You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Additionally, for trace resource attribute configuration such as Kubernetes cluster name, namespace, Pod name, etc.,
120
+
environment variables can also be used with `OTEL_RESOURCE_ATTRIBUTES`, see [OTLP Kubernetes Resource](https://opentelemetry.io/docs/specs/semconv/resource/k8s/).
@@ -260,5 +290,7 @@ there are no guarantees of backwards compatibility for tracing instrumentation.
260
290
261
291
<!--
262
292
* Read about [Getting Started with the OpenTelemetry Collector](https://opentelemetry.io/docs/collector/getting-started/)
293
+
* Read about [OTLP Exporter Configuration](https://opentelemetry.io/docs/languages/sdk-configuration/otlp-exporter/)
263
294
-->
264
295
* 阅读 [Getting Started with the OpenTelemetry Collector](https://opentelemetry.io/docs/collector/getting-started/)
Copy file name to clipboardExpand all lines: content/zh-cn/docs/concepts/security/pod-security-standards.md
+43-9Lines changed: 43 additions & 9 deletions
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Pod 安全性标准
3
3
description: >
4
4
详细了解 Pod 安全性标准(Pod Security Standards)中所定义的不同策略级别。
5
5
content_type: concept
6
-
weight: 10
6
+
weight: 15
7
7
---
8
8
<!--
9
9
reviewers:
@@ -12,7 +12,7 @@ title: Pod Security Standards
12
12
description: >
13
13
A detailed look at the different policy levels defined in the Pod Security Standards.
14
14
content_type: concept
15
-
weight: 10
15
+
weight: 15
16
16
-->
17
17
18
18
<!-- overview -->
@@ -214,8 +214,27 @@ fail validation.
214
214
<tr>
215
215
<td style="white-space: nowrap">AppArmor</td>
216
216
<td>
217
-
<p><!--On supported hosts, the <code>runtime/default</code> AppArmor profile is applied by default. The baseline policy should prevent overriding or disabling the default AppArmor profile, or restrict overrides to an allowed set of profiles.-->在受支持的主机上,默认使用 <code>runtime/default</code> AppArmor 配置。Baseline 策略应避免覆盖或者禁用默认策略,以及限制覆盖一些配置集合的权限。</p>
On supported hosts, the <code>RuntimeDefault</code> AppArmor profile is applied by default. The baseline policy should prevent overriding or disabling the default AppArmor profile, or restrict overrides to an allowed set of profiles.
<p><!--Setting the SELinux type is restricted, and setting a custom SELinux user or role option is forbidden.-->设置 SELinux 类型的操作是被限制的,设置自定义的 SELinux 用户或角色选项是被禁止的。</p>
252
+
<p>
253
+
<!--
254
+
Setting the SELinux type is restricted, and setting a custom SELinux user or role option is forbidden.
<p><!--Sysctls can disable security mechanisms or affect all containers on a host, and should be disallowed except for an allowed "safe" subset. A sysctl is considered safe if it is namespaced in the container or the Pod, and it is isolated from other Pods or processes on the same Node.-->Sysctls 可以禁用安全机制或影响宿主上所有容器,因此除了若干“安全”的子集之外,应该被禁止。如果某 sysctl 是受容器或 Pod 的名字空间限制,且与节点上其他 Pod 或进程相隔离,可认为是安全的。</p>
329
+
<p>
330
+
<!--
331
+
Sysctls can disable security mechanisms or affect all containers on a host, and should be disallowed except for an allowed "safe" subset. A sysctl is considered safe if it is namespaced in the container or the Pod, and it is isolated from other Pods or processes on the same Node.
<p><!--In addition to restricting HostPath volumes, the restricted policy limits usage of non-core volume types to those defined through PersistentVolumes.-->除了限制 HostPath 卷之外,此类策略还限制可以通过 PersistentVolumes 定义的非核心卷类型。</p>
396
+
<p>
397
+
<!--
398
+
In addition to restricting HostPath volumes, the restricted policy limits usage of non-core volume types to those defined through PersistentVolumes.
0 commit comments