Skip to content

Commit b08292b

Browse files
committed
[zh-cn] sync v1.25 labels-annotations-taints/_index.md
1 parent 3d4d1fd commit b08292b

File tree

1 file changed

+19
-30
lines changed
  • content/zh-cn/docs/reference/labels-annotations-taints

1 file changed

+19
-30
lines changed

content/zh-cn/docs/reference/labels-annotations-taints/_index.md

Lines changed: 19 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -921,7 +921,7 @@ Used on: Node
921921
922922
The kubelet can set this annotation on a Node to denote its configured IPv4 address.
923923
924-
When kubelet is started with the "external" cloud provider, it sets this annotation on the Node to denote an IP address set from the command line flag (`--node-ip`). This IP is verified with the cloud provider as valid by the cloud-controller-manager.
924+
When kubelet is started with the `--cloud-provider` flag set to any value (includes both external and legacy in-tree cloud providers), it sets this annotation on the Node to denote an IP address set from the command line flag (`--node-ip`). This IP is verified with the cloud provider as valid by the cloud-controller-manager.
925925
-->
926926
### alpha.kubernetes.io/provided-node-ip {#alpha-kubernetes-io-provided-node-ip}
927927

@@ -931,7 +931,8 @@ When kubelet is started with the "external" cloud provider, it sets this annotat
931931

932932
kubelet 可以在 Node 上设置此注解来表示其配置的 IPv4 地址。
933933

934-
当使用“外部”云驱动启动时,kubelet 会在 Node 上设置此注解以表示从命令行标志 ( `--node-ip` ) 设置的 IP 地址。
934+
如果 kubelet 被启动时 `--cloud-provider` 标志设置为任一云驱动(包括外部云驱动和传统树内云驱动)
935+
kubelet 会在 Node 上设置此注解以表示从命令行标志(`--node-ip`)设置的 IP 地址。
935936
云控制器管理器通过云驱动验证此 IP 是否有效。
936937

937938
<!--
@@ -1129,7 +1130,7 @@ kubelet 检查 `/proc/sys/kernel/pid_max` 大小的 D 值和 Kubernetes 在 Node
11291130
<!--
11301131
Example: `node.kubernetes.io/out-of-service:NoExecute`
11311132
1132-
A user can manually add the taint to a Node marking it out-of-service. If the `NodeOutOfServiceVolumeDetach`
1133+
A user can manually add the taint to a Node marking it out-of-service. If the `NodeOutOfServiceVolumeDetach`
11331134
[feature gate](/docs/reference/command-line-tools-reference/feature-gates/) is enabled on
11341135
`kube-controller-manager`, and a Node is marked out-of-service with this taint, the pods on the node will be forcefully deleted if there are no matching tolerations on it and volume detach operations for the pods terminating on the node will happen immediately. This allows the Pods on the out-of-service node to recover quickly on a different node.
11351136
-->
@@ -1348,7 +1349,10 @@ for more information.
13481349
13491350
Example: `kubernetes.io/psp: restricted`
13501351
1351-
This annotation is only relevant if you are using [PodSecurityPolicies](/docs/concepts/security/pod-security-policy/).
1352+
Used on: Pod
1353+
1354+
This annotation was only relevant if you were using [PodSecurityPolicies](/docs/concepts/security/pod-security-policy/).
1355+
Kubernetes v{{< skew currentVersion >}} does not support the PodSecurityPolicy API.
13521356
13531357
When the PodSecurityPolicy admission controller admits a Pod, the admission controller
13541358
modifies the Pod to have this annotation.
@@ -1359,7 +1363,10 @@ The value of the annotation is the name of the PodSecurityPolicy that was used f
13591363

13601364
例如:`kubernetes.io/psp: restricted`
13611365

1366+
用于:Pod
1367+
13621368
这个注解只在你使用 [PodSecurityPolicies](/zh-cn/docs/concepts/security/pod-security-policy/) 时才有意义。
1369+
Kubernetes v{{< skew currentVersion >}} 不支持 PodSecurityPolicy API。
13631370

