Skip to content

Commit eac3619

Browse files
author
Bob Killen
committed
updated links found using greedier regex
(cherry picked from commit 45c6d4c)
1 parent cedccbe commit eac3619

File tree

13 files changed

+14
-14
lines changed

13 files changed

+14
-14
lines changed

content/cn/docs/admin/accessing-the-api.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ Kubernetes 支持多种授权模块,例如ABAC模式,RBAC模式和 Webhook
9797

9898
除了拒绝请求外,准入控制器还可以为对象设置复杂的默认值。
9999

100-
可用的准入控制模块描述 [如下](/docs/admin/admission-controllers/)
100+
可用的准入控制模块描述 [如下](/docs/reference/access-authn-authz/controlling-access/)
101101

102102
一旦请求通过所有准入控制器,将使用对应API对象的验证流程对其进行验证,然后写入对象存储 (如步骤 **4**)。
103103

content/cn/docs/admin/authorization/_index.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,7 @@ subjectaccessreview "" created
149149
{{% capture whatsnext %}}
150150

151151
* 要学习有关身份验证的更多信息,请参阅**身份验证**[控制访问 Kubernetes API](docs/admin/access-the-api/)
152-
* 要了解有关入学管理的更多信息,请参阅[使用 Admission 控制器](docs/admin/admission-controllers/)
152+
* 要了解有关入学管理的更多信息,请参阅[使用 Admission 控制器](docs/reference/access-authn-authz/controlling-access/)
153153
*
154154
{{% /capture %}}
155155

content/cn/docs/admin/service-accounts-admin.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ Kubernetes 区分用户账户和服务账户的概念主要基于以下原因:
3232

3333
### 服务账户准入控制器
3434

35-
对pod的改动通过一个被称为[Admission Controller](/docs/admin/admission-controllers)的插件来实现。它是apiserver的一部分。
35+
对pod的改动通过一个被称为[Admission Controller](/docs/reference/access-authn-authz/controlling-access)的插件来实现。它是apiserver的一部分。
3636
当pod被创建或更新时,它会同步地修改pod。 当该插件处于激活状态(在大多数发行版中都是默认的),当pod被创建或更新时它会进行以下动作:
3737

3838
1. 如果该pod没有 `ServiceAccount` 设置,将其 `ServiceAccount` 设为 `default`

content/cn/docs/concepts/cluster-administration/cluster-administration-overview.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ content_template: templates/concept
5858
* [授权](/docs/admin/authorization)从认证中分离出来,用于控制如何处理 HTTP 请求。
5959

6060

61-
* [使用 Admission Controllers](/docs/admin/admission-controllers) 阐述了在认证和授权之后拦截到 Kubernetes API 服务的请求的插件。
61+
* [使用 Admission Controllers](/docs/reference/access-authn-authz/controlling-access) 阐述了在认证和授权之后拦截到 Kubernetes API 服务的请求的插件。
6262

6363

6464
* [在 Kubernetes Cluster 中使用 Sysctls](/docs/concepts/cluster-administration/sysctl-cluster/) 描述了管理员如何使用 `sysctl` 命令行工具来设置内核参数。

content/en/blog/_posts/2016-08-00-Security-Best-Practices-Kubernetes-Deployment.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -205,7 +205,7 @@ Reference [here](http://kubernetes.io/docs/api-reference/v1/definitions/#_v1_pod
205205

206206

207207

208-
In case you are running containers with elevated privileges (--privileged) you should consider using the “DenyEscalatingExec” admission control. This control denies exec and attach commands to pods that run with escalated privileges that allow host access. This includes pods that run as privileged, have access to the host IPC namespace, and have access to the host PID namespace. For more details on admission controls, see the Kubernetes [documentation](http://kubernetes.io/docs/admin/admission-controllers/).
208+
In case you are running containers with elevated privileges (--privileged) you should consider using the “DenyEscalatingExec” admission control. This control denies exec and attach commands to pods that run with escalated privileges that allow host access. This includes pods that run as privileged, have access to the host IPC namespace, and have access to the host PID namespace. For more details on admission controls, see the Kubernetes [documentation](http://kubernetes.io/docs/reference/access-authn-authz/controlling-access/).
209209

210210

211211

content/en/docs/concepts/cluster-administration/cluster-administration-overview.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ If you are using a guide involving Salt, see [Configuring Kubernetes with Salt](
5454

5555
* [Authorization](/docs/admin/authorization/) is separate from authentication, and controls how HTTP calls are handled.
5656

57-
* [Using Admission Controllers](/docs/admin/admission-controllers/) explains plug-ins which intercepts requests to the Kubernetes API server after authentication and authorization.
57+
* [Using Admission Controllers](/docs/reference/access-authn-authz/controlling-access/) explains plug-ins which intercepts requests to the Kubernetes API server after authentication and authorization.
5858

