-
Notifications
You must be signed in to change notification settings - Fork 37
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
docs: unhyphenate open source #4284
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -28,12 +28,12 @@ Review our [Maintenance Policy](maintenance-policy.md) to learn about pack updat | |
|
||
## What is PXK-E? | ||
|
||
PXK-E is a customized version of the open-source Cloud Native Computing Foundation (CNCF) distribution of Kubernetes. | ||
PXK-E is a customized version of the open source Cloud Native Computing Foundation (CNCF) distribution of Kubernetes. | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. 🚫 [vale] reported by reviewdog 🐶 |
||
This Kubernetes distribution is customized and optimized for edge computing environments and can be deployed through | ||
Palette. PXK-E is the Kubernetes distribution Palette defaults to when deploying Edge clusters. | ||
|
||
PXK-E differs from the upstream open-source Kubernetes version by optimizing for operations in an edge computing | ||
environment. PXK-E also differentiates itself by using the Kairos open-source project as the base operating system (OS). | ||
PXK-E differs from the upstream open source Kubernetes version by optimizing for operations in an edge computing | ||
environment. PXK-E also differentiates itself by using the Kairos open source project as the base operating system (OS). | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. 🚫 [vale] reported by reviewdog 🐶 |
||
PXK-E’s use of Kairos means the OS is immutable, which significantly improves the security posture and reduces potential | ||
attack surfaces. | ||
|
||
|
@@ -50,13 +50,13 @@ PXK-E manages the underlying OS and the Kubernetes layer together, which reduces | |
maintaining two separate components. | ||
|
||
PXK-E allows you to apply different flavors of container storage interfaces (CSI) and container network interfaces | ||
(CNI). Other open-source Kubernetes distributions such as MicroK8s, RKE2, and K3s come with a default CSI and CNI. There | ||
(CNI). Other open source Kubernetes distributions such as MicroK8s, RKE2, and K3s come with a default CSI and CNI. There | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. 🚫 [vale] reported by reviewdog 🐶 |
||
is additional complexity and overhead when you want to consume different interface plugins with traditional Kubernetes | ||
distributions. Using PXK-E, you select the interface plugin you want to apply without additional overhead and | ||
complexity. | ||
|
||
There are no changes to the Kubernetes source code used in PXK-E, and it follows the same versioning schema as the | ||
upstream open-source Kubernetes distribution. | ||
upstream open source Kubernetes distribution. | ||
|
||
:::info | ||
|
||
|
@@ -107,7 +107,7 @@ four months. Once we stop supporting the minor version, we initiate the deprecat | |
| `cluster.config.initConfiguration.nodeRegistration.kubeletExtraArgs` | This parameter contains extra arguments for kubelet during node registration, such as setting feature gates, protecting kernel defaults, and disabling the read-only port. | | ||
| `pack.palette.config.oidc.identityProvider` | Dynamically enabled OpenID Connect (OIDC) Identity Provider (IDP) setting based on your UI selection when you add the PXK-E pack to your profile. This parameter appears in the YAML file after you make a selection. Refer to [Configure OIDC Identity Provider](#configure-custom-oidc). | | ||
|
||
You can add cloud-init stages exposed by [Kairos](https://kairos.io/docs/architecture/cloud-init/), an open-source | ||
You can add cloud-init stages exposed by [Kairos](https://kairos.io/docs/architecture/cloud-init/), an open source | ||
project. For more information, check out the [Cloud Init Stages](../clusters/edge/edge-configuration/cloud-init.md) | ||
reference. | ||
|
||
|
@@ -492,7 +492,7 @@ In this example, Palette is used as the IDP, and all users in the `dev-east-2` w | |
| `cluster.config.initConfiguration.nodeRegistration.kubeletExtraArgs` | This parameter contains extra arguments for kubelet during node registration, such as setting feature gates, protecting kernel defaults, and disabling the read-only port. | | ||
| `pack.palette.config.oidc.identityProvider` | Dynamically enabled OpenID Connect (OIDC) Identity Provider (IDP) setting based on your UI selection when you add the PXK-E pack to your profile. This parameter appears in the YAML file after you make a selection. Refer to [Configure OIDC Identity Provider](#configure-custom-oidc). | | ||
