Skip to content

Commit 64b61ae

Browse files
authored
Merge pull request #24126 from howieyuen/admission-controller
[zh] fix abnormal display of anchor points
2 parents 18e851a + 19259e2 commit 64b61ae

File tree

1 file changed

+20
-10
lines changed

1 file changed

+20
-10
lines changed

content/zh/docs/reference/access-authn-authz/admission-controllers.md

Lines changed: 20 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -178,7 +178,8 @@ This admission controller allows all pods into the cluster. It is deprecated bec
178178

179179
## 每个准入控制器的作用是什么?
180180

181-
### AlwaysAdmit {#alwaysadmit} {{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
181+
### AlwaysAdmit {#alwaysadmit}
182+
{{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
182183

183184
该准入控制器会允许所有的 pod 接入集群。已废弃,因为它的行为根本就和没有准入控制器一样。
184185

@@ -198,7 +199,8 @@ required.
198199
如果没有这个准入控制器,一旦镜像被拉取到节点上,任何用户的 pod 都可以通过已了解到的镜像的名称(假设 pod 被调度到正确的节点上)来使用它,而不需要对镜像进行任何授权检查。
199200
当启用这个准入控制器时,总是在启动容器之前拉取镜像,这意味着需要有效的凭证。
200201

201-
### AlwaysDeny {#alwaysdeny} {{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
202+
### AlwaysDeny {#alwaysdeny}
203+
{{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
202204

203205
<!--
204206
Rejects all requests. AlwaysDeny is DEPRECATED as no real meaning.
@@ -245,7 +247,8 @@ if the pods don't already have toleration for taints
245247

246248
该准入控制器为 Pod 设置默认的容忍度,在 5 分钟内容忍 `notready:NoExecute``unreachable:NoExecute` 污点。(如果 Pod 尚未容忍 `node.kubernetes.io/not-ready:NoExecute``node.alpha.kubernetes.io/unreachable:NoExecute` 污点的话)
247249

248-
### DenyExecOnPrivileged {#denyexeconprivileged} {{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
250+
### DenyExecOnPrivileged {#denyexeconprivileged}
251+
{{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
249252

250253
<!--
251254
This admission controller will intercept all requests to exec a command in a pod if that pod has a privileged container.
@@ -269,7 +272,8 @@ is recommended instead.
269272
建议使用基于策略的准入插件(例如 [PodSecurityPolicy](#podsecuritypolicy) 和自定义准入插件),
270273
该插件可以针对特定用户或命名空间,还可以防止创建权限过高的 Pod。
271274

272-
### DenyEscalatingExec {#denyescalatingexec} {{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
275+
### DenyEscalatingExec {#denyescalatingexec}
276+
{{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
273277

274278
<!--
275279
This admission controller will deny exec and attach commands to pods that run with escalated privileges that
@@ -292,7 +296,8 @@ DenyExecOnPrivileged 准入插件已被废弃,并将在 v1.18 被移除。
292296
建议使用基于策略的准入插件(例如 [PodSecurityPolicy](#podsecuritypolicy) 和自定义准入插件),
293297
该插件可以针对特定用户或命名空间,还可以防止创建权限过高的 Pod。
294298

295-
### EventRateLimit {#eventratelimit} {{< feature-state for_k8s_version="v1.13" state="alpha" >}}
299+
### EventRateLimit {#eventratelimit}
300+
{{< feature-state for_k8s_version="v1.13" state="alpha" >}}
296301

297302
<!--
298303
This admission controller mitigates the problem where the API server gets flooded by
@@ -685,7 +690,8 @@ See the [limitRange design doc](https://git.k8s.io/community/contributors/design
685690

686691
请查看 [limitRange 设计文档](https://git.k8s.io/community/contributors/design-proposals/resource-management/admission_control_limit_range.md) 和 [Limit Range 例子](/docs/tasks/configure-pod-container/limit-range/)了解更多细节。
687692

