@@ -178,7 +178,8 @@ This admission controller allows all pods into the cluster. It is deprecated bec
178
178
179
179
## 每个准入控制器的作用是什么?
180
180
181
- ### AlwaysAdmit {#alwaysadmit} {{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
181
+ ### AlwaysAdmit {#alwaysadmit}
182
+ {{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
182
183
183
184
该准入控制器会允许所有的 pod 接入集群。已废弃,因为它的行为根本就和没有准入控制器一样。
184
185
@@ -198,7 +199,8 @@ required.
198
199
如果没有这个准入控制器,一旦镜像被拉取到节点上,任何用户的 pod 都可以通过已了解到的镜像的名称(假设 pod 被调度到正确的节点上)来使用它,而不需要对镜像进行任何授权检查。
199
200
当启用这个准入控制器时,总是在启动容器之前拉取镜像,这意味着需要有效的凭证。
200
201
201
- ### AlwaysDeny {#alwaysdeny} {{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
202
+ ### AlwaysDeny {#alwaysdeny}
203
+ {{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
202
204
203
205
<!--
204
206
Rejects all requests. AlwaysDeny is DEPRECATED as no real meaning.
@@ -245,7 +247,8 @@ if the pods don't already have toleration for taints
245
247
246
248
该准入控制器为 Pod 设置默认的容忍度,在 5 分钟内容忍 ` notready:NoExecute ` 和 ` unreachable:NoExecute ` 污点。(如果 Pod 尚未容忍 ` node.kubernetes.io/not-ready:NoExecute ` 和 ` node.alpha.kubernetes.io/unreachable:NoExecute ` 污点的话)
247
249
248
- ### DenyExecOnPrivileged {#denyexeconprivileged} {{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
250
+ ### DenyExecOnPrivileged {#denyexeconprivileged}
251
+ {{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
249
252
250
253
<!--
251
254
This admission controller will intercept all requests to exec a command in a pod if that pod has a privileged container.
@@ -269,7 +272,8 @@ is recommended instead.
269
272
建议使用基于策略的准入插件(例如 [ PodSecurityPolicy] ( #podsecuritypolicy ) 和自定义准入插件),
270
273
该插件可以针对特定用户或命名空间,还可以防止创建权限过高的 Pod。
271
274
272
- ### DenyEscalatingExec {#denyescalatingexec} {{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
275
+ ### DenyEscalatingExec {#denyescalatingexec}
276
+ {{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
273
277
274
278
<!--
275
279
This admission controller will deny exec and attach commands to pods that run with escalated privileges that
@@ -292,7 +296,8 @@ DenyExecOnPrivileged 准入插件已被废弃,并将在 v1.18 被移除。
292
296
建议使用基于策略的准入插件(例如 [ PodSecurityPolicy] ( #podsecuritypolicy ) 和自定义准入插件),
293
297
该插件可以针对特定用户或命名空间,还可以防止创建权限过高的 Pod。
294
298
295
- ### EventRateLimit {#eventratelimit} {{< feature-state for_k8s_version="v1.13" state="alpha" >}}
299
+ ### EventRateLimit {#eventratelimit}
300
+ {{< feature-state for_k8s_version="v1.13" state="alpha" >}}
296
301
297
302
<!--
298
303
This admission controller mitigates the problem where the API server gets flooded by
@@ -685,7 +690,8 @@ See the [limitRange design doc](https://git.k8s.io/community/contributors/design
685
690
686
691
请查看 [limitRange 设计文档](https://git.k8s.io/community/contributors/design-proposals/resource-management/admission_control_limit_range.md) 和 [Limit Range 例子](/docs/tasks/configure-pod-container/limit-range/)了解更多细节。
687
692
688
- # ## MutatingAdmissionWebhook {#mutatingadmissionwebhook} {{< feature-state for_k8s_version="v1.13" state="beta" >}}
693
+ # ## MutatingAdmissionWebhook {#mutatingadmissionwebhook}
694
+ {{< feature-state for_k8s_version="v1.13" state="beta" >}}
689
695
690
696
<!--
691
697
This admission controller calls any mutating webhooks which match the request. Matching
@@ -836,7 +842,8 @@ subresource of the referenced *owner* can change it.
