diff --git a/content/en/docs/concepts/scheduling-eviction/assign-pod-node.md b/content/en/docs/concepts/scheduling-eviction/assign-pod-node.md index 44b3c07164..fe86f63501 100644 --- a/content/en/docs/concepts/scheduling-eviction/assign-pod-node.md +++ b/content/en/docs/concepts/scheduling-eviction/assign-pod-node.md @@ -120,7 +120,7 @@ your Pod spec. For example, consider the following Pod spec: -{{}} +{{< codenew file="pods/pod-with-node-affinity.yaml" >}} In this example, the following rules apply: @@ -167,7 +167,7 @@ scheduling decision for the Pod. For example, consider the following Pod spec: -{{}} +{{< codenew file="pods/pod-with-affinity-anti-affinity.yaml" >}} If there are two possible nodes that match the `requiredDuringSchedulingIgnoredDuringExecution` rule, one with the diff --git a/content/en/docs/reference/access-authn-authz/rbac.md b/content/en/docs/reference/access-authn-authz/rbac.md index f17b9ae8dd..ca93444fbc 100644 --- a/content/en/docs/reference/access-authn-authz/rbac.md +++ b/content/en/docs/reference/access-authn-authz/rbac.md @@ -31,7 +31,7 @@ kube-apiserver --authorization-mode=Example,RBAC --other-options --more-options The RBAC API declares four kinds of Kubernetes object: _Role_, _ClusterRole_, _RoleBinding_ and _ClusterRoleBinding_. You can [describe objects](/docs/concepts/overview/working-with-objects/kubernetes-objects/#understanding-kubernetes-objects), -or amend them, using tools such as `kubectl,` just like any other Kubernetes object. +or amend them, using tools such as `kubectl`, just like any other Kubernetes object. {{< caution >}} These objects, by design, impose access restrictions. If you are making changes diff --git a/content/en/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes.md b/content/en/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes.md index 6ebfcc2a28..0bc22b5f29 100644 --- a/content/en/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes.md +++ b/content/en/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes.md @@ -233,7 +233,7 @@ in order to configure checks that rely on gRPC. Here is an example manifest: -{{< codenew file="pods/probe/grpc-liveness.yaml">}} +{{< codenew file="pods/probe/grpc-liveness.yaml" >}} To use a gRPC probe, `port` must be configured. If the health endpoint is configured on a non-default service, you must also specify the `service`.