688-
### MutatingAdmissionWebhook {#mutatingadmissionwebhook} {{< feature-state for_k8s_version="v1.13" state="beta" >}}
693+
### MutatingAdmissionWebhook {#mutatingadmissionwebhook}
694+
{{< feature-state for_k8s_version="v1.13" state="beta" >}}
689695

690696
<!--
691697
This admission controller calls any mutating webhooks which match the request. Matching
@@ -836,7 +842,8 @@ subresource of the referenced *owner* can change it.
836842

837843
该准入控制器保护对 `metadata.ownerReferences` 对象的访问,以便只有对该对象具有 “删除” 权限的用户才能对其进行更改。该准入控制器还保护对 `metadata.ownerReferences[x].blockOwnerDeletion` 对象的访问,以便只有对所引用的 **属主(owner)** 的 `finalizers` 子资源具有 “更新” 权限的用户才能对其进行更改。
838844

839-
### PersistentVolumeLabel {#persistentvolumelabel} {{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
845+
### PersistentVolumeLabel {#persistentvolumelabel}
846+
{{< feature-state for_k8s_version="v1.13" state="deprecated" >}}
840847

841848
<!--
842849
This admission controller automatically attaches region or zone labels to PersistentVolumes
@@ -1107,7 +1114,8 @@ See also [Pod Overhead](/docs/concepts/configuration/pod-overhead/)
11071114
for more information.
11081115
-->
11091116

1110-
### 容器运行时类 {#runtimeclass} {{< feature-state for_k8s_version="v1.16" state="alpha" >}}
1117+
### 容器运行时类 {#runtimeclass}
1118+
{{< feature-state for_k8s_version="v1.16" state="alpha" >}}
11111119

11121120
[容器运行时类](/docs/concepts/containers/runtime-class/)定义描述了与运行 Pod 相关的开销。此准入控制器将相应地设置 pod.Spec.Overhead 字段。
11131121

@@ -1137,15 +1145,17 @@ The `StorageObjectInUseProtection` plugin adds the `kubernetes.io/pvc-protection
11371145
-->
11381146
`StorageObjectInUseProtection` 插件将 `kubernetes.io/pvc-protection` 或 `kubernetes.io/pv-protection` finalizers 添加到新创建的持久化卷声明(PVC)或持久化卷(PV)中。 如果用户尝试删除 PVC/PV,除非 PVC/PV 的保护控制器移除 finalizers,否则 PVC/PV 不会被删除。有关更多详细信息,请参考[保护使用中的存储对象](/docs/concepts/storage/persistent-volumes/#storage-object-in-use-protection)。
11391147

1140-
### TaintNodesByCondition {#taintnodesbycondition} {{< feature-state for_k8s_version="v1.12" state="beta" >}}
1148+
### TaintNodesByCondition {#taintnodesbycondition}
1149+
{{< feature-state for_k8s_version="v1.12" state="beta" >}}
11411150

11421151
<!--
11431152
This admission controller {{< glossary_tooltip text="taints" term_id="taint" >}} newly created Nodes as `NotReady` and `NoSchedule`. That tainting avoids a race condition that could cause Pods to be scheduled on new Nodes before their taints were updated to accurately reflect their reported conditions.
11441153
-->
11451154
该准入控制器 {{< glossary_tooltip text="污点" term_id="taint" >}} 新创建的 `NotReady` 和 `NoSchedule` 节点。
11461155
避免了可能导致 Pod 在更新其污点以准确反映其所报告状况之前,就安排了在新节点上的竞争条件的情况。
11471156

1148-
### ValidatingAdmissionWebhook {#validatingadmissionwebhook} {{< feature-state for_k8s_version="v1.13" state="beta" >}}
1157+
### ValidatingAdmissionWebhook {#validatingadmissionwebhook}
1158+
{{< feature-state for_k8s_version="v1.13" state="beta" >}}
11491159

11501160
<!--
11511161
This admission controller calls any validating webhooks which match the request. Matching

0 commit comments

Comments
 (0)