabilities. You can learn more about Velero by checking +Palette uses open source Velero to provide backup and restore capabilities. You can learn more about Velero by checking out the Velero [Restore Reference](https://velero.io/docs/main/restore-reference/) and [Backup Reference](https://velero.io/docs/main/backup-reference/). diff --git a/docs/docs-content/clusters/cluster-management/backup-restore/create-cluster-backup.md b/docs/docs-content/clusters/cluster-management/backup-restore/create-cluster-backup.md index 89005539ba..fc0b82227d 100644 --- a/docs/docs-content/clusters/cluster-management/backup-restore/create-cluster-backup.md +++ b/docs/docs-content/clusters/cluster-management/backup-restore/create-cluster-backup.md @@ -15,7 +15,7 @@ the source cluster. :::info -Palette uses open-source Velero to provide backup and restore capabilities. You can learn more about Velero by checking +Palette uses open source Velero to provide backup and restore capabilities. You can learn more about Velero by checking out their [Restore Reference](https://velero.io/docs/main/restore-reference) and [Backup Reference](https://velero.io/docs/main/backup-reference). diff --git a/docs/docs-content/clusters/cluster-management/compliance-scan.md b/docs/docs-content/clusters/cluster-management/compliance-scan.md index 3b625e1bf5..0efbcf3c46 100644 --- a/docs/docs-content/clusters/cluster-management/compliance-scan.md +++ b/docs/docs-content/clusters/cluster-management/compliance-scan.md @@ -38,7 +38,7 @@ page for guidance on how to upload the conformance packs to the self-hosted OCI This scan examines the compliance of deployed Kubernetes security features against the CIS Kubernetes Benchmarks. CIS Kubernetes Benchmarks are consensus-driven security guidelines for the Kubernetes. Different releases of the CIS benchmark cover different releases of Kubernetes. By default, Kubernetes configuration security will determine the test -set based on the Kubernetes version running on the cluster being scanned. Internally, Palette leverages an open-source +set based on the Kubernetes version running on the cluster being scanned. Internally, Palette leverages an open source tool called KubeBench from Aqua Security to perform this scan. Scans are run against control plane and worker nodes of the Kubernetes cluster, and a combined report is made available on the UI. Users can filter the report to view only the control plane or worker results if required. @@ -53,7 +53,7 @@ and it is suggested to be tested manually. Kubernetes penetration testing scans Kubernetes-related open-ports for any configuration issues that can leave the tenant clusters exposed to attackers. It hunts for security issues in your Kubernetes clusters and increases awareness and visibility of the security controls in Kubernetes environments. The scan gives a full report on the cluster security -concerns. Internally Palette leverages an open-source tool called KubeHunter from Aqua Security to perform this scan. +concerns. Internally Palette leverages an open source tool called KubeHunter from Aqua Security to perform this scan. Scans are run in 2 modes, Internal and External. In the internal mode, tests are run against the internal endpoint of the API server, whereas, in external mode, the external public-facing endpoint is used for testing. A combined report of vulnerabilities found in both modes is shown on the Palette UI. Users can filter the report to view just the internal or @@ -64,7 +64,7 @@ external report if required. ## Conformance Testing Kubernetes conformance testing is about validating your Kubernetes configuration to ensure that they are conformant to -the CNCF specifications. Palette leverages an open-source tool called Sonobuoy to perform this scan. Automatically +the CNCF specifications. Palette leverages an open source tool called Sonobuoy to perform this scan. Automatically select a subset of relevant tests for execution based on the type of cloud (public, private) and the type of deployment infrastructure (IaaS, managed cloud service). Each test can take up to 2 hours to complete. If a cluster has a single worker node, a few tests may fail due to resources. For accurate assessment of conformance for distribution of @@ -100,7 +100,7 @@ and choose the desired SBOM format, scan scope, and an optional backup location. Palette will identify every unique container image within your chosen scope and generate an SBOM for that image. Palette also runs the SBOM through a vulnerability scanner to flag any Common Vulnerabilities and Exposures (CVEs). Palette -leverages two open-source tools from Anchore: [Syft](https://github.com/anchore/syft) for SBOM generation and +leverages two open source tools from Anchore: [Syft](https://github.com/anchore/syft) for SBOM generation and [Grype](https://github.com/anchore/grype) for vulnerability detection. Suppose you specify a [backup location](backup-restore/backup-restore.md). In that case, the SBOM for each image will be @@ -118,7 +118,7 @@ location setting. - [SPDX](https://github.com/spdx/spdx-spec/blob/v2.2/schemas/spdx-schema.json): A standard SBOM format widely used by organizations and governments. The SPDX format has been around longer than any other SBOM format. -- [CycloneDX](https://cyclonedx.org/specification/overview/): An open-source XML-based SBOM format that provides a +- [CycloneDX](https://cyclonedx.org/specification/overview/): An open source XML-based SBOM format that provides a standard representation of software components and their metadata. - Syft JSON: Syft's custom SBOM format. The Syft SBOM format contains the most metadata compared to the other SBOM diff --git a/docs/docs-content/clusters/cluster-management/monitoring/deploy-monitor-stack.md b/docs/docs-content/clusters/cluster-management/monitoring/deploy-monitor-stack.md index 5a560afb30..0b2b5350cf 100644 --- a/docs/docs-content/clusters/cluster-management/monitoring/deploy-monitor-stack.md +++ b/docs/docs-content/clusters/cluster-management/monitoring/deploy-monitor-stack.md @@ -8,7 +8,7 @@ sidebar_position: 0 tags: ["clusters", "cluster management", "monitoring"] --- -The monitoring stack you will deploy uses the open-source tool, +The monitoring stack you will deploy uses the open source tool, [Prometheus](https://prometheus.io/docs/introduction/overview/), to support your environment's monitoring requirements. The monitoring stack is a centralized server or aggregation spot to which all other clusters will forward metrics. The monitoring stack is a dedicated Kubernetes cluster for monitoring and metrics aggregation in your Palette environment. diff --git a/docs/docs-content/clusters/data-center/maas/architecture.md b/docs/docs-content/clusters/data-center/maas/architecture.md index 2362030fbb..31c5235e90 100644 --- a/docs/docs-content/clusters/data-center/maas/architecture.md +++ b/docs/docs-content/clusters/data-center/maas/architecture.md @@ -7,11 +7,11 @@ sidebar_position: 0 tags: ["data center", "maas", "architecture"] --- -Canonical MAAS is an open-source tool that lets you discover, commission, deploy and re-deploy