Skip to content

Commit 5706c58

Browse files
authored
Merge pull request #36154 from ydFu/fix-404-link
[zh] Fix some 404 links
2 parents dff7efc + bb92531 commit 5706c58

File tree

3 files changed

+15
-20
lines changed

3 files changed

+15
-20
lines changed

content/zh-cn/docs/concepts/security/pod-security-policy.md

Lines changed: 13 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,8 @@ content_type: concept
1313
weight: 30
1414
-->
1515

16+
<!-- overview -->
17+
1618
{{< feature-state for_k8s_version="v1.21" state="deprecated" >}}
1719

1820
{{< caution >}}
@@ -50,9 +52,9 @@ administrator to control the following:
5052
-->
5153
## 什么是 Pod 安全策略? {#what-is-a-pod-security-policy}
5254

53-
**Pod 安全策略(Pod Security Policy)**是集群级别的资源,它能够控制 Pod
55+
**Pod 安全策略(Pod Security Policy)** 是集群级别的资源,它能够控制 Pod
5456
规约中与安全性相关的各个方面。
55-
[PodSecurityPolicy](/zh-cn/docs/reference/generated/kubernetes-api/{{< param "version" >}}/#podsecuritypolicy-v1beta1-policy)
57+
[PodSecurityPolicy](/docs/reference/generated/kubernetes-api/{{< param "version" >}}/#podsecuritypolicy-v1beta1-policy)
5658
对象定义了一组 Pod 运行时必须遵循的条件及相关字段的默认值,只有 Pod 满足这些条件才会被系统接受。
5759
Pod 安全策略允许管理员控制如下操作:
5860

@@ -269,7 +271,7 @@ paired with system groups to grant access to all pods run in the namespace:
269271

270272
<!--
271273
For more examples of RBAC bindings, see
272-
[Role Binding Examples](/docs/reference/access-authn-authz/rbac#role-binding-examples).
274+
[RoleBinding examples](/docs/reference/access-authn-authz/rbac#role-binding-examples).
273275
For a complete example of authorizing a PodSecurityPolicy, see [below](#example).
274276
-->
275277
参阅[角色绑定示例](/zh-cn/docs/reference/access-authn-authz/rbac#role-binding-examples)查看
@@ -310,7 +312,7 @@ PodSecurityPolicy 正在被一个新的、简化的 `PodSecurity`
310312
- {{< example file="policy/restricted-psp.yaml" >}}Restricted{{< /example >}}
311313

312314
<!--
313-
2. Only bind PSPs to entire namespaces, by using the `system:serviceaccounts:<namespace>` group
315+
1. Only bind PSPs to entire namespaces, by using the `system:serviceaccounts:<namespace>` group
314316
(where `<namespace>` is the target namespace). For example:
315317

316318
```yaml
@@ -357,7 +359,7 @@ PodSecurityPolicy 正在被一个新的、简化的 `PodSecurity`
357359
<!--
358360
### Troubleshooting
359361

360-
- The [Controller Manager](/docs/reference/command-line-tools-reference/kube-controller-manager/)
362+
- The [controller manager](/docs/reference/command-line-tools-reference/kube-controller-manager/)
361363
must be run against the secured API port and must not have superuser permissions. See
362364
[Controlling Access to the Kubernetes API](/docs/concepts/security/controlling-access)
363365
to learn about API server access controls.
@@ -620,9 +622,9 @@ kubectl-user get pod pause -o yaml | grep kubernetes.io/psp
620622
```
621623

622624
<!--
623-
The output is similar to this:
625+
The output is similar to this
624626
-->
625-
输出类似于
627+
输出类似于
626628

627629
```
628630
kubernetes.io/psp: example
@@ -679,18 +681,15 @@ Let's try that again, slightly differently:
679681
kubectl-user create deployment pause --image=k8s.gcr.io/pause
680682
```
681683

682-
输出为:
683684

684-
```
685+
686+
```none
685687
deployment "pause" created
686688
```
687-
688689
```shell
689690
kubectl-user get pods
690691
```
691692

692-
输出为:
693-
694693
```
695694
No resources found.
696695
```
@@ -699,7 +698,6 @@ No resources found.
699698
kubectl-user get events | head -n 2
700699
```
701700

702-
输出为:
703701
```
704702
LASTSEEN FIRSTSEEN COUNT NAME KIND SUBOBJECT TYPE REASON SOURCE MESSAGE
705703
1m 2m 15 pause-7774d79b5 ReplicaSet Warning FailedCreate replicaset-controller Error creating: pods "pause-7774d79b5-" is forbidden: no providers available to validate pod request
@@ -791,9 +789,7 @@ up separately:
791789
kubectl-admin delete psp example
792790
```
793791

794-
输出类似于:
795-
796-
```none
792+
```
797793
podsecuritypolicy "example" deleted
798794
```
799795

@@ -1379,5 +1375,5 @@ Refer to the [Sysctl documentation](/docs/tasks/administer-cluster/sysctl-cluste
13791375

13801376
- 参阅 [Pod 安全标准](/zh-cn/docs/concepts/security/pod-security-standards/),
13811377
了解策略建议。
1382-
- 阅读 [PodSecurityPolicy 参考](/zh-cn/docs/reference/generated/kubernetes-api/{{< param "version" >}}/#podsecuritypolicy-v1beta1-policy),
1378+
- 阅读 [PodSecurityPolicy 参考](/docs/reference/generated/kubernetes-api/{{< param "version" >}}/#podsecuritypolicy-v1beta1-policy),
13831379
了解 API 细节。

content/zh-cn/docs/reference/glossary/host-aliases.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: HostAliases
33
id: HostAliases
44
date: 2019-01-31
5-
full_link: /zh-cn/docs/reference/generated/kubernetes-api/{{< param "version" >}}/#hostalias-v1-core
5+
full_link: /docs/reference/generated/kubernetes-api/{{< param "version" >}}/#hostalias-v1-core
66
short_description: >
77
主机别名 (HostAliases) 是一组 IP 地址和主机名的映射,用于注入到 Pod 内的 hosts 文件。
88

content/zh-cn/docs/reference/glossary/kubelet.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Kubelet
33
id: kubelet
44
date: 2018-04-12
5-
full_link: /zh-cn/docs/reference/generated/kubelet
5+
full_link: /docs/reference/generated/kubelet
66
short_description: >
77
一个在集群中每个节点上运行的代理。它保证容器都运行在 Pod 中。
88
@@ -38,4 +38,3 @@ The kubelet takes a set of PodSpecs that are provided through various mechanisms
3838
kubelet 接收一组通过各类机制提供给它的 PodSpecs,
3939
确保这些 PodSpecs 中描述的容器处于运行状态且健康。
4040
kubelet 不会管理不是由 Kubernetes 创建的容器。
41-

0 commit comments

Comments
 (0)