836
842
837
843
该准入控制器保护对 `metadata.ownerReferences` 对象的访问,以便只有对该对象具有 “删除” 权限的用户才能对其进行更改。该准入控制器还保护对 `metadata.ownerReferences[x].blockOwnerDeletion` 对象的访问,以便只有对所引用的 **属主(owner)** 的 `finalizers` 子资源具有 “更新” 权限的用户才能对其进行更改。
838
844
839
- # ## PersistentVolumeLabel {#persistentvolumelabel} {{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
845
+ # ## PersistentVolumeLabel {#persistentvolumelabel}
846
+ {{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
840
847
841
848
<!--
842
849
This admission controller automatically attaches region or zone labels to PersistentVolumes
@@ -1107,7 +1114,8 @@ See also [Pod Overhead](/docs/concepts/configuration/pod-overhead/)
1107
1114
for more information.
1108
1115
-->
1109
1116
1110
- # ## 容器运行时类 {#runtimeclass} {{< feature-state for_k8s_version="v1.16" state="alpha" >}}
1117
+ # ## 容器运行时类 {#runtimeclass}
1118
+ {{< feature-state for_k8s_version="v1.16" state="alpha" >}}
1111
1119
1112
1120
[容器运行时类](/docs/concepts/containers/runtime-class/)定义描述了与运行 Pod 相关的开销。此准入控制器将相应地设置 pod.Spec.Overhead 字段。
1113
1121
@@ -1137,15 +1145,17 @@ The `StorageObjectInUseProtection` plugin adds the `kubernetes.io/pvc-protection
1137
1145
-->
1138
1146
` StorageObjectInUseProtection` 插件将 `kubernetes.io/pvc-protection` 或 `kubernetes.io/pv-protection` finalizers 添加到新创建的持久化卷声明(PVC)或持久化卷(PV)中。 如果用户尝试删除 PVC/PV,除非 PVC/PV 的保护控制器移除 finalizers,否则 PVC/PV 不会被删除。有关更多详细信息,请参考[保护使用中的存储对象](/docs/concepts/storage/persistent-volumes/#storage-object-in-use-protection)。
1139
1147
1140
- # ## TaintNodesByCondition {#taintnodesbycondition} {{< feature-state for_k8s_version="v1.12" state="beta" >}}
1148
+ # ## TaintNodesByCondition {#taintnodesbycondition}
1149
+ {{< feature-state for_k8s_version="v1.12" state="beta" >}}
1141
1150
1142
1151
<!--
1143
1152
This admission controller {{< glossary_tooltip text="taints" term_id="taint" >}} newly created Nodes as `NotReady` and `NoSchedule`. That tainting avoids a race condition that could cause Pods to be scheduled on new Nodes before their taints were updated to accurately reflect their reported conditions.
1144
1153
-->
1145
1154
该准入控制器 {{< glossary_tooltip text="污点" term_id="taint" >}} 新创建的 `NotReady` 和 `NoSchedule` 节点。
1146
1155
避免了可能导致 Pod 在更新其污点以准确反映其所报告状况之前,就安排了在新节点上的竞争条件的情况。
1147
1156
1148
- # ## ValidatingAdmissionWebhook {#validatingadmissionwebhook} {{< feature-state for_k8s_version="v1.13" state="beta" >}}
1157
+ # ## ValidatingAdmissionWebhook {#validatingadmissionwebhook}
1158
+ {{< feature-state for_k8s_version="v1.13" state="beta" >}}
1149
1159
1150
1160
<!--
1151
1161
This admission controller calls any validating webhooks which match the request. Matching
0 commit comments