You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/zh/docs/tasks/administer-cluster/migrating-from-dockershim/migrating-telemetry-and-security-agents.md
+41-41Lines changed: 41 additions & 41 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,19 +14,11 @@ weight: 70
14
14
<!-- overview -->
15
15
16
16
<!--
17
-
With Kubernetes 1.20 dockershim was deprecated. From the
Kubernetes' support for direct integration with Docker Engine is deprecated, and will be removed. Most apps do not have a direct dependency on runtime hosting containers. However, there are still a lot of telemetry and monitoring agents that has a dependency on docker to collect containers metadata, logs and metrics. This document aggregates information on how to detect these dependencies and links on how to migrate these agents to use generic tools or alternative runtimes.
Copy file name to clipboardExpand all lines: content/zh/docs/tasks/configure-pod-container/configure-gmsa.md
+15-77Lines changed: 15 additions & 77 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,13 +22,12 @@ This page shows how to configure [Group Managed Service Accounts](https://docs.m
22
22
服务器将管理操作委派给其他管理员等能力。
23
23
24
24
<!--
25
-
In Kubernetes, GMSA credential specs are configured at a Kubernetes cluster-wide scope as Custom Resources. Windows Pods, as well as individual containers within a Pod, can be configured to use a GMSA for domain based functions (e.g. Kerberos authentication) when interacting with other Windows services. As of v1.16, the Docker runtime supports GMSA for Windows workloads.
25
+
In Kubernetes, GMSA credential specs are configured at a Kubernetes cluster-wide scope as Custom Resources. Windows Pods, as well as individual containers within a Pod, can be configured to use a GMSA for domain based functions (e.g. Kerberos authentication) when interacting with other Windows services.
(Custom Resources)形式。Windows Pod 以及各 Pod 中的每个容器可以配置为
29
29
使用 GMSA 来完成基于域(Domain)的操作(例如,Kerberos 身份认证),以便
30
-
与其他 Windows 服务相交互。自 Kubernetes 1.16 版本起,Docker 运行时为
31
-
Windows 负载支持 GMSA。
30
+
与其他 Windows 服务相交互。
32
31
33
32
## {{% heading "prerequisites" %}}
34
33
@@ -190,7 +189,7 @@ credspec:
190
189
下面的 YAML 配置描述的是一个名为 `gmsa-WebApp1` 的 GMSA 凭据规约:
191
190
192
191
```yaml
193
-
apiVersion: windows.k8s.io/v1alpha1
192
+
apiVersion: windows.k8s.io/v1
194
193
kind: GMSACredentialSpec
195
194
metadata:
196
195
name: gmsa-WebApp1 # 这是随意起的一个名字,将用作引用
@@ -381,85 +380,24 @@ As Pod specs with GMSA fields populated (as described above) are applied in a cl
381
380
1. 容器运行时为每个 Windows 容器配置所指定的 GMSA 凭据规约,这样容器就可以以
382
381
活动目录中该 GMSA 所代表的身份来执行操作,使用该身份来访问域中的服务。
383
382
383
+
## 使用主机名或 FQDN 对网络共享进行身份验证
384
384
<!--
385
-
## Containerd
386
-
387
-
On Windows Server 2019, in order to use GMSA with containerd, you must be running OS Build 17763.1817 (or later) which can be installed using the patch [KB5000822](https://support.microsoft.com/en-us/topic/march-9-2021-kb5000822-os-build-17763-1817-2eb6197f-e3b1-4f42-ab51-84345e063564).
388
-
389
-
There is also a known issue with containerd that occurs when trying to connect to SMB shares from Pods. Once you have configured GMSA, the pod will be unable to connect to the share using the hostname or FQDN, but connecting to the share using an IP address works as expected.
385
+
If you are experiencing issues connecting to SMB shares from Pods using hostname or FQDN, but are able to access the shares via their IPv4 address then make sure the following registry key is set on the Windows nodes.
390
386
-->
391
-
## Containerd
392
-
在 Windows Server 2019 上对 containerd 使用 GMSA,需要使用 Build 17763.1817(或更新的版本),
To correct the behaviour you must run the following on the node `reg add "HKLM\SYSTEM\CurrentControlSet\Services\hns\State" /v EnableCompartmentNamespace /t REG_DWORD /d 1` to add the required registry key. This node change will only take effect in newly created pods, meaning you must now recreate any running pods which require access to SMB shares.
0 commit comments