13641371
当 PodSecurityPolicy 准入控制器接受一个 Pod 时,会修改该 Pod,
13651372
并给这个 Pod 添加此注解。
@@ -1368,15 +1375,17 @@ The value of the annotation is the name of the PodSecurityPolicy that was used f
13681375
<!--
13691376
### seccomp.security.alpha.kubernetes.io/pod (deprecated) {#seccomp-security-alpha-kubernetes-io-pod}
13701377
1371-
This annotation has been deprecated since Kubernetes v1.19 and will become non-functional in v1.25.
1378+
This annotation has been deprecated since Kubernetes v1.19 and will become non-functional in a future release.
1379+
please use the corresponding pod or container `securityContext.seccompProfile` field instead.
13721380
To specify security settings for a Pod, include the `securityContext` field in the Pod specification.
13731381
The [`securityContext`](/docs/reference/kubernetes-api/workload-resources/pod-v1/#security-context) field within a Pod's `.spec` defines pod-level security attributes.
13741382
When you [specify the security context for a Pod](/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod),
13751383
the settings you specify apply to all containers in that Pod.
13761384
-->
13771385
### seccomp.security.alpha.kubernetes.io/pod (已弃用) {#seccomp-security-alpha-kubernetes-io-pod}
13781386

1379-
此注解自 Kubernetes v1.19 起已被弃用,将在 v1.25 中失效。
1387+
此注解自 Kubernetes v1.19 起已被弃用,将在未来的版本中失效。
1388+
请使用对应 Pod 或容器的 `securityContext.seccompProfile` 字段替代。
13801389
要为 Pod 指定安全设置,请在 Pod 规范中包含 `securityContext` 字段。
13811390
Pod 的 `.spec` 中的 [`securityContext`](/zh-cn/docs/reference/kubernetes-api/workload-resources/pod-v1/#security-context)
13821391
字段定义了 Pod 级别的安全属性。
@@ -1386,15 +1395,17 @@ Pod 的 `.spec` 中的 [`securityContext`](/zh-cn/docs/reference/kubernetes-api/
13861395
<!--
13871396
### container.seccomp.security.alpha.kubernetes.io/[NAME] {#container-seccomp-security-alpha-kubernetes-io}
13881397
1389-
This annotation has been deprecated since Kubernetes v1.19 and will become non-functional in v1.25.
1398+
This annotation has been deprecated since Kubernetes v1.19 and will become non-functional in a future release.
1399+
please use the corresponding pod or container `securityContext.seccompProfile` field instead.
13901400
The tutorial [Restrict a Container's Syscalls with seccomp](/docs/tutorials/security/seccomp/) takes
13911401
you through the steps you follow to apply a seccomp profile to a Pod or to one of
13921402
its containers. That tutorial covers the supported mechanism for configuring seccomp in Kubernetes,
13931403
based on setting `securityContext` within the Pod's `.spec`.
13941404
-->
13951405
### container.seccomp.security.alpha.kubernetes.io/[NAME] {#container-seccomp-security-alpha-kubernetes-io}
13961406

1397-
此注解自 Kubernetes v1.19 起已被弃用,将在 v1.25 中失效。
1407+
此注解自 Kubernetes v1.19 起已被弃用,将在未来的版本中失效。
1408+
请使用对应 Pod 或容器的 `securityContext.seccompProfile` 字段替代。
13981409
教程[使用 seccomp 限制容器的系统调用](/zh-cn/docs/tutorials/security/seccomp/)将引导你完成将
13991410
seccomp 配置文件应用于 Pod 或其容器的步骤。
14001411
该教程介绍了在 Kubernetes 中配置 seccomp 的支持机制,基于在 Pod 的 `.spec` 中设置 `securityContext`
@@ -1541,25 +1552,3 @@ Example: `node-role.kubernetes.io/control-plane:NoSchedule`
15411552
Taint that kubeadm applies on control plane nodes to allow only critical workloads to schedule on them.
15421553
-->
15431554
kubeadm 应用在控制平面节点上的污点,仅允许在其上调度关键工作负载。
1544-
1545-
### node-role.kubernetes.io/master
1546-
1547-
<!--
1548-
Used on: Node
1549-
1550-
Example: `node-role.kubernetes.io/master:NoSchedule`
1551-
-->
1552-
例子:`node-role.kubernetes.io/master:NoSchedule`
1553-
1554-
用于:Node
1555-
1556-
<!--
1557-
Taint that kubeadm applies on control plane nodes to allow only critical workloads to schedule on them.
1558-
1559-
Starting in v1.20, this taint is deprecated in favor of `node-role.kubernetes.io/control-plane` and will be removed in v1.25.
1560-
-->
1561-
kubeadm 应用在控制平面节点上的污点,仅允许在其上调度关键工作负载。
1562-
1563-
{{< note >}}
1564-
从 v1.20 开始,此污点已弃用,并将在 v1.25 中将其删除,取而代之的是 `node-role.kubernetes.io/control-plane`
1565-
{{< /note >}}

0 commit comments

Comments
 (0)