Skip to content

Commit da1eec6

Browse files
authored
Merge pull request #22994 from tengqm/zh-links-concepts-5
[zh] Fix links in concepts section (5)
2 parents a8d8313 + b4189b5 commit da1eec6

File tree

9 files changed

+484
-369
lines changed

9 files changed

+484
-369
lines changed

content/en/docs/concepts/extend-kubernetes/extend-cluster.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ This diagram shows the extension points in a Kubernetes system.
9797
1. Users often interact with the Kubernetes API using `kubectl`. [Kubectl plugins](/docs/tasks/extend-kubectl/kubectl-plugins/) extend the kubectl binary. They only affect the individual user's local environment, and so cannot enforce site-wide policies.
9898
2. The apiserver handles all requests. Several types of extension points in the apiserver allow authenticating requests, or blocking them based on their content, editing content, and handling deletion. These are described in the [API Access Extensions](/docs/concepts/extend-kubernetes/#api-access-extensions) section.
9999
3. The apiserver serves various kinds of *resources*. *Built-in resource kinds*, like `pods`, are defined by the Kubernetes project and can't be changed. You can also add resources that you define, or that other projects have defined, called *Custom Resources*, as explained in the [Custom Resources](/docs/concepts/extend-kubernetes/#user-defined-types) section. Custom Resources are often used with API Access Extensions.
100-
4. The Kubernetes scheduler decides which nodes to place pods on. There are several ways to extend scheduling. These are described in the [Scheduler Extensions](/docs/concepts/overview/extending#scheduler-extensions) section.
100+
4. The Kubernetes scheduler decides which nodes to place pods on. There are several ways to extend scheduling. These are described in the [Scheduler Extensions](/docs/concepts/extend-kubernetes/#scheduler-extensions) section.
101101
5. Much of the behavior of Kubernetes is implemented by programs called Controllers which are clients of the API-Server. Controllers are often used in conjunction with Custom Resources.
102102
6. The kubelet runs on servers, and helps pods appear like virtual servers with their own IPs on the cluster network. [Network Plugins](/docs/concepts/extend-kubernetes/#network-plugins) allow for different implementations of pod networking.
103103
7. The kubelet also mounts and unmounts volumes for containers. New types of storage can be supported via [Storage Plugins](/docs/concepts/extend-kubernetes/#storage-plugins).

content/zh/docs/concepts/architecture/control-plane-node-communication.md

Lines changed: 10 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,6 @@ weight: 20
55
---
66

77
<!--
8-
reviewers:
9-
- dchen1107
10-
- liggitt
118
title: Control Plane-Node Communication
129
content_type: concept
1310
weight: 20
@@ -20,8 +17,7 @@ aliases:
2017
<!--
2118
This document catalogs the communication paths between the control plane (really the apiserver) and the Kubernetes cluster. The intent is to allow users to customize their installation to harden the network configuration such that the cluster can be run on an untrusted network (or on fully public IPs on a cloud provider).
2219
-->
23-
24-
本文对控制面节点(确切说是 apiserver)和 Kubernetes 集群之间的通信路径进行了分类。
20+
本文列举控制面节点(确切说是 API 服务器)和 Kubernetes 集群之间的通信路径。
2521
目的是为了让用户能够自定义他们的安装,以实现对网络配置的加固,使得集群能够在不可信的网络上
2622
(或者在一个云服务商完全公开的 IP 上)运行。
2723

@@ -31,24 +27,22 @@ This document catalogs the communication paths between the control plane (really
3127
Kubernetes has a "hub-and-spoke" API pattern. All API usage from nodes (or the pods they run) terminate at the apiserver (none of the other control plane components are designed to expose remote services). The apiserver is configured to listen for remote connections on a secure HTTPS port (typically 443) with one or more forms of client [authentication](/docs/reference/access-authn-authz/authentication/) enabled.
3228
One or more forms of [authorization](/docs/reference/access-authn-authz/authorization/) should be enabled, especially if [anonymous requests](/docs/reference/access-authn-authz/authentication/#anonymous-requests) or [service account tokens](/docs/reference/access-authn-authz/authentication/#service-account-tokens) are allowed.
3329
-->
34-
3530
## 节点到控制面
3631

3732
Kubernetes 采用的是中心辐射型(Hub-and-Spoke)API 模式。
3833
所有从集群(或所运行的 Pods)发出的 API 调用都终止于 apiserver(其它控制面组件都没有被设计为可暴露远程服务)。
3934
apiserver 被配置为在一个安全的 HTTPS 端口(443)上监听远程连接请求,
40-
并启用一种或多种形式的客户端[身份认证](/docs/reference/access-authn-authz/authentication/)机制。
41-
一种或多种客户端[鉴权机制](/docs/reference/access-authn-authz/authorization/)应该被启用,
42-
特别是在允许使用[匿名请求](/docs/reference/access-authn-autha/authentication/#anonymous-requests)
43-
[服务账号令牌](/docs/reference/access-authn-authz/authentication/#service-account-tokens)的时候。
35+
并启用一种或多种形式的客户端[身份认证](/zh/docs/reference/access-authn-authz/authentication/)机制。
36+
一种或多种客户端[鉴权机制](/zh/docs/reference/access-authn-authz/authorization/)应该被启用,
37+
特别是在允许使用[匿名请求](/zh/docs/reference/access-authn-autha/authentication/#anonymous-requests)
38+
[服务账号令牌](/zh/docs/reference/access-authn-authz/authentication/#service-account-tokens)的时候。
4439

