From 1bde63f7888d9abaf88aa0ef77e62b3f33fff507 Mon Sep 17 00:00:00 2001 From: Derek Nola Date: Wed, 26 Feb 2025 07:45:32 -0800 Subject: [PATCH 1/2] Remove s390x references Signed-off-by: Derek Nola --- docs/installation/requirements.md | 1 - .../current/installation/requirements.md | 1 - .../current/installation/requirements.md | 1 - .../current/installation/requirements.md | 1 - 4 files changed, 4 deletions(-) diff --git a/docs/installation/requirements.md b/docs/installation/requirements.md index cf3c9b0db..1fff33c40 100644 --- a/docs/installation/requirements.md +++ b/docs/installation/requirements.md @@ -18,7 +18,6 @@ K3s is available for the following architectures: - x86_64 - armhf - arm64/aarch64 -- s390x :::warning ARM64 Page Size diff --git a/i18n/ja/docusaurus-plugin-content-docs/current/installation/requirements.md b/i18n/ja/docusaurus-plugin-content-docs/current/installation/requirements.md index 4cc3dbb5b..941c77937 100644 --- a/i18n/ja/docusaurus-plugin-content-docs/current/installation/requirements.md +++ b/i18n/ja/docusaurus-plugin-content-docs/current/installation/requirements.md @@ -18,7 +18,6 @@ K3sは以下のアーキテクチャで利用可能です: - x86_64 - armhf - arm64/aarch64 -- s390x :::warning ARM64 ページサイズ diff --git a/i18n/kr/docusaurus-plugin-content-docs/current/installation/requirements.md b/i18n/kr/docusaurus-plugin-content-docs/current/installation/requirements.md index 5fbcdfce4..b0d523544 100644 --- a/i18n/kr/docusaurus-plugin-content-docs/current/installation/requirements.md +++ b/i18n/kr/docusaurus-plugin-content-docs/current/installation/requirements.md @@ -18,7 +18,6 @@ K3s is available for the following architectures: - x86_64 - armhf - arm64/aarch64 -- s390x :::warning ARM64 Page Size diff --git a/i18n/zh/docusaurus-plugin-content-docs/current/installation/requirements.md b/i18n/zh/docusaurus-plugin-content-docs/current/installation/requirements.md index 5fbcdfce4..b0d523544 100644 --- a/i18n/zh/docusaurus-plugin-content-docs/current/installation/requirements.md +++ b/i18n/zh/docusaurus-plugin-content-docs/current/installation/requirements.md @@ -18,7 +18,6 @@ K3s is available for the following architectures: - x86_64 - armhf - arm64/aarch64 -- s390x :::warning ARM64 Page Size From 2fbb75304246fee8df81c5cab37b0e56790b5990 Mon Sep 17 00:00:00 2001 From: Derek Nola Date: Wed, 26 Feb 2025 07:56:18 -0800 Subject: [PATCH 2/2] Remove dead link Signed-off-by: Derek Nola --- docs/installation/requirements.md | 2 +- .../current/installation/requirements.md | 2 +- .../current/installation/requirements.md | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/docs/installation/requirements.md b/docs/installation/requirements.md index 1fff33c40..431fb658d 100644 --- a/docs/installation/requirements.md +++ b/docs/installation/requirements.md @@ -168,7 +168,7 @@ The VXLAN port on nodes should not be exposed to the world as it opens up your c ::: :::danger -Flannel relies on the [Bridge CNI plugin](https://www.cni.dev/plugins/current/main/bridge/) to create a L2 network that switches traffic. Rogue pods with `NET_RAW` capabilities can abuse that L2 network to launch attacks such as [ARP spoofing](https://static.sched.com/hosted_files/kccncna19/72/ARP%20DNS%20spoof.pdf). Therefore, as documented in the [Kubernetes docs](https://kubernetes.io/docs/concepts/security/pod-security-standards/), please set a restricted profile that disables `NET_RAW` on non-trustable pods. +Flannel relies on the [Bridge CNI plugin](https://www.cni.dev/plugins/current/main/bridge/) to create a L2 network that switches traffic. Rogue pods with `NET_RAW` capabilities can abuse that L2 network to launch attacks such as ARP spoofing. Therefore, as documented in the [Kubernetes docs](https://kubernetes.io/docs/concepts/security/pod-security-standards/), please set a restricted profile that disables `NET_RAW` on non-trustable pods. ::: ### Inbound Rules for K3s Nodes diff --git a/i18n/kr/docusaurus-plugin-content-docs/current/installation/requirements.md b/i18n/kr/docusaurus-plugin-content-docs/current/installation/requirements.md index b0d523544..1999732e1 100644 --- a/i18n/kr/docusaurus-plugin-content-docs/current/installation/requirements.md +++ b/i18n/kr/docusaurus-plugin-content-docs/current/installation/requirements.md @@ -126,7 +126,7 @@ The VXLAN port on nodes should not be exposed to the world as it opens up your c ::: :::danger -Flannel relies on the [Bridge CNI plugin](https://www.cni.dev/plugins/current/main/bridge/) to create a L2 network that switches traffic. Rogue pods with `NET_RAW` capabilities can abuse that L2 network to launch attacks such as [ARP spoofing](https://static.sched.com/hosted_files/kccncna19/72/ARP%20DNS%20spoof.pdf). Therefore, as documented in the [Kubernetes docs](https://kubernetes.io/docs/concepts/security/pod-security-standards/), please set a restricted profile that disables `NET_RAW` on non-trustable pods. +Flannel relies on the [Bridge CNI plugin](https://www.cni.dev/plugins/current/main/bridge/) to create a L2 network that switches traffic. Rogue pods with `NET_RAW` capabilities can abuse that L2 network to launch attacks such as ARP spoofing. Therefore, as documented in the [Kubernetes docs](https://kubernetes.io/docs/concepts/security/pod-security-standards/), please set a restricted profile that disables `NET_RAW` on non-trustable pods. ::: ### Inbound Rules for K3s Nodes diff --git a/i18n/zh/docusaurus-plugin-content-docs/current/installation/requirements.md b/i18n/zh/docusaurus-plugin-content-docs/current/installation/requirements.md index b0d523544..1999732e1 100644 --- a/i18n/zh/docusaurus-plugin-content-docs/current/installation/requirements.md +++ b/i18n/zh/docusaurus-plugin-content-docs/current/installation/requirements.md @@ -126,7 +126,7 @@ The VXLAN port on nodes should not be exposed to the world as it opens up your c ::: :::danger -Flannel relies on the [Bridge CNI plugin](https://www.cni.dev/plugins/current/main/bridge/) to create a L2 network that switches traffic. Rogue pods with `NET_RAW` capabilities can abuse that L2 network to launch attacks such as [ARP spoofing](https://static.sched.com/hosted_files/kccncna19/72/ARP%20DNS%20spoof.pdf). Therefore, as documented in the [Kubernetes docs](https://kubernetes.io/docs/concepts/security/pod-security-standards/), please set a restricted profile that disables `NET_RAW` on non-trustable pods. +Flannel relies on the [Bridge CNI plugin](https://www.cni.dev/plugins/current/main/bridge/) to create a L2 network that switches traffic. Rogue pods with `NET_RAW` capabilities can abuse that L2 network to launch attacks such as ARP spoofing. Therefore, as documented in the [Kubernetes docs](https://kubernetes.io/docs/concepts/security/pod-security-standards/), please set a restricted profile that disables `NET_RAW` on non-trustable pods. ::: ### Inbound Rules for K3s Nodes