You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/zh-cn/docs/concepts/security/api-server-bypass-risks.md
+11-10Lines changed: 11 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,8 @@ Kubernetes API 服务器是外部(用户和服务)与集群交互的主要
23
23
24
24
<!--
25
25
As part of this role, the API server has several key built-in security controls, such as
26
-
audit logging and {{< glossary_tooltip text="admission controllers" term_id="admission-controller" >}}. However, there are ways to modify the configuration
26
+
audit logging and {{< glossary_tooltip text="admission controllers" term_id="admission-controller" >}}.
27
+
However, there are ways to modify the configuration
27
28
or content of the cluster that bypass these controls.
28
29
-->
29
30
作为此角色的一部分,API 服务器有几个关键的内置安全控制,
@@ -91,13 +92,13 @@ API server. However, the Pod still runs on the node. For more information, refer
91
92
92
93
<!--
93
94
- Only [enable the kubelet static Pod manifest functionality](/docs/tasks/configure-pod-container/static-pod/#static-pod-creation)
94
-
if required by the node.
95
+
if required by the node.
95
96
- If a node uses the static Pod functionality, restrict filesystem access to the static Pod manifest directory
96
-
or URL to users who need the access.
97
+
or URL to users who need the access.
97
98
- Restrict access to kubelet configuration parameters and files to prevent an attacker setting
98
-
a static Pod path or URL.
99
+
a static Pod path or URL.
99
100
- Regularly audit and centrally report all access to directories or web storage locations that host
100
-
static Pod manifests and kubelet configuration files.
101
+
static Pod manifests and kubelet configuration files.
101
102
-->
102
103
- 仅在节点需要时[启用 kubelet 静态 Pod 清单功能](/zh-cn/docs/tasks/configure-pod-container/static-pod/#static-pod-creation)。
103
104
- 如果节点使用静态 Pod 功能,请将对静态 Pod 清单目录或 URL 的文件系统的访问权限限制为需要访问的用户。
@@ -268,13 +269,13 @@ control plane components.
268
269
269
270
<!--
270
271
- Ensure that you tightly control filesystem access to container runtime sockets.
271
-
When possible, restrict this access to the `root` user.
272
+
When possible, restrict this access to the `root` user.
272
273
- Isolate the kubelet from other components running on the node, using
273
-
mechanisms such as Linux kernel namespaces.
274
+
mechanisms such as Linux kernel namespaces.
274
275
- Ensure that you restrict or forbid the use of [`hostPath` mounts](/docs/concepts/storage/volumes/#hostpath)
275
-
that include the container runtime socket, either directly or by mounting a parent
276
-
directory. Also `hostPath` mounts must be set as read-only to mitigate risks
277
-
of attackers bypassing directory restrictions.
276
+
that include the container runtime socket, either directly or by mounting a parent
277
+
directory. Also `hostPath` mounts must be set as read-only to mitigate risks
278
+
of attackers bypassing directory restrictions.
278
279
- Restrict user access to nodes, and especially restrict superuser access to nodes.
0 commit comments