You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
First, we enable `cors` on the server since we’ll be making the requests from a different origin (domain). `cors` was installed in the [Application Setup](#application-setup) section. Then the `/videos` route is declared, which returns the array we just created in `json` format.
@@ -443,7 +441,7 @@ Our React application fetches the video by `id`, so we can use the `id` to get t
443
441
{{< file "server/app.js" js >}}
444
442
// add after app.get('/videos', ...) route
445
443
446
-
app.get('/video/:id/data', function(req, res) {
444
+
app.get('/video/:id/data', (req, res) => {
447
445
const id = parseInt(req.params.id, 10);
448
446
res.json(videos[id]);
449
447
});
@@ -472,34 +470,34 @@ We now need to implement two new features that are not supported by that endpoin
472
470
{{< file "server/app.js" js >}}
473
471
// add after app.get('/video/:id/data', ...) route
474
472
475
-
app.get('/video/:id', function(req, res) {
473
+
app.get('/video/:id', (req, res) => {
476
474
const path = `assets/${req.params.id}.mp4`;
477
475
const stat = fs.statSync(path);
478
476
const fileSize = stat.size;
479
477
const range = req.headers.range;
480
478
if (range) {
481
-
const parts = range.replace(/bytes=/, "").split("-")
482
-
const start = parseInt(parts[0], 10)
479
+
const parts = range.replace(/bytes=/, "").split("-");
This route will serve the same caption file, regardless of which `id` is passed as a parameter. In a more complete application, you could serve different caption files for different `id`s.
Copy file name to clipboardexpand all lines: docs/guides/kubernetes/deploy-and-manage-a-cluster-with-linode-kubernetes-engine-a-tutorial/index.md
+9-9
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,7 @@ The Linode Kubernetes Engine (LKE) is a fully-managed container orchestration en
32
32
33
33
{{< disclosure-note "Additional LKE features">}}
34
34
***etcd Backups** : A snapshot of your cluster's metadata is backed up continuously, so your cluster is automatically restored in the event of a failure.
35
-
***High Availability** : All of your control plane components are monitored and will automatically recover if they fail.
35
+
***High Availability** : All of your control plane components are monitored and automatically recover if they fail.
36
36
{{</ disclosure-note>}}
37
37
38
38
### In this Guide
@@ -48,7 +48,7 @@ In this guide you will learn:
48
48
-[Next Steps after deploying your cluster.](#next-steps)
49
49
50
50
{{< caution >}}
51
-
This guide's example instructions will create several billable resources on your Linode account. If you do not want to keep using the example cluster that you create, be sure to [remove it](#delete-a-cluster) when you have finished the guide.
51
+
This guide's example instructions create several billable resources on your Linode account. If you do not want to keep using the example cluster that you create, be sure to [remove it](#delete-a-cluster) when you have finished the guide.
52
52
53
53
If you remove the resources afterward, you will only be billed for the hour(s) that the resources were present on your account.
54
54
{{< /caution >}}
@@ -57,7 +57,7 @@ If you remove the resources afterward, you will only be billed for the hour(s) t
57
57
58
58
### Install kubectl
59
59
60
-
You will need to install the kubectl client to your computer before proceeding. Follow the steps corresponding to your computer's operating system.
60
+
You need to install the kubectl client to your computer before proceeding. Follow the steps corresponding to your computer's operating system.
61
61
62
62
{{< content "how-to-install-kubectl" >}}
63
63
@@ -67,21 +67,21 @@ You will need to install the kubectl client to your computer before proceeding.
67
67
68
68
## Connect to your LKE Cluster with kubectl
69
69
70
-
After you've created your LKE cluster using the Cloud Manager, you can begin interacting with and managing your cluster. You connect to it using the kubectl client on your computer. To configure kubectl, you'll download your cluster's *kubeconfig* file.
70
+
After you've created your LKE cluster using the Cloud Manager, you can begin interacting with and managing your cluster. You connect to it using the kubectl client on your computer. To configure kubectl, download your cluster's *kubeconfig* file.