operating systems to +Canonical MAAS is an open source tool that lets you discover, commission, deploy and re-deploy operating systems to physical servers. The following are some architectural highlights of bare-metal Kubernetes clusters that Palette deploys using Canonical MAAS. Refer to the PCG deployment options section below to learn more about PCG deployment. -- Palette integrates with MAAS through Spectro Cloud’s open-source Cloud Native Computing Foundation (CNCF) +- Palette integrates with MAAS through Spectro Cloud’s open source Cloud Native Computing Foundation (CNCF) [Cluster API provider](https://github.com/spectrocloud/cluster-api-provider-maas). Refer to the table below - Palette provides a cloud-like experience for deploying clusters on bare metal servers. The result is increased diff --git a/docs/docs-content/clusters/data-center/nutanix/architecture.md b/docs/docs-content/clusters/data-center/nutanix/architecture.md index 3b97e549ed..c6c8b37f37 100644 --- a/docs/docs-content/clusters/data-center/nutanix/architecture.md +++ b/docs/docs-content/clusters/data-center/nutanix/architecture.md @@ -8,7 +8,7 @@ tags: ["data center", "nutanix", "architecture"] --- [Nutanix](https://www.nutanix.com) is a private data center-based cloud that can be registered to Palette using -Palette's generic framework built upon the open-source Cluster API (CAPI) initiative. Nutanix offers a hyper-converged +Palette's generic framework built upon the open source Cluster API (CAPI) initiative. Nutanix offers a hyper-converged infrastructure (HCI) that combines storage, compute, and networking into a single integrated system. Below are key architectural highlights of Nutanix clusters provisioned through Palette. diff --git a/docs/docs-content/clusters/data-center/nutanix/nutanix.md b/docs/docs-content/clusters/data-center/nutanix/nutanix.md index 550abfd0d7..381f0a0986 100644 --- a/docs/docs-content/clusters/data-center/nutanix/nutanix.md +++ b/docs/docs-content/clusters/data-center/nutanix/nutanix.md @@ -8,7 +8,7 @@ tags: ["data center", "nutanix"] --- [Nutanix](https://www.nutanix.com/what-we-do) is a hyper-converged infrastructure platform that combines storage, -compute, and networking into a single integrated system. Palette provides a generic framework built upon the open-source +compute, and networking into a single integrated system. Palette provides a generic framework built upon the open source [Cluster API (CAPI)](https://cluster-api.sigs.k8s.io) initiative to support adding cloud providers. As a Tech Preview of implementing this framework, you can deploy Kubernetes clusters on Nutanix using Palette. Integration with Nutanix is achieved through a Self-hosted Private Cloud Gateway (PCG), which establishes a secure connection with Nutanix Prism diff --git a/docs/docs-content/clusters/edge/architecture.md b/docs/docs-content/clusters/edge/architecture.md index c5bc854768..78aed985c7 100644 --- a/docs/docs-content/clusters/edge/architecture.md +++ b/docs/docs-content/clusters/edge/architecture.md @@ -23,7 +23,7 @@ The following are architectural highlights of Palette-provisioned Edge native cl - Edge supports adding multiple devices to the site to form a multi-node Kubernetes cluster. - Operating system (OS) images are derived from immutable container-based OS images provided by the - [Kairos](http://kairos.io) open-source project. + [Kairos](http://kairos.io) open source project. - The installation is bootstrapped using a relatively small distribution-agnostic _Stylus_ installer image. The operating system and Kubernetes version are derived from cluster profile settings associated with the edge site and diff --git a/docs/docs-content/clusters/edge/edge-configuration/cloud-init.md b/docs/docs-content/clusters/edge/edge-configuration/cloud-init.md index 7cba2d5164..dbf183ff60 100644 --- a/docs/docs-content/clusters/edge/edge-configuration/cloud-init.md +++ b/docs/docs-content/clusters/edge/edge-configuration/cloud-init.md @@ -8,7 +8,7 @@ tags: ["edge"] --- Palette Edge supports all the cloud-init stages exposed by [Kairos](https://kairos.io/docs/architecture/cloud-init/) -both during installation and during cluster deployment. Kairos is an open-source project that is used to create +both during installation and during cluster deployment. Kairos is an open source project that is used to create immutable images, Kairos is a container layer that enables you to specify dependencies and create resources before locking down the image. diff --git a/docs/docs-content/clusters/edge/edge.md b/docs/docs-content/clusters/edge/edge.md index d0d6e0be34..85bb698196 100644 --- a/docs/docs-content/clusters/edge/edge.md +++ b/docs/docs-content/clusters/edge/edge.md @@ -47,7 +47,7 @@ computing is installed in the device along with the operating system and Kuberne :::info -Edge is built on top of the open-source project [Kairos](https://kairos.io), which provides a tamper-proof immutable +Edge is built on top of the open source project [Kairos](https://kairos.io), which provides a tamper-proof immutable operating system with zero downtime rolling upgrade. ::: diff --git a/docs/docs-content/clusters/edge/edgeforge-workflow/edgeforge-workflow.md b/docs/docs-content/clusters/edge/edgeforge-workflow/edgeforge-workflow.md index e2028c0c4b..36a97e8063 100644 --- a/docs/docs-content/clusters/edge/edgeforge-workflow/edgeforge-workflow.md +++ b/docs/docs-content/clusters/edge/edgeforge-workflow/edgeforge-workflow.md @@ -54,7 +54,7 @@ EdgeForge contains the following critical components: You can apply Center for Information System (CIS) hardening to the Edge artifacts with the `CIS_HARDENING` argument in your `.arg` file, which implements the guidelines and solutions provided by CIS to secure your systems automatically. For more information about available arguments in `.arg`, refer to -[Edge Artifacts Build Configuration](./palette-canvos/arg.md). The code for how we achieve CIS hardening is open-source, +[Edge Artifacts Build Configuration](./palette-canvos/arg.md). The code for how we achieve CIS hardening is open source, available in the [CanvOS repository](https://github.com/spectrocloud/CanvOS/tree/main/cis-harden). ### Edge Installer ISO diff --git a/docs/docs-content/clusters/edge/site-deployment/deploy-custom-registries/webhook-disable.md b/docs/docs-content/clusters/edge/site-deployment/deploy-custom-registries/webhook-disable.md index fb6a6a4169..1f3d33c660 100644 --- a/docs/docs-content/clusters/edge/site-deployment/deploy-custom-registries/webhook-disable.md +++ b/docs/docs-content/clusters/edge/site-deployment/deploy-custom-registries/webhook-disable.md @@ -171,7 +171,7 @@ provides an example that shows how you might customize the image pull behavior o If you are using public registries that do not require authentication, you can skip this step. If your registries require authentication, you will need to provide credentials to enable image pulls. This example uses -an open-source generic Kubernetes credentials provider to provide the resources. There are other resources that you can +an open source generic Kubernetes