4540
<!--
4641
Nodes should be provisioned with the public root certificate for the cluster such that they can connect securely to the apiserver along with valid client credentials. For example, on a default GKE deployment, the client credentials provided to the kubelet are in the form of a client certificate. See [kubelet TLS bootstrapping](/docs/reference/command-line-tools-reference/kubelet-tls-bootstrapping/) for automated provisioning of kubelet client certificates.
4742
-->
48-
4943
应该使用集群的公共根证书开通节点,这样它们就能够基于有效的客户端凭据安全地连接 apiserver。
5044
例如:在一个默认的 GCE 部署中,客户端凭据以客户端证书的形式提供给 kubelet。
51-
请查看 [kubelet TLS 启动引导](/docs/reference/command-line-tools-reference/kubelet-tls-bootstrapping/)
45+
请查看 [kubelet TLS 启动引导](/zh/docs/reference/command-line-tools-reference/kubelet-tls-bootstrapping/)
5246
以了解如何自动提供 kubelet 客户端证书。
5347

5448
<!--
@@ -57,7 +51,6 @@ The `kubernetes` service (in all namespaces) is configured with a virtual IP add
5751
5852
The control plane components also communicate with the cluster apiserver over the secure port.
5953
-->
60-
6154
想要连接到 apiserver 的 Pod 可以使用服务账号安全地进行连接。
6255
当 Pod 被实例化时,Kubernetes 自动把公共根证书和一个有效的持有者令牌注入到 Pod 里。
6356
`kubernetes` 服务(位于所有名字空间中)配置了一个虚拟 IP 地址,用于(通过 kube-proxy)转发
@@ -68,15 +61,13 @@ The control plane components also communicate with the cluster apiserver over th
6861
<!--
6962
As a result, the default operating mode for connections from the nodes and pods running on the nodes to the control plane is secured by default and can run over untrusted and/or public networks.
7063
-->
71-
7264
这样,从集群节点和节点上运行的 Pod 到控制面的连接的缺省操作模式即是安全的,能够在不可信的网络或公网上运行。
7365

7466
<!--
7567
## Control Plane to node
7668
7769
There are two primary communication paths from the control plane (apiserver) to the nodes. The first is from the apiserver to the kubelet process which runs on each node in the cluster. The second is from the apiserver to any node, pod, or service through the apiserver's proxy functionality.
7870
-->
79-
8071
## 控制面到节点
8172

8273
从控制面(apiserver)到节点有两种主要的通信路径。
@@ -94,8 +85,7 @@ The connections from the apiserver to the kubelet are used for:
9485
9586
These connections terminate at the kubelet's HTTPS endpoint. By default, the apiserver does not verify the kubelet's serving certificate, which makes the connection subject to man-in-the-middle attacks, and **unsafe** to run over untrusted and/or public networks.
9687
-->
97-
98-
### apiserver 到 kubelet
88+
### API 服务器到 kubelet
9989

10090
从 apiserver 到 kubelet 的连接用于:
10191

@@ -122,7 +112,8 @@ Finally, [Kubelet authentication and/or authorization](/docs/admin/kubelet-authe
122112
如果无法实现这点,又要求避免在非受信网络或公共网络上进行连接,可在 apiserver 和
123113
kubelet 之间使用 [SSH 隧道](#ssh-tunnels)
124114

125-
最后,应该启用 [Kubelet 用户认证和/或鉴权](/docs/admin/kubelet-authentication-authorization/)来保护 kubelet API。
115+
最后,应该启用 [Kubelet 用户认证和/或鉴权](/zh/docs/reference/command-line-tools-reference/kubelet-authentication-authorization/)
116+
来保护 kubelet API。
126117

127118
<!--
128119
### apiserver to nodes, pods, and services
@@ -177,5 +168,5 @@ Konnectivity 服务包含两个部分:Konnectivity 服务器和 Konnectivity
177168
控制面网络和节点网络中。Konnectivity 代理建立并维持到 Konnectivity 服务器的网络连接。
178169
启用 Konnectivity 服务之后,所有控制面到节点的通信都通过这些连接传输。
179170

180-
请浏览 [Konnectivity 服务任务](/docs/tasks/extend-kubernetes/setup-konnectivity/)
171+
请浏览 [Konnectivity 服务任务](/zh/docs/tasks/extend-kubernetes/setup-konnectivity/)
181172
在你的集群中配置 Konnectivity 服务。

0 commit comments

Comments
 (0)