If you create a new terminal window, it will not have access to the context that you specified using the previous instructions. This context information can be made persistent between new terminals by setting the [`KUBECONFIG` environment variable](https://kubernetes.io/docs/tasks/access-application-cluster/configure-access-multiple-clusters/#set-the-kubeconfig-environment-variable) in your shell's configuration file.
78
+
If you create a new terminal window, it does not have access to the context that you specified using the previous instructions. This context information can be made persistent between new terminals by setting the [`KUBECONFIG` environment variable](https://kubernetes.io/docs/tasks/access-application-cluster/configure-access-multiple-clusters/#set-the-kubeconfig-environment-variable) in your shell's configuration file.
79
79
80
80
{{< note >}}
81
81
If you are using Windows, review the [official Kubernetes documentation](https://kubernetes.io/docs/tasks/access-application-cluster/configure-access-multiple-clusters/#set-the-kubeconfig-environment-variable) for how to persist your context.
82
82
{{< /note >}}
83
83
84
-
These instructions will persist the context for users of the Bash terminal. They will be similar for users of other terminals:
84
+
These instructions persist the context for users of the Bash terminal. They are similar for users of other terminals:
You can use the Linode Cloud Manager to modify a cluster's existing node pools by adding or removing nodes. You can also recycle your node pools to replace all of their nodes with new ones that are upgraded to the most recent patch of your cluster's Kubernetes version, or remove entire node pools from your cluster. This section will cover completing those tasks. For any other changes to your LKE cluster, you should use kubectl.
161
+
You can use the Linode Cloud Manager to modify a cluster's existing node pools by adding or removing nodes. You can also recycle your node pools to replace all of their nodes with new ones that are upgraded to the most recent patch of your cluster's Kubernetes version, or remove entire node pools from your cluster. This section covers completing those tasks. For any other changes to your LKE cluster, you should use kubectl.
162
162
163
163
### Access your Cluster's Details Page
164
164
165
-
1. Click the **Kubernetes** link in the sidebar. The Kubernetes listing page will appear and you will see all your clusters listed.
165
+
1. Click the **Kubernetes** link in the sidebar. The Kubernetes listing page appears and you see all of your clusters listed.
|`throttle`|• integer <br>•`0`-`20` <br> •`0` disables the throttle |`20`| The client connection throttle limits the number of new connections-per-second from the same client IP. |
134
134
|`default-protocol`|• string <br> •`tcp`, `http`, `https`|`tcp`| Specifies the protocol for the NodeBalancer to use. |
135
+
|`proxy-protocol`|• string <br> •`none`, `v1`, `v2`|`none`| Enables Proxy Protocol on the underlying NodeBalancer and specifies the version of Proxy Protocol to use. The Proxy Protocol allows TCP client connection information, like IP address and port number, to be transferred to cluster nodes. See the [Using Proxy Protocol with NodeBalancers](/docs/platform/nodebalancer/nodebalancer-proxypass-configuration/#what-is-proxy-protocol) guide for details on each Proxy Protocol version. |
135
136
|`port-*`| A JSON object of port configurations<br> For example: <br> `{ "tls-secret-name": "prod-app-tls", "protocol": "https"})`| None |• Specifies a NodeBalancer port to configure, i.e. `port-443`. <br><br> • Ports `1-65534` are available for balancing. <br><br> • The available port configurations are: <br><br> `"tls-secret-name"` use this key to provide a Kubernetes secret name when setting up TLS termination for a service to be accessed over HTTPS. The secret type should be `kubernetes.io/tls`. <br><br> `"protocol"` specifies the protocol to use for this port, i.e. `tcp`, `http`, `https`. The default protocol is `tcp`, unless you provided a different configuration for the `default-protocol` annotation. |
136
137
|`check-type`|• string <br> •`none`, `connection`, `http`, `http_body`| None |• The type of health check to perform on Nodes to ensure that they are serving requests. The behavior for each check is the following: <br><br> `none` no check is performed <br><br> `connection` checks for a valid TCP handshake <br><br> `http` checks for a `2xx` or `3xx` response code <br><br> `http_body` checks for a specific string within the response body of the healthcheck URL. Use the `check-body` annotation to provide the string to use for the check. |
137
138
|`check-path`| string | None | The URL path that the NodeBalancer will use to check on the health of the back-end Nodes. |
@@ -150,10 +151,6 @@ To view a list of deprecated annotations, visit the [Linode CCM GitHub repositor
150
151
151
152
This section describes how to set up TLS termination on your Linode NodeBalancers so a Kubernetes Service can be accessed over HTTPS.