credentials provider to provide the resources. There are other resources that you can take advantage of to provide registry credentials, including using a `registry.yaml` file in [K3s](https://docs.k3s.io/installation/private-registry) or [RKE2](https://docs.rke2.io/install/containerd_registry_configuration). However, the advantage of the approach used in diff --git a/docs/docs-content/clusters/edge/site-deployment/site-installation/site-user-data.md b/docs/docs-content/clusters/edge/site-deployment/site-installation/site-user-data.md index d2baea94a8..4369f4a6fa 100644 --- a/docs/docs-content/clusters/edge/site-deployment/site-installation/site-user-data.md +++ b/docs/docs-content/clusters/edge/site-deployment/site-installation/site-user-data.md @@ -105,7 +105,7 @@ to a bootable device, such as a USB stick. :::info You can use several software tools to create a bootable USB drive, such as - [balenaEtcher](https://www.balena.io/etcher). For a PXE server, there are open-source projects such as + [balenaEtcher](https://www.balena.io/etcher). For a PXE server, there are open source projects such as [Fog](https://fogproject.org/download.php) or [Windows Deployment Services](https://learn.microsoft.com/en-us/windows/deployment/wds-boot-support) for Windows. diff --git a/docs/docs-content/devx/services/service-listings/mysql.md b/docs/docs-content/devx/services/service-listings/mysql.md index 514e503f84..670864587a 100644 --- a/docs/docs-content/devx/services/service-listings/mysql.md +++ b/docs/docs-content/devx/services/service-listings/mysql.md @@ -10,7 +10,7 @@ logoUrl: "https://registry.dev.spectrocloud.com/v1/mysql-operator/blobs/sha256:2 tags: ["devx", "app mode", "pde", "databases"] --- -[MySQL](https://mysql.com/) is an open-source relational database management system commonly used in web applications +[MySQL](https://mysql.com/) is an open source relational database management system commonly used in web applications and other software that requires a database. It is known for its reliability, ease of use, and flexibility. MySQL is covered under the GNU license and uses structured query language (SQL) to manage data with the following properties: diff --git a/docs/docs-content/devx/services/service-listings/postgresql-db.md b/docs/docs-content/devx/services/service-listings/postgresql-db.md index 0236d756ed..74a9919bcc 100644 --- a/docs/docs-content/devx/services/service-listings/postgresql-db.md +++ b/docs/docs-content/devx/services/service-listings/postgresql-db.md @@ -10,7 +10,7 @@ logoUrl: "https://upload.wikimedia.org/wikipedia/commons/2/29/Postgresql_elephan tags: ["devx", "app mode", "pde", "databases"] --- -Palette supports [Postgres](https://www.postgresql.org/) as a database service. Postgres is a powerful open-source +Palette supports [Postgres](https://www.postgresql.org/) as a database service. Postgres is a powerful open source object-relational database system with over 35 years of active deployment with a strong reputation for reliability, feature robustness, and performance. Postgres uses and extends the SQL language combined with many features that safely store and scale the most complicated data workloads. diff --git a/docs/docs-content/devx/services/service-listings/redis-db.md b/docs/docs-content/devx/services/service-listings/redis-db.md index 9a22f1f5de..7c931fb072 100644 --- a/docs/docs-content/devx/services/service-listings/redis-db.md +++ b/docs/docs-content/devx/services/service-listings/redis-db.md @@ -11,7 +11,7 @@ logoUrl: "https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcSjxG5Qb38rX39m1M tags: ["devx", "app mode", "pde", "databases"] --- -[Redis](https://redis.io/docs/about/) is an open-source (BSD licensed), in-memory data structure store used as a data +[Redis](https://redis.io/docs/about/) is an open source (BSD licensed), in-memory data structure store used as a data cache store or database service. Redis has built-in replication, Lua scripting, least recently used eviction, transactions, and different levels of on-disk persistence capabilities. In addition, Redis provides high availability via Redis Sentinel and automatic partitioning with Redis Cluster. diff --git a/docs/docs-content/enterprise-version/install-palette/install-on-kubernetes/airgap-install/install.md b/docs/docs-content/enterprise-version/install-palette/install-on-kubernetes/airgap-install/install.md index fdfc80bd07..17bcc02a0d 100644 --- a/docs/docs-content/enterprise-version/install-palette/install-on-kubernetes/airgap-install/install.md +++ b/docs/docs-content/enterprise-version/install-palette/install-on-kubernetes/airgap-install/install.md @@ -752,7 +752,7 @@ environment. Reach out to our support team if you need assistance. :::tip - For a more user-friendly experience, use the open-source tool [k9s](https://k9scli.io/) to monitor the installation + For a more user-friendly experience, use the open source tool [k9s](https://k9scli.io/) to monitor the installation process. ::: diff --git a/docs/docs-content/enterprise-version/install-palette/install-on-kubernetes/install.md b/docs/docs-content/enterprise-version/install-palette/install-on-kubernetes/install.md index e93901b702..8ee03dfd06 100644 --- a/docs/docs-content/enterprise-version/install-palette/install-on-kubernetes/install.md +++ b/docs/docs-content/enterprise-version/install-palette/install-on-kubernetes/install.md @@ -642,7 +642,7 @@ your environment. Reach out to our support team if you need assistance. :::tip - For a more user-friendly experience, use the open-source tool [k9s](https://k9scli.io/) to monitor the installation + For a more user-friendly experience, use the open source tool [k9s](https://k9scli.io/) to monitor the installation process. ::: diff --git a/docs/docs-content/getting-started/additional-capabilities/edge.md b/docs/docs-content/getting-started/additional-capabilities/edge.md index dccb29d402..80626f8da1 100644 --- a/docs/docs-content/getting-started/additional-capabilities/edge.md +++ b/docs/docs-content/getting-started/additional-capabilities/edge.md @@ -15,7 +15,7 @@ These locations include hospitals, retail stores, Telco environments, restaurant areas, and many more. Palette Edge supports both VM and container-based workloads, multiple Kubernetes distributions, and Intel and ARM -hardware architectures. It is built on top of the open-source project [Kairos](https://kairos.io/), which enables the +hardware architectures. It is built on top of the open source project [Kairos](https://kairos.io/), which enables the creation and customization of immutable versions of operating systems. Additionally, Palette Edge is designed to scale to tens of thousands of locations while enforcing policies locally within each cluster. diff --git a/docs/docs-content/getting-started/aws/scale-secure-cluster.md b/docs/docs-content/getting-started/aws/scale-secure-cluster.md index 333b1d07b4..16452996df 100644 --- a/docs/docs-content/getting-started/aws/scale-secure-cluster.md +++ b/docs/docs-content/getting-started/aws/scale-secure-cluster.md @@ -252,7 +252,7 @@ vulnerabilities. You can perform four