5959
* [Using Sysctls in a Kubernetes Cluster](/docs/concepts/cluster-administration/sysctl-cluster/) describes to an administrator how to use the `sysctl` command-line tool to set kernel parameters .
6060

content/en/docs/concepts/configuration/taint-and-toleration.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -160,7 +160,7 @@ pods that shouldn't be running. A few of the use cases are
160160
a particular set of users, you can add a taint to those nodes (say,
161161
`kubectl taint nodes nodename dedicated=groupName:NoSchedule`) and then add a corresponding
162162
toleration to their pods (this would be done most easily by writing a custom
163-
[admission controller](/docs/admin/admission-controllers/)).
163+
[admission controller](/docs/reference/access-authn-authz/controlling-access/)).
164164
The pods with the tolerations will then be allowed to use the tainted (dedicated) nodes as
165165
well as any other nodes in the cluster. If you want to dedicate the nodes to them *and*
166166
ensure they *only* use the dedicated nodes, then you should additionally add a label similar
@@ -176,7 +176,7 @@ hardware (e.g. `kubectl taint nodes nodename special=true:NoSchedule` or
176176
`kubectl taint nodes nodename special=true:PreferNoSchedule`) and adding a corresponding
177177
toleration to pods that use the special hardware. As in the dedicated nodes use case,
178178
it is probably easiest to apply the tolerations using a custom
179-
[admission controller](/docs/admin/admission-controllers/)).
179+
[admission controller](/docs/reference/access-authn-authz/controlling-access/).
180180
For example, it is recommended to use [Extended
181181
Resources](/docs/concepts/configuration/manage-compute-resources-container/#extended-resources)
182182
to represent the special hardware, taint your special hardware nodes with the

content/en/docs/concepts/extend-kubernetes/extend-cluster.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -152,7 +152,7 @@ Kubernetes provides several built-in authentication methods, and an [Authenticat
152152

153153
### Dynamic Admission Control
154154

155-
After a request is authorized, if it is a write operation, it also goes through [Admission Control](/docs/admin/admission-controllers/) steps. In addition to the built-in steps, there are several extensions:
155+
After a request is authorized, if it is a write operation, it also goes through [Admission Control](/docs/reference/access-authn-authz/controlling-access/) steps. In addition to the built-in steps, there are several extensions:
156156

157157
* The [Image Policy webhook](/docs/reference/access-authn-authz/admission-controllers/#imagepolicywebhook) restricts what images can be run in containers.
158158
* To make arbitrary admission control decisions, a general [Admission webhook](/docs/admin/extensible-admission-controllers/#admission-webhooks) can be used. Admission Webhooks can reject creations or updates.

content/en/docs/reference/access-authn-authz/authentication.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -184,7 +184,7 @@ If unspecified, the API server's TLS private key will be used.
184184

185185
Service accounts are usually created automatically by the API server and
186186
associated with pods running in the cluster through the `ServiceAccount`
187-
[Admission Controller](/docs/admin/admission-controllers/). Bearer tokens are
187+
[Admission Controller](/docs/reference/access-authn-authz/controlling-access/). Bearer tokens are
188188
mounted into pods at well-known locations, and allow in-cluster processes to
189189
talk to the API server. Accounts may be explicitly associated with pods using the
190190
`serviceAccountName` field of a `PodSpec`.

content/en/docs/reference/access-authn-authz/controlling-access.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,7 @@ rejects, then the request is immediately rejected.
124124
In addition to rejecting objects, admission controllers can also set complex defaults for
125125
fields.
126126

127-
The available Admission Control Modules are described [here](/docs/admin/admission-controllers/).
127+
The available Admission Control Modules are described [here](/docs/reference/access-authn-authz/controlling-access/).
128128

129129
Once a request passes all admission controllers, it is validated using the validation routines
130130
for the corresponding API object, and then written to the object store (shown as step **4**).

content/en/docs/reference/command-line-tools-reference/feature-gates.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -191,7 +191,7 @@ Each feature gate is designed for enabling/disabling a specific feature:
191191
- `HugePages`: Enable the allocation and consumption of pre-allocated [huge pages](/docs/tasks/manage-hugepages/scheduling-hugepages/).
192192
- `HyperVContainer`: Enable [Hyper-V isolation](https://docs.microsoft.com/en-us/virtualization/windowscontainers/manage-containers/hyperv-container) for Windows containers.
193193
- `Intializers`: Enable the [dynamic admission control](/docs/admin/extensible-admission-controllers/)
194-
as an extension to the built-in [admission controllers](/docs/admin/admission-controllers/).
194+
as an extension to the built-in [admission controllers](/docs/reference/access-authn-authz/controlling-access/).
195195
When the `Initializers` admission controller is enabled, this feature is automatically enabled.
196196
- `KubeletConfigFile`: Enable loading kubelet configuration from a file specified using a config file.
197197
See [setting kubelet parameters via a config file](/docs/tasks/administer-cluster/kubelet-config-file/) for more details.

content/en/docs/setup/scratch.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -608,7 +608,7 @@ Here are some apiserver flags you may need to set:
608608
- `--tls-cert-file=/srv/kubernetes/server.cert`
609609
- `--tls-private-key-file=/srv/kubernetes/server.key`
610610
- `--enable-admission-plugins=$RECOMMENDED_LIST`
611-
- See [admission controllers](/docs/admin/admission-controllers/) for recommended arguments.
611+
- See [admission controllers](/docs/reference/access-authn-authz/controlling-access/) for recommended arguments.
612612
- `--allow-privileged=true`, only if you trust your cluster user to run pods as root.
613613

614614
If you are following the firewall-only security approach, then use these arguments:

content/en/docs/user-journeys/users/cluster-operator/intermediate.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ In Kubernetes, you configure access control:
6161

6262
* [Controlling Access to the Kubernetes API](/docs/admin/accessing-the-api/)
6363
* [Authenticating](/docs/admin/authentication/)
64-
* [Using Admission Controllers](/docs/admin/admission-controllers/)
64+
* [Using Admission Controllers](/docs/reference/access-authn-authz/controlling-access/)
6565

6666
You also configure authorization. That is, you determine not just how users and services authenticate to the API server, or whether they have access, but also what resources they have access to. Role-based access control (RBAC) is the recommended mechanism for controlling authorization to Kubernetes resources. Other authorization modes are available for more specific use cases.
6767

0 commit comments

Comments
 (0)