152
153
153
-
{{< note >}}
154
-
While Linode NodeBalancers do support ProxyProtocol, the Linode CCM does not. For this reason, the Linode Kubernetes Engine does not support ProxyProtocol yet. This means you cannot both terminate TLS inside your Kubernetes cluster and whitelist client IP addresses. ProxyProtocol support is coming soon to the Linode CCM.
155
-
{{</ note >}}
156
-
157
154
#### Generating a TLS type Secret
158
155
159
156
Kubernetes allows you to store sensitive information in a Secret object for use within your cluster. This is useful for storing things like passwords and API tokens. In this section, you will create a Kubernetes secret to store Transport Layer Security (TLS) certificates and keys that you will then use to configure TLS termination on your Linode NodeBalancers.
Copy file name to clipboardexpand all lines: docs/guides/kubernetes/how-to-deploy-nginx-ingress-on-linode-kubernetes-engine/index.md
-4
Original file line number
Diff line number
Diff line change
@@ -38,10 +38,6 @@ This guide will show you how to:
38
38
- Create two instances of sample application Deployments to create two separate mock websites on a single Kubernetes cluster served over port 80.
39
39
- Create an Ingress and a NodeBalancer to route traffic from the internet to Kubernetes Services.
40
40
41
-
{{< note >}}
42
-
[Linode NodeBalancers](https://www.linode.com/products/nodebalancers/0) do not currently support ProxyProtocol. For this reason, Kubernetes LoadBalancer Services running on Linode do not support ProxyProtocol either. This means you cannot both terminate TLS inside your Kubernetes cluster and whitelist client IP addresses. ProxyProtocol support is coming soon to Linode NodeBalancers.
43
-
{{</ note >}}
44
-
45
41
## Before You Begin
46
42
47
43
- You should have a working knowledge of Kubernetes' key concepts, including master and worker nodes, Pods, Deployments, and Services. For more information on Kubernetes, see our [Beginner's Guide to Kubernetes](/docs/kubernetes/beginners-guide-to-kubernetes/) series.
Copy file name to clipboardexpand all lines: docs/guides/platform/manager/dns-manager-add-domain-shortguide/index.md
+5-3
Original file line number
Diff line number
Diff line change
@@ -27,9 +27,8 @@ Creating a domain also creates its corresponding domain zone.
27
27
28
28

29
29
30
-
1. If you want to add a *slave zone* instead of a master zone, click the **Slave** radio button.
30
+
1. If you want to add a *slave zone* instead of a master zone, click the **Slave** radio button. If not, you may skip to the next step.
31
31
32
-
{{< note >}}
33
32
In order for Linode's DNS servers to function as slaves, your DNS master server must notify and allow AXFR requests from the following IP addresses:
34
33
35
34
104.237.137.10
@@ -42,7 +41,10 @@ In order for Linode's DNS servers to function as slaves, your DNS master server
42
41
2600:3c02::a
43
42
2600:3c03::a
44
43
2a01:7e00::a
45
-
{{< /note >}}
44
+
45
+
{{< caution >}}
46
+
On **December 15th, 2020** the IP address `75.127.96.10` will be replaced with the IP address `74.207.225.10`. While both IP addresses currently provide AXFR support, users will need to replace `75.127.96.10` with `74.207.225.10` in their configurations by the 15th of December, 2020, for long term AXFR support.
47
+
{{< /caution >}}
46
48
47
49
1. Enter your domain name in the **Domain** field. An example is shown above.
48
50
1. Enter an administrator's email address in the **SOA Email Address** field.
0 commit comments