types of scans on your cluster. | --------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | | Kubernetes Configuration Security | This scan examines the compliance of deployed security features against the CIS Kubernetes Benchmarks, which are consensus-driven security guidelines for Kubernetes. By default, the test set will execute based on the cluster Kubernetes version. | | Kubernetes Penetration Testing | This scan evaluates Kubernetes-related open-ports for any configuration issues that can leave the tenant clusters exposed to attackers. It hunts for security issues in your clusters and increases visibility of the security controls in your Kubernetes environments. | -| Kubernetes Conformance Testing | This scan validates your Kubernetes configuration to ensure that it conforms to CNCF specifications. Palette leverages an open-source tool called [Sonobuoy](https://sonobuoy.io) to perform this scan. | +| Kubernetes Conformance Testing | This scan validates your Kubernetes configuration to ensure that it conforms to CNCF specifications. Palette leverages an open source tool called [Sonobuoy](https://sonobuoy.io) to perform this scan. | | Software Bill of Materials (SBOM) | This scan details the various third-party components and dependencies used by your workloads and helps to manage security and compliance risks associated with those components. | Navigate to the left **Main Menu** and select **Clusters**. Select your cluster to view its **Overview** tab. diff --git a/docs/docs-content/getting-started/azure/scale-secure-cluster.md b/docs/docs-content/getting-started/azure/scale-secure-cluster.md index 3f1ca29d83..f6e9f2722b 100644 --- a/docs/docs-content/getting-started/azure/scale-secure-cluster.md +++ b/docs/docs-content/getting-started/azure/scale-secure-cluster.md @@ -252,7 +252,7 @@ vulnerabilities. You can perform four types of scans on your cluster. | --------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | | Kubernetes Configuration Security | This scan examines the compliance of deployed security features against the CIS Kubernetes Benchmarks, which are consensus-driven security guidelines for Kubernetes. By default, the test set will execute based on the cluster Kubernetes version. | | Kubernetes Penetration Testing | This scan evaluates Kubernetes-related open-ports for any configuration issues that can leave the tenant clusters exposed to attackers. It hunts for security issues in your clusters and increases visibility of the security controls in your Kubernetes environments. | -| Kubernetes Conformance Testing | This scan validates your Kubernetes configuration to ensure that it conforms to CNCF specifications. Palette leverages an open-source tool called [Sonobuoy](https://sonobuoy.io) to perform this scan. | +| Kubernetes Conformance Testing | This scan validates your Kubernetes configuration to ensure that it conforms to CNCF specifications. Palette leverages an open source tool called [Sonobuoy](https://sonobuoy.io) to perform this scan. | | Software Bill of Materials (SBOM) | This scan details the various third-party components and dependencies used by your workloads and helps to manage security and compliance risks associated with those components. | Navigate to the left **Main Menu** and select **Clusters**. Select your cluster to view its **Overview** tab. diff --git a/docs/docs-content/getting-started/gcp/scale-secure-cluster.md b/docs/docs-content/getting-started/gcp/scale-secure-cluster.md index 64a1a13ebf..1a70a00f08 100644 --- a/docs/docs-content/getting-started/gcp/scale-secure-cluster.md +++ b/docs/docs-content/getting-started/gcp/scale-secure-cluster.md @@ -252,7 +252,7 @@ vulnerabilities. You can perform four types of scans on your cluster. | --------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | | Kubernetes Configuration Security | This scan examines the compliance of deployed security features against the CIS Kubernetes Benchmarks, which are consensus-driven security guidelines for Kubernetes. By default, the test set will execute based on the cluster Kubernetes version. | | Kubernetes Penetration Testing | This scan evaluates Kubernetes-related open-ports for any configuration issues that can leave the tenant clusters exposed to attackers. It hunts for security issues in your clusters and increases visibility of the security controls in your Kubernetes environments. | -| Kubernetes Conformance Testing | This scan validates your Kubernetes configuration to ensure that it conforms to CNCF specifications. Palette leverages an open-source tool called [Sonobuoy](https://sonobuoy.io) to perform this scan. | +| Kubernetes Conformance Testing | This scan validates your Kubernetes configuration to ensure that it conforms to CNCF specifications. Palette leverages an open source tool called [Sonobuoy](https://sonobuoy.io) to perform this scan. | | Software Bill of Materials (SBOM) | This scan details the various third-party components and dependencies used by your workloads and helps to manage security and compliance risks associated with those components. | Navigate to the left **Main Menu** and select **Clusters**. Select your cluster to view its **Overview** tab. diff --git a/docs/docs-content/getting-started/vmware/scale-secure-cluster.md b/docs/docs-content/getting-started/vmware/scale-secure-cluster.md index 80367ddcb7..6e9963c927 100644 --- a/docs/docs-content/getting-started/vmware/scale-secure-cluster.md +++ b/docs/docs-content/getting-started/vmware/scale-secure-cluster.md @@ -263,7 +263,7 @@ vulnerabilities. You can perform four types of scans on your cluster. | --------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | | Kubernetes Configuration Security | This scan examines the compliance of deployed security features against the CIS Kubernetes Benchmarks, which are consensus-driven security guidelines for Kubernetes. By default, the test set will execute based on the cluster Kubernetes version. | | Kubernetes Penetration Testing | This scan evaluates Kubernetes-related open-ports for any configuration issues that can leave the tenant clusters exposed to attackers. It hunts for security issues in your clusters and increases visibility of the security controls in your Kubernetes environments. | -| Kubernetes Conformance Testing | This scan validates your Kubernetes configuration to ensure that it conforms to CNCF specifications. Palette leverages an open-source tool called [Sonobuoy](https://sonobuoy.io) to perform this scan. | +| Kubernetes Conformance Testing | This scan validates your Kubernetes configuration to ensure that it conforms to CNCF specifications. Palette leverages an open source tool called [Sonobuoy](https://sonobuoy.io) to perform this scan. | | Software Bill of Materials (SBOM) | This scan details the various third-party components and dependencies used by your workloads and helps to manage security and compliance risks associated with those components. | Navigate to the left **Main Menu** and select **Clusters**. Select your cluster to view its **Overview** tab. diff --git a/docs/docs-content/glossary-all.md