You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: content/en/blog/_posts/2018-01-00-Extensible-Admission-Is-Beta.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ The admission stage of API server processing is one of the most powerful tools f
11
11
12
12
13
13
## What is Admission?
14
-
[Admission](https://kubernetes.io/docs/admin/admission-controllers/#what-are-they) is the phase of [handling an API server request](https://blog.openshift.com/kubernetes-deep-dive-api-server-part-1/) that happens before a resource is persisted, but after authorization. Admission gets access to the same information as authorization (user, URL, etc) and the complete body of an API request (for most requests).
14
+
[Admission](https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#what-are-they) is the phase of [handling an API server request](https://blog.openshift.com/kubernetes-deep-dive-api-server-part-1/) that happens before a resource is persisted, but after authorization. Admission gets access to the same information as authorization (user, URL, etc) and the complete body of an API request (for most requests).
Copy file name to clipboardexpand all lines: content/en/docs/concepts/containers/images.md
+3-3
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ you can do one of the following:
27
27
28
28
- set the `imagePullPolicy` of the container to `Always`;
29
29
- use `:latest` as the tag for the image to use;
30
-
- enable the [AlwaysPullImages](/docs/admin/admission-controllers/#alwayspullimages) admission controller.
30
+
- enable the [AlwaysPullImages](/docs/reference/access-authn-authz/admission-controllers/#alwayspullimages) admission controller.
31
31
32
32
If you did not specify tag of your image, it will be assumed as `:latest`, with
33
33
pull image policy of `Always` correspondingly.
@@ -315,10 +315,10 @@ common use cases and suggested solutions.
315
315
- It will work better with cluster autoscaling than manual node configuration.
316
316
- Or, on a cluster where changing the node configuration is inconvenient, use `imagePullSecrets`.
317
317
1. Cluster with a proprietary images, a few of which require stricter access control.
318
-
- Ensure [AlwaysPullImages admission controller](/docs/admin/admission-controllers/#alwayspullimages) is active. Otherwise, all Pods potentially have access to all images.
318
+
- Ensure [AlwaysPullImages admission controller](/docs/reference/access-authn-authz/admission-controllers/#alwayspullimages) is active. Otherwise, all Pods potentially have access to all images.
319
319
- Move sensitive data into a "Secret" resource, instead of packaging it in an image.
320
320
1. A multi-tenant cluster where each tenant needs own private registry.
321
-
- Ensure [AlwaysPullImages admission controller](/docs/admin/admission-controllers/#alwayspullimages) is active. Otherwise, all Pods of all tenants potentially have access to all images.
321
+
- Ensure [AlwaysPullImages admission controller](/docs/reference/access-authn-authz/admission-controllers/#alwayspullimages) is active. Otherwise, all Pods of all tenants potentially have access to all images.
322
322
- Run a private registry with authorization required.
323
323
- Generate registry credential for each tenant, put into secret, and populate secret to each tenant namespace.
324
324
- The tenant adds that secret to imagePullSecrets of each namespace.
Copy file name to clipboardexpand all lines: content/en/docs/concepts/extend-kubernetes/extend-cluster.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -154,7 +154,7 @@ Kubernetes provides several built-in authentication methods, and an [Authenticat
154
154
155
155
After a request is authorized, if it is a write operation, it also goes through [Admission Control](/docs/admin/admission-controllers/) steps. In addition to the built-in steps, there are several extensions:
156
156
157
-
* The [Image Policy webhook](/docs/admin/admission-controllers/#imagepolicywebhook) restricts what images can be run in containers.
157
+
* The [Image Policy webhook](/docs/reference/access-authn-authz/admission-controllers/#imagepolicywebhook) restricts what images can be run in containers.
158
158
* To make arbitrary admission control decisions, a general [Admission webhook](/docs/admin/extensible-admission-controllers/#admission-webhooks) can be used. Admission Webhooks can reject creations or updates.
159
159
*[Initializers](/docs/admin/extensible-admission-controllers/#initializers) are controllers that can modify objects before they are created. Initializers can modify initial object creations but cannot affect updates to objects. Initializers can also reject objects.
Copy file name to clipboardexpand all lines: content/en/docs/concepts/policy/resource-quotas.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -154,7 +154,7 @@ The following types are supported:
154
154
|`persistentvolumeclaims`| The total number of [persistent volume claims](/docs/concepts/storage/persistent-volumes/#persistentvolumeclaims) that can exist in the namespace. |
155
155
|`pods`| The total number of pods in a non-terminal state that can exist in the namespace. A pod is in a terminal state if `.status.phase in (Failed, Succeeded)` is true. |
156
156
|`replicationcontrollers`| The total number of replication controllers that can exist in the namespace. |
157
-
|`resourcequotas`| The total number of [resource quotas](/docs/admin/admission-controllers/#resourcequota) that can exist in the namespace. |
157
+
|`resourcequotas`| The total number of [resource quotas](/docs/reference/access-authn-authz/admission-controllers/#resourcequota) that can exist in the namespace. |
158
158
|`services`| The total number of services that can exist in the namespace. |
159
159
|`services.loadbalancers`| The total number of services of type load balancer that can exist in the namespace. |
160
160
|`services.nodeports`| The total number of services of type node port that can exist in the namespace. |
Copy file name to clipboardexpand all lines: content/en/docs/concepts/workloads/controllers/garbage-collection.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -89,7 +89,7 @@ the owner object.
