Skip to content

Commit 5a115ba

Browse files
authored
Merge pull request #45000 from Arhell/zh-typo
[zh] Resolve typos
2 parents 779ceeb + 8e162cb commit 5a115ba

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

content/zh-cn/docs/concepts/security/rbac-good-practices.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -151,7 +151,7 @@ Kubernetes 默认提供访问权限并非是每个集群都需要的。
151151
It is vital to periodically review the Kubernetes RBAC settings for redundant entries and
152152
possible privilege escalations.
153153
If an attacker is able to create a user account with the same name as a deleted user,
154-
they can automatically inherit all the rights of the deleted user, especially the
154+
they can automatically inherit all the rights of the deleted user, specially the
155155
rights assigned to that user.
156156
-->
157157
### 定期检查 {#periodic-review}
@@ -260,8 +260,8 @@ You should only allow access to create PersistentVolume objects for:
260260
你应该只允许以下实体具有创建 PersistentVolume 对象的访问权限:
261261

262262
<!--
263-
- users (cluster operators) that need this access for their work, and who you trust,
264-
- the Kubernetes control plane components which creates PersistentVolumes based on PersistentVolumeClaims
263+
- Users (cluster operators) that need this access for their work, and who you trust,
264+
- The Kubernetes control plane components which creates PersistentVolumes based on PersistentVolumeClaims
265265
that are configured for automatic provisioning.
266266
This is usually setup by the Kubernetes provider or by the operator when installing a CSI driver.
267267
-->

0 commit comments

Comments
 (0)