b/docs/docs-content/glossary-all.md index 971822434a..d396e54f19 100644 --- a/docs/docs-content/glossary-all.md +++ b/docs/docs-content/glossary-all.md @@ -186,35 +186,35 @@ Charts. ## Palette eXtended Kubernetes (PXK) -Palette eXtended Kubernetes (PXK) is a recompiled version of the open-source Cloud Native Computing Foundation (CNCF) +Palette eXtended Kubernetes (PXK) is a recompiled version of the open source Cloud Native Computing Foundation (CNCF) distribution of Kubernetes. This Kubernetes version can be deployed through Palette to all major infrastructure providers, public cloud providers, and private data center providers. This is the default distribution when deploying a Kubernetes cluster through Palette. You have the option to choose other Kubernetes distributions, such as MicroK8s, Konvoy, and more, should you want to consume a different Kubernetes distribution. -PXK is different from the upstream open-source Kubernetes version primarily because of the carefully reviewed and +PXK is different from the upstream open source Kubernetes version primarily because of the carefully reviewed and applied hardening of the operating system (OS) and Kubernetes. The hardening ranges from removing unused kernel modules to using an OS configuration that follows industry best practices. Our recompiled Kubernetes configuration addresses common Kubernetes deployment security pitfalls and implements industry best practices. A benefit of Palette when used with PXK is the ability to apply different flavors of container storage interface (CSI) -plugins and container network interface (CNI) plugins. Other open-source Kubernetes distributions, such as MicroK8s, +plugins and container network interface (CNI) plugins. Other open source Kubernetes distributions, such as MicroK8s, RKE2, and K3s, come with a default CSI and CNI. Additional complexity and overhead are required from you to enable different interfaces. PXK supports the ability to select other interface plugins out of the box without any additional overhead or complexity needed from your side. -There are no changes to the Kubernetes source code and we also follow the same versioning schema as the upstream -open-source Kubernetes distribution. +There are no changes to the Kubernetes source code and we also follow the same versioning schema as the upstream open +source Kubernetes distribution. ## Palette eXtended Kubernetes Edge (PXK-E) -Palette eXtended Kubernetes Edge (PXK-E) is a recompiled version of the open-source Cloud Native Computing Foundation +Palette eXtended Kubernetes Edge (PXK-E) is a recompiled version of the open source Cloud Native Computing Foundation (CNCF) distribution of Kubernetes. This Kubernetes distribution is customized and optimized for edge computing environments and can be deployed through Palette. PXK-E is the Kubernetes distribution Palette defaults to when deploying Edge clusters. -PXK-E differs from the upstream open-source Kubernetes version by optimizing for operations in an edge computing -environment. PXK-E also differentiates itself by using the open-source project, [Kairos](https://kairos.io/) as the base +PXK-E differs from the upstream open source Kubernetes version by optimizing for operations in an edge computing +environment. PXK-E also differentiates itself by using the open source project, [Kairos](https://kairos.io/) as the base operating system (OS). PXK-E’s use of Kairos means the OS is immutable, which significantly improves the security posture and reduces potential attack surfaces. @@ -232,13 +232,13 @@ PXK-E manages the underlying OS and the Kubernetes layer together, which reduces maintaining two separate components. PXK-E allows you to apply different flavors of container storage interfaces (CSI) and container network interfaces -(CNI). Other open-source Kubernetes distributions such as MicroK8s, RKE2, and K3s come with a default CSI and CNI. There +(CNI). Other open source Kubernetes distributions such as MicroK8s, RKE2, and K3s come with a default CSI and CNI. There is additional complexity and overhead when you want to consume different interface plugins with traditional Kubernetes distributions. Using PXK-E, you select the interface plugin you want to apply without additional overhead and complexity. There are no changes to the Kubernetes source code used in PXK-E, and it follows the same versioning schema as the -upstream open-source Kubernetes distribution. +upstream open source Kubernetes distribution. ## Palette Terminal User Interface (TUI) diff --git a/docs/docs-content/integrations/cilium-tetragon.md b/docs/docs-content/integrations/cilium-tetragon.md index e70e033c73..91b8950df6 100644 --- a/docs/docs-content/integrations/cilium-tetragon.md +++ b/docs/docs-content/integrations/cilium-tetragon.md @@ -12,7 +12,7 @@ tags: ["packs", "cilium-tetragon", "monitoring"] [Tetragon](https://github.com/cilium/tetragon) is an eBPF based security observability and runtime enforcement. eBPF is used to safely and efficiently extend the kernel's capabilities without requiring changing the kernel source code or -loading kernel modules. Tetragon is a Cilium community open-source project that enables profound visibility with +loading kernel modules. Tetragon is a Cilium community open source project that enables profound visibility with filtering and aggregation with the eBPF collector support to deliver visibility at depth with minimal overhead. Palette supports Cilium Tetragon as an add-on pack for monitoring services. Refer to the diff --git a/docs/docs-content/integrations/cni-azure.md b/docs/docs-content/integrations/cni-azure.md index 3bcabe5315..fa5f2cf96f 100644 --- a/docs/docs-content/integrations/cni-azure.md +++ b/docs/docs-content/integrations/cni-azure.md @@ -34,7 +34,7 @@ CNI: - **azure**: Azure's own implementation, called [Azure Network Policy](https://learn.microsoft.com/en-us/azure/virtual-network/kubernetes-network-policies). -- **calico**: An open-source network and network security solution developed by [Tigera](https://www.tigera.io/). +- **calico**: An open source network and network security solution developed by [Tigera](https://www.tigera.io/). - **none**: No network policy is applied. Use this option if you do not want to apply any network policy. diff --git a/docs/docs-content/integrations/csi-rook-ceph-addon.md b/docs/docs-content/integrations/csi-rook-ceph-addon.md index 1181b6f1c6..15fc921274 100644 --- a/docs/docs-content/integrations/csi-rook-ceph-addon.md +++ b/docs/docs-content/integrations/csi-rook-ceph-addon.md @@ -1,7 +1,7 @@ --- sidebar_label: "rook-ceph" title: "Rook Ceph" -description: "Rook is an open-source cloud-native storage orchestrator that provides the platform, framework, and support for Ceph +description: "Rook is an open source cloud-native storage orchestrator that provides the platform, framework, and support for Ceph storage to natively integrate with cloud-native environments. Ceph is a distributed storage system that provides file, block, and object storage and is deployed in large-scale production clusters." hide_table_of_contents: true diff --git