89
89
90
90
Note that in the "foregroundDeletion", only dependents with
91
91
`ownerReference.blockOwnerDeletion` block the deletion of the owner object.
92
-
Kubernetes version 1.7 added an [admission controller](/docs/admin/admission-controllers/#ownerreferencespermissionenforcement) that controls user access to set
92
+
Kubernetes version 1.7 added an [admission controller](/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement) that controls user access to set
93
93
`blockOwnerDeletion` to true based on delete permissions on the owner object, so that
94
94
unauthorized dependents cannot delay deletion of an owner object.
Copy file name to clipboardexpand all lines: content/en/docs/reference/access-authn-authz/rbac.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -556,7 +556,7 @@ The permissions required by individual control loops are contained in the <a hre
556
556
<td><b>system:node</b></td>
557
557
<td>None in 1.8+</td>
558
558
<td>Allows access to resources required by the kubelet component, <b>including read access to all secrets, and write access to all pod status objects</b>.
559
-
As of 1.7, use of the <a href="/docs/admin/authorization/node/">Node authorizer</a> and <a href="/docs/admin/admission-controllers/#noderestriction">NodeRestriction admission plugin</a> is recommended instead of this role, and allow granting API access to kubelets based on the pods scheduled to run on them.
559
+
As of 1.7, use of the <a href="/docs/admin/authorization/node/">Node authorizer</a> and <a href="/docs/reference/access-authn-authz/admission-controllers/#noderestriction">NodeRestriction admission plugin</a> is recommended instead of this role, and allow granting API access to kubelets based on the pods scheduled to run on them.
560
560
Prior to 1.7, this role was automatically bound to the `system:nodes` group.
561
561
In 1.7, this role was automatically bound to the `system:nodes` group if the `Node` authorization mode is not enabled.
Copy file name to clipboardexpand all lines: content/en/docs/reference/setup-tools/kubeadm/implementation-details.md
+8-8
Original file line number
Diff line number
Diff line change
@@ -239,17 +239,17 @@ Other API server flags that are set unconditionally are:
239
239
-`--allow-privileged` to `true` (required e.g. by kube proxy)
240
240
-`--requestheader-client-ca-file` to `front-proxy-ca.crt`
241
241
-`--enable-admission-plugins` to:
242
-
-[`Initializers`](/docs/admin/admission-controllers/#initializers-alpha) to enable [Dynamic Admission Control](/docs/admin/extensible-admission-controllers/).
243
-
-[`NamespaceLifecycle`](/docs/admin/admission-controllers/#namespacelifecycle) e.g. to avoid deletion of
242
+
-[`Initializers`](/docs/reference/access-authn-authz/admission-controllers/#initializers-alpha) to enable [Dynamic Admission Control](/docs/admin/extensible-admission-controllers/).
243
+
-[`NamespaceLifecycle`](/docs/reference/access-authn-authz/admission-controllers/#namespacelifecycle) e.g. to avoid deletion of
244
244
system reserved namespaces
245
-
-[`LimitRanger`](/docs/admin/admission-controllers/#limitranger) and [`ResourceQuota`](/docs/admin/admission-controllers/#resourcequota) to enforce limits on namespaces
246
-
-[`ServiceAccount`](/docs/admin/admission-controllers/#serviceaccount) to enforce service account automation
247
-
-[`PersistentVolumeLabel`](/docs/admin/admission-controllers/#persistentvolumelabel) attaches region or zone labels to
245
+
-[`LimitRanger`](/docs/reference/access-authn-authz/admission-controllers/#limitranger) and [`ResourceQuota`](/docs/reference/access-authn-authz/admission-controllers/#resourcequota) to enforce limits on namespaces
246
+
-[`ServiceAccount`](/docs/reference/access-authn-authz/admission-controllers/#serviceaccount) to enforce service account automation
247
+
-[`PersistentVolumeLabel`](/docs/reference/access-authn-authz/admission-controllers/#persistentvolumelabel) attaches region or zone labels to
248
248
PersistentVolumes as defined by the cloud provider (This admission controller is deprecated and will be removed in a future version.
249
249
It is not deployed by kubeadm by default with v1.9 onwards when not explicitly opting into using `gce` or `aws` as cloud providers)
250
-
-[`DefaultStorageClass`](/docs/admin/admission-controllers/#defaultstorageclass) to enforce default storage class on `PersistentVolumeClaim` objects
-[`NodeRestriction`](/docs/admin/admission-controllers/#noderestriction) to limit what a kubelet can modify
250
+
-[`DefaultStorageClass`](/docs/reference/access-authn-authz/admission-controllers/#defaultstorageclass) to enforce default storage class on `PersistentVolumeClaim` objects
Copy file name to clipboardexpand all lines: content/en/docs/tasks/administer-cluster/securing-a-cluster.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -56,7 +56,7 @@ set of permissions bundled into roles. These permissions combine verbs (get, cre
56
56
resources (pods, services, nodes) and can be namespace or cluster scoped. A set of out of the box
57
57
roles are provided that offer reasonable default separation of responsibility depending on what
58
58
actions a client might want to perform. It is recommended that you use the [Node](/docs/admin/authorization/node/) and [RBAC](/docs/admin/authorization/rbac/) authorizers together, in combination with the
0 commit comments