Skip to content

Commit

Permalink
Fixes bad punctuation pattern
Browse files Browse the repository at this point in the history
  • Loading branch information
ctauchen committed Dec 6, 2024
1 parent a00cd4d commit ffd843b
Show file tree
Hide file tree
Showing 37 changed files with 74 additions and 74 deletions.
6 changes: 3 additions & 3 deletions calico-cloud/networking/configuring/advertise-service-ips.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -116,7 +116,7 @@ If your $[prodname] deployment is configured to peer with BGP routers outside th
EOF
```
For help see, [BGP configuration resource](../../reference/resources/bgpconfig.mdx).
For help, see [BGP configuration resource](../../reference/resources/bgpconfig.mdx).
:::note
Expand Down Expand Up @@ -179,7 +179,7 @@ You will still need to enable service cluster IP advertisement via BGP configura
EOF
```
For help see, [BGP configuration resource](../../reference/resources/bgpconfig.mdx).
For help, see [BGP configuration resource](../../reference/resources/bgpconfig.mdx).
1. When configuring a Kubernetes service that you want to be reachable via an external IP, specify that external IP in the service's `externalIPs` field.
Expand Down Expand Up @@ -219,7 +219,7 @@ The following steps will configure $[prodname] to advertise Service `status.Load
EOF
```
For help see, [BGP configuration resource](../../reference/resources/bgpconfig.mdx).
For help, see [BGP configuration resource](../../reference/resources/bgpconfig.mdx).
Service LoadBalancer address allocation is outside the current scope of $[prodname], but can be implemented with an external controller.
You can build your own, or use a third-party implementation like the MetalLB project.
Expand Down
8 changes: 4 additions & 4 deletions calico-cloud/release-notes/index.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -714,7 +714,7 @@ Release of Container Threat Detection

With Container Threat Detection, you can monitor container activity using eBPF. Enable this feature to receive alerts based on file and process activity for known malicious and suspicious behavior. Alert events can be viewed on the Alerts page in Manager UI.

To get started see, [Container Threat Detection](../threat/container-threat-detection.mdx)
To get started, see [Container Threat Detection](../threat/container-threat-detection.mdx)

## September 26, 2022

Expand Down Expand Up @@ -754,7 +754,7 @@ We've made it easier for platform operators to share Image Assurance scan result
* Export one row per image or one row per image and CVE.
* Export CSV or JSON files.

To get started see, [Image Assurance](../image-assurance).
To get started, see [Image Assurance](../image-assurance).

### Malware detection is GA

Expand All @@ -765,7 +765,7 @@ Calico Cloud uses eBPF-based monitoring to log file hashes of programs running i
If there's a match to known malware from our threat intelligence library, you receive an alert.
You can view your alerts on the _Alerts_ page on Manager UI.

To get started see, [Malware Detection](../threat/container-threat-detection.mdx))
To get started, see [Malware Detection](../threat/container-threat-detection.mdx))

## July 27, 2022

Expand Down Expand Up @@ -849,4 +849,4 @@ The $[prodname] installation process will now require running a `kubectl apply`

$[prodname] introduces Image Assurance in tech preview, enabling DevOps and platform teams to scan images in public and private registries, and images that are automatically discovered in connected clusters. Image Assurance provides a runtime view into risk, based on discovered vulnerabilities. It also offers admission controller policies to enforce how vulnerable images are used to create resources within Kubernetes.

To get started see, [Image Assurance](../image-assurance).
To get started, see [Image Assurance](../image-assurance).
2 changes: 1 addition & 1 deletion calico-cloud/visibility/packetcapture.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,7 @@ Typically, when you troubleshoot microservices and applications for connectivity
1. Start/schedule a packet capture job in Service Graph (Manager UI) or the CLI.
1. After the capture is finished, download the packet capture files (known as `pcap` files), and import them into your analysis tool (for example, WireShark).

For a simple use case workflow see, [Faster troubleshooting of microservices, containers, and Kubernetes with Dynamic Packet Capture](https://www.tigera.io/blog/faster-troubleshooting-of-microservices-containers-and-kubernetes-with-dynamic-packet-capture/).
For a simple use case workflow, see [Faster troubleshooting of microservices, containers, and Kubernetes with Dynamic Packet Capture](https://www.tigera.io/blog/faster-troubleshooting-of-microservices-containers-and-kubernetes-with-dynamic-packet-capture/).

## Before you begin

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -116,7 +116,7 @@ If your $[prodname] deployment is configured to peer with BGP routers outside th
EOF
```
For help see, [BGP configuration resource](../../reference/resources/bgpconfig.mdx).
For help, see [BGP configuration resource](../../reference/resources/bgpconfig.mdx).
:::note
Expand Down Expand Up @@ -179,7 +179,7 @@ You will still need to enable service cluster IP advertisement via BGP configura
EOF
```
For help see, [BGP configuration resource](../../reference/resources/bgpconfig.mdx).
For help, see [BGP configuration resource](../../reference/resources/bgpconfig.mdx).
1. When configuring a Kubernetes service that you want to be reachable via an external IP, specify that external IP in the service's `externalIPs` field.
Expand Down Expand Up @@ -219,7 +219,7 @@ The following steps will configure $[prodname] to advertise Service `status.Load
EOF
```
For help see, [BGP configuration resource](../../reference/resources/bgpconfig.mdx).
For help, see [BGP configuration resource](../../reference/resources/bgpconfig.mdx).
Service LoadBalancer address allocation is outside the current scope of $[prodname], but can be implemented with an external controller.
You can build your own, or use a third-party implementation like the MetalLB project.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -661,7 +661,7 @@ Release of Container Threat Detection

