@@ -178,7 +178,8 @@ This admission controller allows all pods into the cluster. It is deprecated bec
178178
179179## 每个准入控制器的作用是什么?
180180
181- ### AlwaysAdmit {#alwaysadmit} {{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
181+ ### AlwaysAdmit {#alwaysadmit}
182+ {{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
182183
183184该准入控制器会允许所有的 pod 接入集群。已废弃,因为它的行为根本就和没有准入控制器一样。
184185
@@ -198,7 +199,8 @@ required.
198199如果没有这个准入控制器,一旦镜像被拉取到节点上,任何用户的 pod 都可以通过已了解到的镜像的名称(假设 pod 被调度到正确的节点上)来使用它,而不需要对镜像进行任何授权检查。
199200当启用这个准入控制器时,总是在启动容器之前拉取镜像,这意味着需要有效的凭证。
200201
201- ### AlwaysDeny {#alwaysdeny} {{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
202+ ### AlwaysDeny {#alwaysdeny}
203+ {{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
202204
203205<!--
204206Rejects all requests. AlwaysDeny is DEPRECATED as no real meaning.
@@ -245,7 +247,8 @@ if the pods don't already have toleration for taints
245247
246248该准入控制器为 Pod 设置默认的容忍度,在 5 分钟内容忍 ` notready:NoExecute ` 和 ` unreachable:NoExecute ` 污点。(如果 Pod 尚未容忍 ` node.kubernetes.io/not-ready:NoExecute ` 和 ` node.alpha.kubernetes.io/unreachable:NoExecute ` 污点的话)
247249
248- ### DenyExecOnPrivileged {#denyexeconprivileged} {{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
250+ ### DenyExecOnPrivileged {#denyexeconprivileged}
251+ {{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
249252
250253<!--
251254This admission controller will intercept all requests to exec a command in a pod if that pod has a privileged container.
@@ -269,7 +272,8 @@ is recommended instead.
269272建议使用基于策略的准入插件(例如 [ PodSecurityPolicy] ( #podsecuritypolicy ) 和自定义准入插件),
270273该插件可以针对特定用户或命名空间,还可以防止创建权限过高的 Pod。
271274
272- ### DenyEscalatingExec {#denyescalatingexec} {{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
275+ ### DenyEscalatingExec {#denyescalatingexec}
276+ {{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
273277
274278<!--
275279This admission controller will deny exec and attach commands to pods that run with escalated privileges that
@@ -292,7 +296,8 @@ DenyExecOnPrivileged 准入插件已被废弃,并将在 v1.18 被移除。
292296建议使用基于策略的准入插件(例如 [ PodSecurityPolicy] ( #podsecuritypolicy ) 和自定义准入插件),
293297该插件可以针对特定用户或命名空间,还可以防止创建权限过高的 Pod。
294298
295- ### EventRateLimit {#eventratelimit} {{< feature-state for_k8s_version="v1.13" state="alpha" >}}
299+ ### EventRateLimit {#eventratelimit}
300+ {{< feature-state for_k8s_version="v1.13" state="alpha" >}}
296301
297302<!--
298303This admission controller mitigates the problem where the API server gets flooded by
@@ -685,7 +690,8 @@ See the [limitRange design doc](https://git.k8s.io/community/contributors/design
685690
686691请查看 [limitRange 设计文档](https://git.k8s.io/community/contributors/design-proposals/resource-management/admission_control_limit_range.md) 和 [Limit Range 例子](/docs/tasks/configure-pod-container/limit-range/)了解更多细节。
687692
688- # ## MutatingAdmissionWebhook {#mutatingadmissionwebhook} {{< feature-state for_k8s_version="v1.13" state="beta" >}}
693+ # ## MutatingAdmissionWebhook {#mutatingadmissionwebhook}
694+ {{< feature-state for_k8s_version="v1.13" state="beta" >}}
689695
690696<!--
691697This admission controller calls any mutating webhooks which match the request. Matching
@@ -836,7 +842,8 @@ subresource of the referenced *owner* can change it.
836842
837843该准入控制器保护对 `metadata.ownerReferences` 对象的访问,以便只有对该对象具有 “删除” 权限的用户才能对其进行更改。该准入控制器还保护对 `metadata.ownerReferences[x].blockOwnerDeletion` 对象的访问,以便只有对所引用的 **属主(owner)** 的 `finalizers` 子资源具有 “更新” 权限的用户才能对其进行更改。
838844
839- # ## PersistentVolumeLabel {#persistentvolumelabel} {{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
845+ # ## PersistentVolumeLabel {#persistentvolumelabel}
846+ {{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
840847
841848<!--
842849This admission controller automatically attaches region or zone labels to PersistentVolumes
@@ -1107,7 +1114,8 @@ See also [Pod Overhead](/docs/concepts/configuration/pod-overhead/)
11071114for more information.
11081115-->
11091116
1110- # ## 容器运行时类 {#runtimeclass} {{< feature-state for_k8s_version="v1.16" state="alpha" >}}
1117+ # ## 容器运行时类 {#runtimeclass}
1118+ {{< feature-state for_k8s_version="v1.16" state="alpha" >}}
11111119
11121120[容器运行时类](/docs/concepts/containers/runtime-class/)定义描述了与运行 Pod 相关的开销。此准入控制器将相应地设置 pod.Spec.Overhead 字段。
11131121
@@ -1137,15 +1145,17 @@ The `StorageObjectInUseProtection` plugin adds the `kubernetes.io/pvc-protection
11371145-->
11381146` StorageObjectInUseProtection` 插件将 `kubernetes.io/pvc-protection` 或 `kubernetes.io/pv-protection` finalizers 添加到新创建的持久化卷声明(PVC)或持久化卷(PV)中。 如果用户尝试删除 PVC/PV,除非 PVC/PV 的保护控制器移除 finalizers,否则 PVC/PV 不会被删除。有关更多详细信息,请参考[保护使用中的存储对象](/docs/concepts/storage/persistent-volumes/#storage-object-in-use-protection)。
11391147
1140- # ## TaintNodesByCondition {#taintnodesbycondition} {{< feature-state for_k8s_version="v1.12" state="beta" >}}
1148+ # ## TaintNodesByCondition {#taintnodesbycondition}
1149+ {{< feature-state for_k8s_version="v1.12" state="beta" >}}
11411150
11421151<!--
11431152This admission controller {{< glossary_tooltip text="taints" term_id="taint" >}} newly created Nodes as `NotReady` and `NoSchedule`. That tainting avoids a race condition that could cause Pods to be scheduled on new Nodes before their taints were updated to accurately reflect their reported conditions.
11441153-->
11451154该准入控制器 {{< glossary_tooltip text="污点" term_id="taint" >}} 新创建的 `NotReady` 和 `NoSchedule` 节点。
11461155避免了可能导致 Pod 在更新其污点以准确反映其所报告状况之前,就安排了在新节点上的竞争条件的情况。
11471156
1148- # ## ValidatingAdmissionWebhook {#validatingadmissionwebhook} {{< feature-state for_k8s_version="v1.13" state="beta" >}}
1157+ # ## ValidatingAdmissionWebhook {#validatingadmissionwebhook}
1158+ {{< feature-state for_k8s_version="v1.13" state="beta" >}}
11491159
11501160<!--
11511161This admission controller calls any validating webhooks which match the request. Matching
0 commit comments