Skip to content

Commit e893318

Browse files
authored
Merge pull request #39287 from Zhuzhenghao/zh/cleanup/api-server-bypass-risks
[zh] Resync api-server-bypass-risks.md
2 parents 159978d + 54752d0 commit e893318

File tree

1 file changed

+11
-10
lines changed

1 file changed

+11
-10
lines changed

content/zh-cn/docs/concepts/security/api-server-bypass-risks.md

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,8 @@ Kubernetes API 服务器是外部(用户和服务)与集群交互的主要
2323

2424
<!--
2525
As part of this role, the API server has several key built-in security controls, such as
26-
audit logging and {{< glossary_tooltip text="admission controllers" term_id="admission-controller" >}}. However, there are ways to modify the configuration
26+
audit logging and {{< glossary_tooltip text="admission controllers" term_id="admission-controller" >}}.
27+
However, there are ways to modify the configuration
2728
or content of the cluster that bypass these controls.
2829
-->
2930
作为此角色的一部分,API 服务器有几个关键的内置安全控制,
@@ -91,13 +92,13 @@ API server. However, the Pod still runs on the node. For more information, refer
9192

9293
<!--
9394
- Only [enable the kubelet static Pod manifest functionality](/docs/tasks/configure-pod-container/static-pod/#static-pod-creation)
94-
if required by the node.
95+
if required by the node.
9596
- If a node uses the static Pod functionality, restrict filesystem access to the static Pod manifest directory
96-
or URL to users who need the access.
97+
or URL to users who need the access.
9798
- Restrict access to kubelet configuration parameters and files to prevent an attacker setting
98-
a static Pod path or URL.
99+
a static Pod path or URL.
99100
- Regularly audit and centrally report all access to directories or web storage locations that host
100-
static Pod manifests and kubelet configuration files.
101+
static Pod manifests and kubelet configuration files.
101102
-->
102103
- 仅在节点需要时[启用 kubelet 静态 Pod 清单功能](/zh-cn/docs/tasks/configure-pod-container/static-pod/#static-pod-creation)
103104
- 如果节点使用静态 Pod 功能,请将对静态 Pod 清单目录或 URL 的文件系统的访问权限限制为需要访问的用户。
@@ -268,13 +269,13 @@ control plane components.
268269

269270
<!--
270271
- Ensure that you tightly control filesystem access to container runtime sockets.
271-
When possible, restrict this access to the `root` user.
272+
When possible, restrict this access to the `root` user.
272273
- Isolate the kubelet from other components running on the node, using
273-
mechanisms such as Linux kernel namespaces.
274+
mechanisms such as Linux kernel namespaces.
274275
- Ensure that you restrict or forbid the use of [`hostPath` mounts](/docs/concepts/storage/volumes/#hostpath)
275-
that include the container runtime socket, either directly or by mounting a parent
276-
directory. Also `hostPath` mounts must be set as read-only to mitigate risks
277-
of attackers bypassing directory restrictions.
276+
that include the container runtime socket, either directly or by mounting a parent
277+
directory. Also `hostPath` mounts must be set as read-only to mitigate risks
278+
of attackers bypassing directory restrictions.
278279
- Restrict user access to nodes, and especially restrict superuser access to nodes.
279280
-->
280281
- 确保严格控制对容器运行时套接字所在的文件系统访问。如果可能,限制为仅 `root` 用户可访问。

0 commit comments

Comments
 (0)