a/docs/docs-content/integrations/csi-rook-ceph.md b/docs/docs-content/integrations/csi-rook-ceph.md index d08f6f6cdf..36397d095c 100644 --- a/docs/docs-content/integrations/csi-rook-ceph.md +++ b/docs/docs-content/integrations/csi-rook-ceph.md @@ -1,7 +1,7 @@ --- sidebar_label: "rook-ceph" title: "Rook Ceph" -description: "Rook is an open-source cloud-native storage orchestrator that provides the platform, framework, and support for Ceph +description: "Rook is an open source cloud-native storage orchestrator that provides the platform, framework, and support for Ceph storage to natively integrate with cloud-native environments. Ceph is a distributed storage system that provides file, block, and object storage and is deployed in large-scale production clusters." hide_table_of_contents: true diff --git a/docs/docs-content/integrations/kubernetes-support.md b/docs/docs-content/integrations/kubernetes-support.md index 9af0507ad3..e7e5e33d12 100644 --- a/docs/docs-content/integrations/kubernetes-support.md +++ b/docs/docs-content/integrations/kubernetes-support.md @@ -20,7 +20,7 @@ The table below lists the Kubernetes distributions we support and the duration o | Kubernetes Distribution | Supported Minor Versions | Support Duration | Notes | | ------------------------------------------ | ------------------------ | ---------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------- | -| CNCF Kubernetes | N-3 | 14 months | The official open-source version of [Kubernetes](https://kubernetes.io/). | +| CNCF Kubernetes | N-3 | 14 months | The official open source version of [Kubernetes](https://kubernetes.io/). | | Palette eXtended Kubernetes (PXK) | N-3 | 14 months | Additional support may be extended. Discuss this with our support team if you need additional support. | | Palette eXtended Kubernetes - Edge (PXK-E) | N-3 | 14 months | Additional support may be extended. Discuss this with our support team if you need additional support. | | Other | N-3 | EOL | Other distributions available in Palette such as K3s, Microk8s, and RKE2, we only support until their official EOL. The EOL is set by the respective owner. | diff --git a/docs/docs-content/integrations/kubernetes.md b/docs/docs-content/integrations/kubernetes.md index 0fe1e9ff02..68f2388e46 100644 --- a/docs/docs-content/integrations/kubernetes.md +++ b/docs/docs-content/integrations/kubernetes.md @@ -31,25 +31,25 @@ Review our [Maintenance Policy](maintenance-policy.md) to learn about pack updat ## What is PXK? -Palette eXtended Kubernetes (PXK) is a recompiled version of the open-source Cloud Native Computing Foundation (CNCF) +Palette eXtended Kubernetes (PXK) is a recompiled version of the open source Cloud Native Computing Foundation (CNCF) distribution of Kubernetes. This Kubernetes version can be deployed through Palette to all major infrastructure providers, public cloud providers, and private data center providers. This is the default distribution when deploying a Kubernetes cluster through Palette. You have the option to choose other Kubernetes distributions, such as MicroK8s, Konvoy, and more, should you want to consume a different Kubernetes distribution. -PXK is different from the upstream open-source Kubernetes version primarily because of the carefully reviewed and +PXK is different from the upstream open source Kubernetes version primarily because of the carefully reviewed and applied hardening of the operating system (OS) and Kubernetes. The hardening ranges from removing unused kernel modules to using an OS configuration that follows industry best practices. Our recompiled Kubernetes configuration addresses common Kubernetes deployment security pitfalls and implements industry best practices. A benefit of Palette when used with PXK is the ability to apply different flavors of container storage interface (CSI) -plugins and container network interface (CNI) plugins. Other open-source Kubernetes distributions, such as MicroK8s, +plugins and container network interface (CNI) plugins. Other open source Kubernetes distributions, such as MicroK8s, RKE2, and K3s, come with a default CSI and CNI. Additional complexity and overhead are required from you to enable different interfaces. PXK supports the ability to select other interface plugins out of the box without any additional overhead or complexity needed from your side. -There are no changes to the Kubernetes source code and we also follow the same versioning schema as the upstream -open-source Kubernetes distribution. +There are no changes to the Kubernetes source code and we also follow the same versioning schema as the upstream open +source Kubernetes distribution. :::info diff --git a/docs/docs-content/integrations/prometheus-operator.md b/docs/docs-content/integrations/prometheus-operator.md index c085669ba8..2e00a0cec9 100644 --- a/docs/docs-content/integrations/prometheus-operator.md +++ b/docs/docs-content/integrations/prometheus-operator.md @@ -78,7 +78,7 @@ Toggle the **Enable** button to enable the use of Ingress. ## Thanos SideCar -[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open-source system for running large-scale, +[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open source system for running large-scale, distributed, and highly available Prometheus setups. Thanos allows Prometheus to store data for extended periods in object storage, such as Amazon S3 or Google Cloud Storage, instead of a local disk. This enables Prometheus to scale horizontally without the risk of using up local storage space. @@ -222,7 +222,7 @@ Toggle the **Enable** button to enable the use of Ingress. ## Thanos SideCar -[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open-source system for running large-scale, +[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open source system for running large-scale, distributed, and highly available Prometheus setups. Thanos allows Prometheus to store data for extended periods in object storage, such as Amazon S3 or Google Cloud Storage, instead of a local disk. This enables Prometheus to scale horizontally without the risk of using up local storage space. @@ -366,7 +366,7 @@ Toggle the **Enable** button to enable the use of Ingress. ## Thanos SideCar -[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open-source system for running large-scale, +[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open source system for running large-scale, distributed, and highly available Prometheus setups. Thanos allows Prometheus to store data for extended periods in object storage, such as Amazon S3 or Google Cloud Storage, instead of a local disk. This enables Prometheus to scale horizontally without the risk of using up local storage space. @@ -512,7 +512,7 @@ Toggle the **Enable** button to enable the use of Ingress. ## Thanos SideCar -[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open-source system for running large-scale, +[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open source system for running large-scale, distributed, and highly available Prometheus setups. Thanos allows Prometheus to store data for extended periods in