With Container Threat Detection, you can monitor container activity using eBPF. Enable this feature to receive alerts based on file and process activity for known malicious and suspicious behavior. Alert events can be viewed on the Alerts page in Manager UI.

To get started see, [Container Threat Detection](../threat/container-threat-detection.mdx)
To get started, see [Container Threat Detection](../threat/container-threat-detection.mdx)

## September 26, 2022

Expand Down Expand Up @@ -701,7 +701,7 @@ We've made it easier for platform operators to share Image Assurance scan result
* Export one row per image or one row per image and CVE.
* Export CSV or JSON files.

To get started see, [Image Assurance](../image-assurance).
To get started, see [Image Assurance](../image-assurance).

### Malware detection is GA

Expand All @@ -712,7 +712,7 @@ Calico Cloud uses eBPF-based monitoring to log file hashes of programs running i
If there's a match to known malware from our threat intelligence library, you receive an alert.
You can view your alerts on the _Alerts_ page on Manager UI.

To get started see, [Malware Detection](../threat/container-threat-detection.mdx))
To get started, see [Malware Detection](../threat/container-threat-detection.mdx))

## July 27, 2022

Expand Down Expand Up @@ -796,4 +796,4 @@ The $[prodname] installation process will now require running a `kubectl apply`

$[prodname] introduces Image Assurance in tech preview, enabling DevOps and platform teams to scan images in public and private registries, and images that are automatically discovered in connected clusters. Image Assurance provides a runtime view into risk, based on discovered vulnerabilities. It also offers admission controller policies to enforce how vulnerable images are used to create resources within Kubernetes.

To get started see, [Image Assurance](../image-assurance).
To get started, see [Image Assurance](../image-assurance).
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,7 @@ Typically, when you troubleshoot microservices and applications for connectivity
1. Start/schedule a packet capture job in Service Graph (Manager UI) or the CLI.
1. After the capture is finished, download the packet capture files (known as `pcap` files), and import them into your analysis tool (for example, WireShark).

For a simple use case workflow see, [Faster troubleshooting of microservices, containers, and Kubernetes with Dynamic Packet Capture](https://www.tigera.io/blog/faster-troubleshooting-of-microservices-containers-and-kubernetes-with-dynamic-packet-capture/).
For a simple use case workflow, see [Faster troubleshooting of microservices, containers, and Kubernetes with Dynamic Packet Capture](https://www.tigera.io/blog/faster-troubleshooting-of-microservices-containers-and-kubernetes-with-dynamic-packet-capture/).

