You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
If enabled, the kubelet will use the `RuntimeDefault` seccomp profile by default, which is
94
+
defined by the container runtime, instead of using the `Unconfined` (seccomp disabled) mode.
95
+
The default profiles aim to provide a strong set
96
+
of security defaults while preserving the functionality of the workload. It is
97
+
possible that the default profiles differ between container runtimes and their
98
+
release versions, for example when comparing those from CRI-O and containerd.
99
+
-->
100
+
如果启用,kubelet 将默认使用 `RuntimeDefault` seccomp 配置,
101
+
而不是使用 `Unconfined`(禁用 seccomp)模式,该配置由容器运行时定义。
102
+
默认配置旨在提供一组强大的安全默认值设置,同时避免影响工作负载的功能。
103
+
不同的容器运行时之间及其不同的发布版本之间的默认配置可能不同,
104
+
例如在比较 CRI-O 和 containerd 的配置文件时(就会发现这点)。
105
+
106
+
<!--
107
+
Some workloads may require a lower amount of syscall restrictions than others.
108
+
This means that they can fail during runtime even with the `RuntimeDefault`
109
+
profile. To mitigate such a failure, you can:
110
+
111
+
- Run the workload explicitly as `Unconfined`.
112
+
- Disable the `SeccompDefault` feature for the nodes. Also making sure that
113
+
workloads get scheduled on nodes where the feature is disabled.
114
+
- Create a custom seccomp profile for the workload.
115
+
-->
116
+
某些工作负载可能相比其他工作负载需要更少的系统调用限制。
117
+
这意味着即使使用 `RuntimeDefault` 配置文件,它们也可能在运行时失败。
118
+
要处理此类失效,你可以:
119
+
120
+
- 将工作负载显式运行为 `Unconfined`。
121
+
- 禁用节点的 `SeccompDefault` 功能。
122
+
还要确保工作负载被安排在禁用该功能的节点上。
123
+
- 为工作负载创建自定义 seccomp 配置文件。
124
+
125
+
<!--
126
+
If you were introducing this feature into production-like cluster, the Kubernetes project
127
+
recommends that you enable this feature gate on a subset of your nodes and then
128
+
test workload execution before rolling the change out cluster-wide.
129
+
130
+
More detailed information about a possible upgrade and downgrade strategy can be
131
+
found in the [related Kubernetes Enhancement Proposal (KEP)](https://github.com/kubernetes/enhancements/tree/a70cc18/keps/sig-node/2413-seccomp-by-default#upgrade--downgrade-strategy).
Copy file name to clipboardExpand all lines: content/zh/docs/tutorials/hello-minikube.md
+17-4Lines changed: 17 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -110,19 +110,32 @@ This tutorial provides a container image that uses NGINX to echo back all the re
110
110
4. 仅限 Katacoda 环境:输入“30000”,然后单击 **显示端口**。
111
111
112
112
<!--
113
-
The `dashboard` command enables the dashboard add-on and opens the proxy in the default web browser. You can create Kubernetes resources on the dashboard such as Deployment and Service.
113
+
The `dashboard` command enables the dashboard add-on and opens the proxy in the default web browser.
114
+
You can create Kubernetes resources on the dashboard such as Deployment and Service.
114
115
115
116
If you are running in an environment as root, see [Open Dashboard with URL](#open-dashboard-with-url).
116
117
117
-
To stop the proxy, run `Ctrl+C` to exit the process. The dashboard remains running.
118
+
By default, the dashboard is only accessible from within the internal Kubernetes virtual network.
119
+
The `dashboard` command creates a temporary proxy to make the dashboard accessible from outside the Kubernetes virtual network.
120
+
121
+
To stop the proxy, run `Ctrl+C` to exit the process.
122
+
After the command exits, the dashboard remains running in Kubernetes cluster.
123
+
You can run the `dashboard` command again to create another proxy to access the dashboard.
118
124
-->
119
125
{{< note >}}
120
-
`dashboard` 命令启用仪表板插件,并在默认的 Web 浏览器中打开代理。你可以在仪表板上创建 Kubernetes 资源,例如 Deployment 和 Service。
0 commit comments