You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<p><!--Windows pods offer the ability to run <a href="/docs/tasks/configure-pod-container/create-hostprocess-pod">HostProcess containers</a> which enables privileged access to the Windows node. Privileged access to the host is disallowed in the baseline policy. -->
106
103
Windows Pod 提供了运行 <a href="/zh-cn/docs/tasks/configure-pod-container/create-hostprocess-pod">HostProcess 容器</a> 的能力,这使得对 Windows 节点的特权访问成为可能。Baseline 策略中禁止对宿主的特权访问。{{< feature-state for_k8s_version="v1.23" state="beta" >}}
<p><!--Seccomp profile must not be explicitly set to <code>Unconfined</code>.-->Seccomp 配置必须不能显式设置为 <code>Unconfined</code>。</p>
@@ -304,7 +300,7 @@ fail validation.
304
300
</td>
305
301
</tr>
306
302
<tr>
307
-
<td>Sysctls</td>
303
+
<tdstyle="white-space: nowrap">Sysctls</td>
308
304
<td>
309
305
<p><!--Sysctls can disable security mechanisms or affect all containers on a host, and should be disallowed except for an allowed "safe" subset. A sysctl is considered safe if it is namespaced in the container or the Pod, and it is isolated from other Pods or processes on the same Node.-->Sysctls 可以禁用安全机制或影响宿主上所有容器,因此除了若干“安全”的子集之外,应该被禁止。如果某 sysctl 是受容器或 Pod 的名字空间限制,且与节点上其他 Pod 或进程相隔离,可认为是安全的。</p>
<p><!--In addition to restricting HostPath volumes, the restricted policy limits usage of non-core volume types to those defined through PersistentVolumes.-->除了限制 HostPath 卷之外,此类策略还限制可以通过 PersistentVolumes 定义的非核心卷类型。</p>
<!--The container fields may be undefined/<code>nil</code> if the pod-level <code>spec.securityContext.seccompProfile.type</code> field is set appropriately. Conversely, the pod-level field may be undefined/<code>nil</code> if _all_ container- level fields are set.-->如果 Pod 级别的 <code>spec.securityContext.seccompProfile.type</code> 已设置得当,容器级别的安全上下文字段可以为 未定义/<code>nil</code>。反而言之,如果 <bold>所有的</bold> 容器级别的安全上下文字段已设置,则 Pod 级别的字段可为 未定义/<code>nil</code>。
452
+
<!--
453
+
The container fields may be undefined/<code>nil</code> if the pod-level
454
+
<code>spec.securityContext.seccompProfile.type</code> field is set appropriately.
455
+
Conversely, the pod-level field may be undefined/<code>nil</code> if _all_ container-
456
+
level fields are set.
457
+
-->
458
+
如果 Pod 级别的 <code>spec.securityContext.seccompProfile.type</code>
<!--Containers must drop <code>ALL</code> capabilities, and are only permitted to add back the <code>NET_BIND_SERVICE</code> capability.-->容器必须弃用 <code>ALL</code> 权能,并且只允许添加 <code>NET_BIND_SERVICE</code> 权能。
469
+
<!--
470
+
Containers must drop <code>ALL</code> capabilities, and are only permitted to add back
### What profiles should I apply to my Windows Pods?
596
606
597
607
Windows in Kubernetes has some limitations and differentiators from standard Linux-based
598
-
workloads. Specifically, the Pod SecurityContext fields [have no effect on
599
-
Windows](/docs/setup/production-environment/windows/intro-windows-in-kubernetes/#v1-podsecuritycontext). As
600
-
such, no standardized Pod Security profiles currently exists.
608
+
workloads. Specifically, many of the Pod SecurityContext fields
609
+
[have no effect on Windows](/docs/concepts/windows/intro/#compatibility-v1-pod-spec-containers-securitycontext).
610
+
As such, no standardized Pod Security profiles currently exist.
601
611
-->
602
612
### 我应该为我的 Windows Pod 实施哪种框架?
603
613
604
614
Kubernetes 中的 Windows 负载与标准的基于 Linux 的负载相比有一些局限性和区别。
605
615
尤其是 Pod SecurityContext
606
-
字段[对 Windows 不起作用](/zh-cn/docs/setup/production-environment/windows/intro-windows-in-kubernetes/#v1-podsecuritycontext)。
616
+
字段[对 Windows 不起作用](/zh-cn/docs/concepts/windows/intro/#compatibility-v1-pod-spec-containers-securitycontext)。
607
617
因此,目前没有对应的标准 Pod 安全性框架。
608
618
609
-
<!--
619
+
<!--
610
620
If you apply the restricted profile for a Windows pod, this **may** have an impact on the pod
611
621
at runtime. The restricted profile requires enforcing Linux-specific restrictions (such as seccomp
612
622
profile, and disallowing privilege escalation). If the kubelet and / or its container runtime ignore
@@ -620,7 +630,9 @@ Restricted 策略需要强制执行 Linux 特有的限制(如 seccomp Profile
620
630
然而,对于使用 Windows 容器的 Pod 来说,缺乏强制执行意味着相比于 Restricted 策略,没有任何额外的限制。
621
631
622
632
<!--
623
-
The use of the HostProcess flag to create a HostProcess pod should only be done in alignment with the privileged policy. Creation of a Windows HostProcess pod is blocked under the baseline and restricted policies, so any HostProcess pod should be considered privileged.
633
+
The use of the HostProcess flag to create a HostProcess pod should only be done in alignment with the privileged policy.
634
+
Creation of a Windows HostProcess pod is blocked under the baseline and restricted policies,
635
+
so any HostProcess pod should be considered privileged.
0 commit comments