## Before you begin

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -116,7 +116,7 @@ If your $[prodname] deployment is configured to peer with BGP routers outside th
EOF
```
For help see, [BGP configuration resource](../../reference/resources/bgpconfig.mdx).
For help, see [BGP configuration resource](../../reference/resources/bgpconfig.mdx).
:::note
Expand Down Expand Up @@ -179,7 +179,7 @@ You will still need to enable service cluster IP advertisement via BGP configura
EOF
```
For help see, [BGP configuration resource](../../reference/resources/bgpconfig.mdx).
For help, see [BGP configuration resource](../../reference/resources/bgpconfig.mdx).
1. When configuring a Kubernetes service that you want to be reachable via an external IP, specify that external IP in the service's `externalIPs` field.
Expand Down Expand Up @@ -219,7 +219,7 @@ The following steps will configure $[prodname] to advertise Service `status.Load
EOF
```
For help see, [BGP configuration resource](../../reference/resources/bgpconfig.mdx).
For help, see [BGP configuration resource](../../reference/resources/bgpconfig.mdx).
Service LoadBalancer address allocation is outside the current scope of $[prodname], but can be implemented with an external controller.
You can build your own, or use a third-party implementation like the MetalLB project.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -710,7 +710,7 @@ Release of Container Threat Detection

With Container Threat Detection, you can monitor container activity using eBPF. Enable this feature to receive alerts based on file and process activity for known malicious and suspicious behavior. Alert events can be viewed on the Alerts page in Manager UI.

To get started see, [Container Threat Detection](../threat/container-threat-detection.mdx)
To get started, see [Container Threat Detection](../threat/container-threat-detection.mdx)

## September 26, 2022

Expand Down Expand Up @@ -750,7 +750,7 @@ We've made it easier for platform operators to share Image Assurance scan result
* Export one row per image or one row per image and CVE.
* Export CSV or JSON files.

To get started see, [Image Assurance](../image-assurance).
To get started, see [Image Assurance](../image-assurance).

### Malware detection is GA

Expand All @@ -761,7 +761,7 @@ Calico Cloud uses eBPF-based monitoring to log file hashes of programs running i
If there's a match to known malware from our threat intelligence library, you receive an alert.
You can view your alerts on the _Alerts_ page on Manager UI.

To get started see, [Malware Detection](../threat/container-threat-detection.mdx))
To get started, see [Malware Detection](../threat/container-threat-detection.mdx))

## July 27, 2022

Expand Down Expand Up @@ -845,4 +845,4 @@ The $[prodname] installation process will now require running a `kubectl apply`

$[prodname] introduces Image Assurance in tech preview, enabling DevOps and platform teams to scan images in public and private registries, and images that are automatically discovered in connected clusters. Image Assurance provides a runtime view into risk, based on discovered vulnerabilities. It also offers admission controller policies to enforce how vulnerable images are used to create resources within Kubernetes.

To get started see, [Image Assurance](../image-assurance).
To get started, see [Image Assurance](../image-assurance).
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,7 @@ Typically, when you troubleshoot microservices and applications for connectivity
1. Start/schedule a packet capture job in Service Graph (Manager UI) or the CLI.
1. After the capture is finished, download the packet capture files (known as `pcap` files), and import them into your analysis tool (for example, WireShark).

For a simple use case workflow see, [Faster troubleshooting of microservices, containers, and Kubernetes with Dynamic Packet Capture](https://www.tigera.io/blog/faster-troubleshooting-of-microservices-containers-and-kubernetes-with-dynamic-packet-capture/).
For a simple use case workflow, see [Faster troubleshooting of microservices, containers, and Kubernetes with Dynamic Packet Capture](https://www.tigera.io/blog/faster-troubleshooting-of-microservices-containers-and-kubernetes-with-dynamic-packet-capture/).

## Before you begin

Expand Down
2 changes: 1 addition & 1 deletion calico-enterprise/getting-started/bare-metal/about.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ In the following diagram, a Kubernetes cluster is running $[prodname] with netwo

For non-cluster hosts and VMs, you can secure host interfaces using **host endpoints**. Host endpoints can have labels that work the same as labels on pods/workload endpoints in Kubernetes. The advantage is that you can write network policy rules to apply to both workload endpoints and host endpoints using label selectors; where each selector can refer to the either type (or be a mix of the two). For example, you can easily write a global policy that applies to every host, VM, or pod that is running Calico.

To learn how to restrict traffic to/from hosts and VMs using Calico network policy see, [Protect hosts and VMs](../../network-policy/hosts/protect-hosts.mdx).
To learn how to restrict traffic to/from hosts and VMs using Calico network policy, see [Protect hosts and VMs](../../network-policy/hosts/protect-hosts.mdx).

## Before you begin

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -116,7 +116,7 @@ If your $[prodname] deployment is configured to peer with BGP routers outside th
EOF
```
For help see, [BGP configuration resource](../../reference/resources/bgpconfig.mdx).
For help, see [BGP configuration resource](../../reference/resources/bgpconfig.mdx).
:::note
Expand Down Expand Up @@ -179,7 +179,7 @@ You will still need to enable service cluster IP advertisement via BGP configura
EOF
```
For help see, [BGP configuration resource](../../reference/resources/bgpconfig.mdx).
For help, see [BGP configuration resource](../../reference/resources/bgpconfig.mdx).
1. When configuring a Kubernetes service that you want to be reachable via an external IP, specify that external IP in the service's `externalIPs` field.
Expand Down Expand Up @@ -219,7 +219,7 @@ The following steps will configure $[prodname] to advertise Service `status.Load
EOF
```
For help see, [BGP configuration resource](../../reference/resources/bgpconfig.mdx).
For help, see [BGP configuration resource](../../reference/resources/bgpconfig.mdx).
Service LoadBalancer address allocation is outside the current scope of $[prodname], but can be implemented with an external controller.
You can build your own, or use a third-party implementation like the MetalLB project.
Expand Down
2 changes: 1 addition & 1 deletion calico-enterprise/visibility/packetcapture.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,7 @@ Typically, when you troubleshoot microservices and applications for connectivity
1. Start/schedule a packet capture job in Service Graph (Manager UI) or the CLI.
1. After the capture is finished, download the packet capture files (known as `pcap` files), and import them into your analysis tool (for example, WireShark).

