You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
### What profiles should I apply to my Windows Pods?
908
916
@@ -914,27 +922,26 @@ such, no standardized Pod Security profiles currently exists.
914
922
### 我应该为我的 Windows Pod 实施哪种框架?
915
923
916
924
Kubernetes 中的 Windows 负载与标准的基于 Linux 的负载相比有一些局限性和区别。
917
-
尤其是 Pod SecurityContext 字段
918
-
[对 Windows 不起作用](/zh/docs/setup/production-environment/windows/intro-windows-in-kubernetes/#v1-podsecuritycontext)。
925
+
尤其是 Pod SecurityContext
926
+
字段[对 Windows 不起作用](/zh/docs/setup/production-environment/windows/intro-windows-in-kubernetes/#v1-podsecuritycontext)。
919
927
因此,目前没有对应的标准 Pod 安全性框架。
920
928
921
-
922
929
<!--
923
930
If you apply the restricted profile for a Windows pod, this **may** have an impact on the pod
924
931
at runtime. The restricted profile requires enforcing Linux-specific restrictions (such as seccomp
925
932
profile, and disallowing privilege escalation). If the kubelet and / or its container runtime ignore
926
933
these Linux-specific values, then the Windows pod should still work normally within the restricted
927
934
profile. However, the lack of enforcement means that there is no additional restriction, for Pods
928
935
that use Windows containers, compared to the baseline profile.
929
-
930
-
The use of the HostProcess flag to create a HostProcess pod should only be done in alignment with the privileged policy. Creation of a Windows HostProcess pod is blocked under the baseline and restricted policies, so any HostProcess pod should be considered privileged.
931
936
-->
932
-
933
937
如果你为一个 Windows Pod 应用了 Restricted 策略,**可能会** 对该 Pod 的运行时产生影响。
934
938
Restricted 策略需要强制执行 Linux 特有的限制(如 seccomp Profile,并且禁止特权提升)。
935
939
如果 kubelet 和/或其容器运行时忽略了 Linux 特有的值,那么应该不影响 Windows Pod 正常工作。
936
940
然而,对于使用 Windows 容器的 Pod 来说,缺乏强制执行意味着相比于 Restricted 策略,没有任何额外的限制。
937
941
942
+
<!--
943
+
The use of the HostProcess flag to create a HostProcess pod should only be done in alignment with the privileged policy. Creation of a Windows HostProcess pod is blocked under the baseline and restricted policies, so any HostProcess pod should be considered privileged.
0 commit comments