object storage, such as Amazon S3 or Google Cloud Storage, instead of a local disk. This enables Prometheus to scale horizontally without the risk of using up local storage space. @@ -621,7 +621,7 @@ Toggle the **Enable** button to enable the use of Ingress. ## Thanos SideCar -[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open-source system for running large-scale, +[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open source system for running large-scale, distributed, and highly available Prometheus setups. Thanos allows Prometheus to store data for extended periods in object storage, such as Amazon S3 or Google Cloud Storage, instead of a local disk. This enables Prometheus to scale horizontally without the risk of using up local storage space. @@ -721,7 +721,7 @@ Toggle the **Enable** button to enable the use of Ingress. ## Thanos SideCar -[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open-source system for running large-scale, +[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open source system for running large-scale, distributed, and highly available Prometheus setups. Thanos allows Prometheus to store data for extended periods in object storage, such as Amazon S3 or Google Cloud Storage, instead of a local disk. This enables Prometheus to scale horizontally without the risk of using up local storage space. diff --git a/docs/docs-content/introduction/introduction.md b/docs/docs-content/introduction/introduction.md index fa093ff097..7465f2cb9e 100644 --- a/docs/docs-content/introduction/introduction.md +++ b/docs/docs-content/introduction/introduction.md @@ -63,7 +63,7 @@ Palette has the richest coverage in supported environments that includes: ## What is Under the Hood? -Palette uniquely extends and integrates the Cloud Native Computing Foundation (CNCF) open-source Cluster API project. +Palette uniquely extends and integrates the Cloud Native Computing Foundation (CNCF) open source Cluster API project. Palette does this by providing comprehensive full-stack modeling and orchestration, governance, security, and day 0 - day 2 management capabilities. diff --git a/docs/docs-content/kubernetes-knowlege-hub/how-to/how-to-retrieve-images-from-private-registry.md b/docs/docs-content/kubernetes-knowlege-hub/how-to/how-to-retrieve-images-from-private-registry.md index 79e12c0594..524e81ec47 100644 --- a/docs/docs-content/kubernetes-knowlege-hub/how-to/how-to-retrieve-images-from-private-registry.md +++ b/docs/docs-content/kubernetes-knowlege-hub/how-to/how-to-retrieve-images-from-private-registry.md @@ -12,7 +12,7 @@ tags: ["how-to", "k8s-tips"] ## How To Retrieve Images from a Private Registry in Kubernetes -Kubernetes is an open-source container orchestration platform that enables efficient management, deployment, and scaling +Kubernetes is an open source container orchestration platform that enables efficient management, deployment, and scaling of containerized applications. By default, Docker and Kubernetes allow a limited number of unauthenticated pulls from a Docker registry, such as Docker diff --git a/docs/docs-content/legal-licenses/oss-licenses-index/oss-licenses-index.md b/docs/docs-content/legal-licenses/oss-licenses-index/oss-licenses-index.md index b5227a080b..137d78bc88 100644 --- a/docs/docs-content/legal-licenses/oss-licenses-index/oss-licenses-index.md +++ b/docs/docs-content/legal-licenses/oss-licenses-index/oss-licenses-index.md @@ -1,14 +1,14 @@ --- -sidebar_label: "Open-source Licenses" -title: "Open-source Licenses" -description: "Review the open-source licenses tied to the libraries and modules currently in use by Palette and PXK." +sidebar_label: "Open source Licenses" +title: "Open source Licenses" +description: "Review the open source licenses tied to the libraries and modules currently in use by Palette and PXK." sidebar_position: 0 tags: ["legal", "licenses"] --- -This section documents the open-source licenses associated with the libraries and modules in use by Palette and . If you have any questions or concerns, contact us at support@spectrocloud.com. +This section documents the open source licenses associated with the libraries and modules in use by Palette and . If you have any questions or concerns, contact us at support@spectrocloud.com. ## Resources diff --git a/docs/docs-content/legal-licenses/oss-licenses-index/oss-licenses.md b/docs/docs-content/legal-licenses/oss-licenses-index/oss-licenses.md index 52e7dee164..4151acbc12 100644 --- a/docs/docs-content/legal-licenses/oss-licenses-index/oss-licenses.md +++ b/docs/docs-content/legal-licenses/oss-licenses-index/oss-licenses.md @@ -1,14 +1,14 @@ --- sidebar_label: "Palette" -title: "Palette Open-source Licenses" -description: "Review the open-source licenses tied to the libraries and modules currently in use by Palette." +title: "Palette Open source Licenses" +description: "Review the open source licenses tied to the libraries and modules currently in use by Palette." sidebar_position: 10 tags: ["legal", "licenses"] --- -The following table lists the open-source licenses tied to the libraries and modules currently in use by Palette. +The following table lists the open source licenses tied to the libraries and modules currently in use by Palette. | Library | License | | --------------------------------------------------------------------------------------------- | --------------------------------------------------------------------- | diff --git a/docs/docs-content/profiles/cluster-profiles/create-cluster-profiles/create-full-profile.md b/docs/docs-content/profiles/cluster-profiles/create-cluster-profiles/create-full-profile.md index 190d41792f..dc9fd2bfd2 100644 --- a/docs/docs-content/profiles/cluster-profiles/create-cluster-profiles/create-full-profile.md +++ b/docs/docs-content/profiles/cluster-profiles/create-cluster-profiles/create-full-profile.md @@ -44,7 +44,7 @@ and Storage. Next, add layers using add-on profiles to expand the functionality :::info Cluster profiles created from a Tech Preview cloud type are intended for clusters that a cloud provider deploys using - Palette's generic framework built upon the open-source Cluster API (CAPI) initiative. + Palette's generic framework built upon the open source Cluster API (CAPI) initiative. When creating a profile using a Tech Preview cloud type, you do not have to specify anything for the OS or Kubernetes layers. Out-of-the-box packs are provided for the network and storage profile layers. diff --git a/docs/docs-content/profiles/cluster-profiles/create-cluster-profiles/create-infrastructure-profile.md b/docs/docs-content/profiles/cluster-profiles/create-cluster-profiles/create-infrastructure-profile.md index 5e0a9a1620..64c0c6a41d 100644 --- a/docs/docs-content/profiles/cluster-profiles/create-cluster-profiles/create-infrastructure-profile.md +++ b/docs/docs-content/profiles/cluster-profiles/create-cluster-profiles/create-infrastructure-profile.md @@ -44,7 +44,7 @@ packs. :::info Cluster profiles created from a Tech Preview cloud type are intended for clusters that a cloud provider deploys using - Palette's generic framework built