For a simple use case workflow see, [Faster troubleshooting of microservices, containers, and Kubernetes with Dynamic Packet Capture](https://www.tigera.io/blog/faster-troubleshooting-of-microservices-containers-and-kubernetes-with-dynamic-packet-capture/).
For a simple use case workflow, see [Faster troubleshooting of microservices, containers, and Kubernetes with Dynamic Packet Capture](https://www.tigera.io/blog/faster-troubleshooting-of-microservices-containers-and-kubernetes-with-dynamic-packet-capture/).

## Before you begin

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ A non-cluster host is a computer that is running an application that is _not par

For non-cluster hosts, you can secure host interfaces using **host endpoints**. Host endpoints can have labels, and work the same as labels on pods/workload endpoints. The advantage is that you can write network policy rules to apply to both workload endpoints and host endpoints using label selectors; where each selector can refer to the either type (or be a mix of the two). For example, you can write a cluster-wide policy for non-cluster hosts that is immediately applied to every host.

To learn how to restrict traffic to/from hosts and VMs using $[prodname] network policy see, [Protect hosts](../../network-policy/hosts/protect-hosts.mdx).
To learn how to restrict traffic to/from hosts and VMs using $[prodname] network policy, see [Protect hosts](../../network-policy/hosts/protect-hosts.mdx).

## Before you begin

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -116,7 +116,7 @@ If your $[prodname] deployment is configured to peer with BGP routers outside th
EOF
```
For help see, [BGP configuration resource](../../reference/resources/bgpconfig.mdx).
For help, see [BGP configuration resource](../../reference/resources/bgpconfig.mdx).
:::note
Expand Down Expand Up @@ -179,7 +179,7 @@ You will still need to enable service cluster IP advertisement via BGP configura
EOF
```
For help see, [BGP configuration resource](../../reference/resources/bgpconfig.mdx).
For help, see [BGP configuration resource](../../reference/resources/bgpconfig.mdx).
1. When configuring a Kubernetes service that you want to be reachable via an external IP, specify that external IP in the service's `externalIPs` field.
Expand Down Expand Up @@ -219,7 +219,7 @@ The following steps will configure $[prodname] to advertise Service `status.Load
EOF
```
For help see, [BGP configuration resource](../../reference/resources/bgpconfig.mdx).
For help, see [BGP configuration resource](../../reference/resources/bgpconfig.mdx).
Service LoadBalancer address allocation is outside the current scope of $[prodname], but can be implemented with an external controller.
You can build your own, or use a third-party implementation like the MetalLB project.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,7 @@ Typically, when you troubleshoot microservices and applications for connectivity
1. Start/schedule a packet capture job in Service Graph (Manager UI) or the CLI.
1. After the capture is finished, download the packet capture files (known as `pcap` files), and import them into your analysis tool (for example, WireShark).

For a simple use case workflow see, [Faster troubleshooting of microservices, containers, and Kubernetes with Dynamic Packet Capture](https://www.tigera.io/blog/faster-troubleshooting-of-microservices-containers-and-kubernetes-with-dynamic-packet-capture/).
For a simple use case workflow, see [Faster troubleshooting of microservices, containers, and Kubernetes with Dynamic Packet Capture](https://www.tigera.io/blog/faster-troubleshooting-of-microservices-containers-and-kubernetes-with-dynamic-packet-capture/).

## Before you begin

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ A non-cluster host is a computer that is running an application that is _not par

For non-cluster hosts, you can secure host interfaces using **host endpoints**. Host endpoints can have labels, and work the same as labels on pods/workload endpoints. The advantage is that you can write network policy rules to apply to both workload endpoints and host endpoints using label selectors; where each selector can refer to the either type (or be a mix of the two). For example, you can write a cluster-wide policy for non-cluster hosts that is immediately applied to every host.

To learn how to restrict traffic to/from hosts and VMs using $[prodname] network policy see, [Protect hosts](../../network-policy/hosts/protect-hosts.mdx).
To learn how to restrict traffic to/from hosts and VMs using $[prodname] network policy, see [Protect hosts](../../network-policy/hosts/protect-hosts.mdx).

## Before you begin

Expand Down
Loading

0 comments on commit ffd843b

Please sign in to comment.