|
||
You can add cloud-init stages exposed by [Kairos](https://kairos.io/docs/architecture/cloud-init/), an open-source | ||
You can add cloud-init stages exposed by [Kairos](https://kairos.io/docs/architecture/cloud-init/), an open source | ||
project. For more information, check out the [Cloud Init Stages](../clusters/edge/edge-configuration/cloud-init.md) | ||
reference. | ||
|
||
|
@@ -877,7 +877,7 @@ In this example, Palette is used as the IDP, and all users in the `dev-east-2` w | |
| `cluster.config.initConfiguration.nodeRegistration.kubeletExtraArgs` | This parameter contains extra arguments for kubelet during node registration, such as setting feature gates, protecting kernel defaults, and disabling the read-only port. | | ||
| `pack.palette.config.oidc.identityProvider` | Dynamically enabled OpenID Connect (OIDC) Identity Provider (IDP) setting based on your UI selection when you add the PXK-E pack to your profile. This parameter appears in the YAML file after you make a selection. Refer to [Configure OIDC Identity Provider](#configure-custom-oidc). | | ||
|
||
You can add cloud-init stages exposed by [Kairos](https://kairos.io/docs/architecture/cloud-init/), an open-source | ||
You can add cloud-init stages exposed by [Kairos](https://kairos.io/docs/architecture/cloud-init/), an open source | ||
project. For more information, check out the [Cloud Init Stages](../clusters/edge/edge-configuration/cloud-init.md) | ||
reference. | ||
|
||
|
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -31,25 +31,25 @@ Review our [Maintenance Policy](maintenance-policy.md) to learn about pack updat | |
|
||
## What is PXK? | ||
|
||
Palette eXtended Kubernetes (PXK) is a recompiled version of the open-source Cloud Native Computing Foundation (CNCF) | ||
Palette eXtended Kubernetes (PXK) is a recompiled version of the open source Cloud Native Computing Foundation (CNCF) | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. 🚫 [vale] reported by reviewdog 🐶 |
||
distribution of Kubernetes. This Kubernetes version can be deployed through Palette to all major infrastructure | ||
providers, public cloud providers, and private data center providers. This is the default distribution when deploying a | ||
Kubernetes cluster through Palette. You have the option to choose other Kubernetes distributions, such as MicroK8s, | ||
Konvoy, and more, should you want to consume a different Kubernetes distribution. | ||
|
||
PXK is different from the upstream open-source Kubernetes version primarily because of the carefully reviewed and | ||
PXK is different from the upstream open source Kubernetes version primarily because of the carefully reviewed and | ||
applied hardening of the operating system (OS) and Kubernetes. The hardening ranges from removing unused kernel modules | ||
to using an OS configuration that follows industry best practices. Our recompiled Kubernetes configuration addresses | ||
common Kubernetes deployment security pitfalls and implements industry best practices. | ||
|
||
A benefit of Palette when used with PXK is the ability to apply different flavors of container storage interface (CSI) | ||
plugins and container network interface (CNI) plugins. Other open-source Kubernetes distributions, such as MicroK8s, | ||
plugins and container network interface (CNI) plugins. Other open source Kubernetes distributions, such as MicroK8s, | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. 🚫 [vale] reported by reviewdog 🐶 |
||
RKE2, and K3s, come with a default CSI and CNI. Additional complexity and overhead are required from you to enable | ||
different interfaces. PXK supports the ability to select other interface plugins out of the box without any additional | ||
overhead or complexity needed from your side. | ||
|
||
There are no changes to the Kubernetes source code and we also follow the same versioning schema as the upstream | ||
open-source Kubernetes distribution. | ||
There are no changes to the Kubernetes source code and we also follow the same versioning schema as the upstream open | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. 🚫 [vale] reported by reviewdog 🐶 |
||
source Kubernetes distribution. | ||
|
||
:::info | ||
|
||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🚫 [vale] reported by reviewdog 🐶
[Vale.Spelling] Did you really mean 'Kube'?