upon the open-source Cluster API (CAPI) initiative. + Palette's generic framework built upon the open source Cluster API (CAPI) initiative. When creating a profile using a Tech Preview cloud type, you do not have to specify anything for the OS or Kubernetes layers. Out-of-the-box packs are provided for the network and storage profile layers. diff --git a/docs/docs-content/tutorials/profiles/deploy-pack.md b/docs/docs-content/tutorials/profiles/deploy-pack.md index 6eb5dfc4a9..1facb6de65 100644 --- a/docs/docs-content/tutorials/profiles/deploy-pack.md +++ b/docs/docs-content/tutorials/profiles/deploy-pack.md @@ -15,7 +15,7 @@ ensures uniformity across your clusters. The primary use cases for creating cust - Aggregated configuration and application dependencies simplify deployment and consumption. -- Open-source contributors can add new Kubernetes applications to a custom add-on pack for the community. +- Open source contributors can add new Kubernetes applications to a custom add-on pack for the community. - Enterprises can add proprietary Kubernetes applications to a custom add-on pack. diff --git a/docs/docs-content/user-management/saml-sso/palette-sso-with-keycloak.md b/docs/docs-content/user-management/saml-sso/palette-sso-with-keycloak.md index d25411942a..dbfbbe45ac 100644 --- a/docs/docs-content/user-management/saml-sso/palette-sso-with-keycloak.md +++ b/docs/docs-content/user-management/saml-sso/palette-sso-with-keycloak.md @@ -9,7 +9,7 @@ hiddenFromNav: false tags: ["user-management", "oidc-sso", "Keycloak"] --- -Keycloak is an open-source Identity and Access Management (IAM) tool, primarily used for simplifying the authentication +Keycloak is an open source Identity and Access Management (IAM) tool, primarily used for simplifying the authentication and authorization processes in modern applications and services. It provides a wide range of features including Single Sign-On (SSO), two-factor authentication, and social login capabilities. Keycloak is designed to manage users, credentials, roles, and groups efficiently, enabling developers to secure their applications and services with minimal diff --git a/docs/docs-content/vertex/fips/fips-compliant-components.md b/docs/docs-content/vertex/fips/fips-compliant-components.md index 3e10354a68..898672c5d9 100644 --- a/docs/docs-content/vertex/fips/fips-compliant-components.md +++ b/docs/docs-content/vertex/fips/fips-compliant-components.md @@ -61,7 +61,7 @@ each Kubernetes distribution. ::: -All PXK and PXKE components and supporting open-source components are compiled in their native programming language +All PXK and PXKE components and supporting open source components are compiled in their native programming language using language specific FIPS-compliant libraries and static linking. If the component is not available in the form of a FIPS-compliant binary, we compile it with FIPS-compliant compiler and libraries. The following tables list the FIPS-compliant components in PXK and PXK-E: diff --git a/docs/docs-content/vertex/install-palette-vertex/install-on-kubernetes/airgap-install/install.md b/docs/docs-content/vertex/install-palette-vertex/install-on-kubernetes/airgap-install/install.md index e87dac58cc..57068e875b 100644 --- a/docs/docs-content/vertex/install-palette-vertex/install-on-kubernetes/airgap-install/install.md +++ b/docs/docs-content/vertex/install-palette-vertex/install-on-kubernetes/airgap-install/install.md @@ -762,7 +762,7 @@ environment. Reach out to our support team if you need assistance. :::tip - For a more user-friendly experience, use the open-source tool [k9s](https://k9scli.io/) to monitor the installation + For a more user-friendly experience, use the open source tool [k9s](https://k9scli.io/) to monitor the installation process. ::: diff --git a/docs/docs-content/vertex/install-palette-vertex/install-on-kubernetes/install.md b/docs/docs-content/vertex/install-palette-vertex/install-on-kubernetes/install.md index a799f00881..25deb78726 100644 --- a/docs/docs-content/vertex/install-palette-vertex/install-on-kubernetes/install.md +++ b/docs/docs-content/vertex/install-palette-vertex/install-on-kubernetes/install.md @@ -674,7 +674,7 @@ your environment. Reach out to our support team if you need assistance. :::tip - For a more user-friendly experience, use the open-source tool [k9s](https://k9scli.io/) to monitor the installation + For a more user-friendly experience, use the open source tool [k9s](https://k9scli.io/) to monitor the installation process. ::: diff --git a/docs/docs-content/vm-management/architecture.md b/docs/docs-content/vm-management/architecture.md index 423b829b24..984b792a6b 100644 --- a/docs/docs-content/vm-management/architecture.md +++ b/docs/docs-content/vm-management/architecture.md @@ -46,7 +46,7 @@ By default, Palette VMO includes the following components: - **Spectro VM Dashboard**. Enables you to create, manage, and monitor VMs from Palette. The dashboard becomes available once the VMO pack is successfully deployed as part of your cluster profile. -- **KubeVirt**. This open-source solution enables you to create and manage VMs within Kubernetes clusters. KubeVirt +- **KubeVirt**. This open source solution enables you to create and manage VMs within Kubernetes clusters. KubeVirt extends Kubernetes with additional virtualization resource types using Kubernetes Custom Resource Definitions (CRD) API. diff --git a/docs/docs-content/vm-management/create-manage-vm/advanced-topics/migrate-vm-kubevirt.md b/docs/docs-content/vm-management/create-manage-vm/advanced-topics/migrate-vm-kubevirt.md index 7a22846176..381e9e31b7 100644 --- a/docs/docs-content/vm-management/create-manage-vm/advanced-topics/migrate-vm-kubevirt.md +++ b/docs/docs-content/vm-management/create-manage-vm/advanced-topics/migrate-vm-kubevirt.md @@ -10,7 +10,7 @@ tags: ["vmo", "palette-cli"] During large scale Kubernetes adoptions, workloads are often rehosted or migrated instead of being redeployed from scratch. This process allows system administrators to copy the application, together with its data, to a Kubernetes -cluster. However, the migration of VMs can be time consuming if done manually, so it is often automated with open-source +cluster. However, the migration of VMs can be time consuming if done manually, so it is often automated with open source tools such as [Forklift](https://github.com/kubev2v/forklift). The [Palette CLI](../../../automation/palette-cli/palette-cli.md) provides the ability to migrate Virtual Machines (VMs) diff --git a/styleguide/spectro-cloud-style-guide.md b/styleguide/spectro-cloud-style-guide.md index 03e4d56ef7..437c1cfd35 100644 --- a/styleguide/spectro-cloud-style-guide.md +++ b/styleguide/spectro-cloud-style-guide.md @@ -487,7 +487,7 @@ Capitalize the first word and all proper nouns, such as product names. To learn Don’t capitalize common nouns unless required. -- Kubernetes is an open-source container orchestration platform. +- Kubernetes is an open source container orchestration platform. - Kubectl allows you to connect to, configure and work with your clusters through the command line.