You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
如果你定义应用了 Privileged 安全策略的 Pod,你所定义的这个 Pod 能够绕过典型的容器隔离机制。
64
+
例如,你可以定义有权访问节点主机网络的 Pod。
66
65
67
66
### Baseline
68
67
@@ -99,9 +98,15 @@ fail validation.
99
98
<tr>
100
99
<td style="white-space: nowrap">HostProcess</td>
101
100
<td>
102
-
<p><!--Windows pods offer the ability to run <a href="/docs/tasks/configure-pod-container/create-hostprocess-pod">HostProcess containers</a> which enables privileged access to the Windows node. Privileged access to the host is disallowed in the baseline policy. -->
103
-
Windows Pod 提供了运行 <a href="/zh-cn/docs/tasks/configure-pod-container/create-hostprocess-pod">HostProcess 容器</a> 的能力,这使得对 Windows 节点的特权访问成为可能。Baseline 策略中禁止对宿主的特权访问。{{< feature-state for_k8s_version="v1.26" state="stable" >}}
104
-
</p>
101
+
<p>
102
+
<!--
103
+
Windows Pods offer the ability to run <a href="/docs/tasks/configure-pod-container/create-hostprocess-pod">HostProcess containers</a> which enables privileged access to the Windows host machine. Privileged access to the host is disallowed in the Baseline policy.
On supported hosts, the <code>RuntimeDefault</code> AppArmor profile is applied by default. The baseline policy should prevent overriding or disabling the default AppArmor profile, or restrict overrides to an allowed set of profiles.
On supported hosts, the <code>RuntimeDefault</code> AppArmor profile is applied by default. The baseline policy should prevent overriding or disabling the default AppArmor profile, or restrict overrides to an allowed set of profiles.
Sysctls can disable security mechanisms or affect all containers on a host, and should be disallowed except for an allowed "safe" subset. A sysctl is considered safe if it is namespaced in the container or the Pod, and it is isolated from other Pods or processes on the same Node.
如果某 sysctl 是受容器或 Pod 的名字空间限制,且与节点上其他 Pod 或进程相隔离,可认为是安全的。
335
-
</p>
336
+
<!--
337
+
Sysctls can disable security mechanisms or affect all containers on a host, and should be disallowed except for an allowed "safe" subset. A sysctl is considered safe if it is namespaced in the container or the Pod, and it is isolated from other Pods or processes on the same Node.
@@ -574,7 +580,7 @@ of individual policies are not defined here.
574
580
{{% thirdparty-content %}}
575
581
576
582
<!--
577
-
Other alternatives for enforcing policies are being developed in the Kubernetes ecosystem, such as:
583
+
Other alternatives for enforcing policies are being developed in the Kubernetes ecosystem, such as:
578
584
-->
579
585
在 Kubernetes 生态系统中还在开发一些其他的替代方案,例如:
580
586
@@ -601,21 +607,21 @@ Kubernetes 中的 Windows 与基于 Linux 的工作负载相比有一些限制
601
607
602
608
{{< note >}}
603
609
<!--
604
-
Kubelets prior to v1.24 don't enforce the pod OS field, and if a cluster has nodes on versions earlier than v1.24 the restricted policies should be pinned to a version prior to v1.25.
610
+
Kubelets prior to v1.24 don't enforce the pod OS field, and if a cluster has nodes on versions earlier than v1.24 the Restricted policies should be pinned to a version prior to v1.25.
605
611
-->
606
-
v1.24 之前的 Kubelet 不强制处理 Pod OS 字段,如果集群中有些节点运行早于 v1.24 的版本,
607
-
则应将限制性的策略锁定到 v1.25 之前的版本。
612
+
v1.24 之前的 kubelet 不强制处理 Pod OS 字段,如果集群中有些节点运行早于 v1.24 的版本,
613
+
则应将 Restricted 策略锁定到 v1.25 之前的版本。
608
614
{{< /note >}}
609
615
610
616
<!--
611
617
### Restricted Pod Security Standard changes
612
-
Another important change, made in Kubernetes v1.25 is that the _restricted_ Pod security
618
+
Another important change, made in Kubernetes v1.25 is that the _Restricted_ policy
613
619
has been updated to use the `pod.spec.os.name` field. Based on the OS name, certain policies that are specific
614
620
to a particular OS can be relaxed for the other OS.
615
621
-->
616
622
### 限制性的 Pod Security Standard 变更 {#restricted-pod-security-standard-changes}
617
623
618
-
Kubernetes v1.25 中的另一个重要变化是**限制性的(Restricted)** Pod 安全性已更新,
624
+
Kubernetes v1.25 中的另一个重要变化是_Restricted_ 策略已更新,
619
625
能够处理 `pod.spec.os.name` 字段。根据 OS 名称,专用于特定 OS 的某些策略对其他 OS 可以放宽限制。
620
626
621
627
<!--
@@ -629,6 +635,7 @@ Restrictions on the following controls are only required if `.spec.os.name` is n
629
635
#### OS 特定的策略控制
630
636
631
637
仅当 `.spec.os.name` 不是 `windows` 时,才需要对以下控制进行限制:
638
+
632
639
- 特权提升
633
640
- Seccomp
634
641
- Linux 权能
@@ -644,32 +651,30 @@ the [documentation](/docs/concepts/workloads/pods/user-namespaces#integration-wi
0 commit comments