Merge pull request #34690 from javadoors/patch-14

[zh-cn]Fix bold display&inaccurate phrase
This commit is contained in:
Kubernetes Prow Robot 2022-06-28 23:26:04 -07:00 committed by GitHub
commit 03747d2bfa
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 3 additions and 3 deletions

View File

@ -21,7 +21,7 @@ by applications that use the Kubernetes API, and by the control plane itself.
Auditing allows cluster administrators to answer the following questions:
-->
Kubernetes **审计Auditing**功能提供了与安全相关的、按时间顺序排列的记录集,
Kubernetes **审计Auditing** 功能提供了与安全相关的、按时间顺序排列的记录集,
记录每个用户、使用 Kubernetes API 的应用以及控制面自身引发的活动。
审计功能使得集群管理员能够回答以下问题:
@ -115,7 +115,7 @@ _audit level_ of the event. The defined audit levels are:
-->
## 审计策略 {#audit-policy}
审计策定义了关于应记录哪些事件以及应包含哪些数据的规则。
审计策定义了关于应记录哪些事件以及应包含哪些数据的规则。
审计策略对象结构定义在
[`audit.k8s.io` API 组](/zh-cn/docs/reference/config-api/apiserver-audit.v1/#audit-k8s-io-v1-Policy)
处理事件时,将按顺序与规则列表进行比较。第一个匹配规则设置事件的
@ -449,4 +449,4 @@ By default truncate is disabled in both `webhook` and `log`, a cluster administr
<!--
* Learn about [Mutating webhook auditing annotations](/docs/reference/access-authn-authz/extensible-admission-controllers/#mutating-webhook-auditing-annotations).
-->
* 了解 [Mutating webhook 审计注解](/zh-cn/docs/reference/access-authn-authz/extensible-admission-controllers/#mutating-webhook-auditing-annotations)。
* 了解 [Mutating webhook 审计注解](/zh-cn/docs/reference/access-authn-authz/extensible-admission-controllers/#mutating-webhook-auditing-annotations)。