Merge pull request #40046 from howieyuen/concept-4
[zh-cn] sync concepts files of workloads
This commit is contained in:
commit
0dabbdc827
|
@ -1,12 +1,12 @@
|
||||||
---
|
---
|
||||||
title: "工作负载"
|
title: "工作负载"
|
||||||
weight: 50
|
weight: 55
|
||||||
description: 理解 Pods,Kubernetes 中可部署的最小计算对象,以及辅助它运行它们的高层抽象对象。
|
description: 理解 Pods,Kubernetes 中可部署的最小计算对象,以及辅助它运行它们的高层抽象对象。
|
||||||
---
|
---
|
||||||
|
|
||||||
<!--
|
<!--
|
||||||
title: "Workloads"
|
title: "Workloads"
|
||||||
weight: 50
|
weight: 55
|
||||||
description: >
|
description: >
|
||||||
Understand Pods, the smallest deployable compute object in Kubernetes, and the higher-level abstractions that help you to run them.
|
Understand Pods, the smallest deployable compute object in Kubernetes, and the higher-level abstractions that help you to run them.
|
||||||
no_list: true
|
no_list: true
|
||||||
|
|
|
@ -398,7 +398,7 @@ That is, the CronJob does _not_ update existing Jobs, even if those remain runni
|
||||||
A CronJob creates a Job object approximately once per execution time of its schedule.
|
A CronJob creates a Job object approximately once per execution time of its schedule.
|
||||||
The scheduling is approximate because there
|
The scheduling is approximate because there
|
||||||
are certain circumstances where two Jobs might be created, or no Job might be created.
|
are certain circumstances where two Jobs might be created, or no Job might be created.
|
||||||
Kubernetes tries to avoid those situations, but do not completely prevent them. Therefore,
|
Kubernetes tries to avoid those situations, but does not completely prevent them. Therefore,
|
||||||
the Jobs that you define should be _idempotent_.
|
the Jobs that you define should be _idempotent_.
|
||||||
-->
|
-->
|
||||||
### Job 创建 {#job-creation}
|
### Job 创建 {#job-creation}
|
||||||
|
|
|
@ -1353,7 +1353,7 @@ These are some requirements and semantics of the API:
|
||||||
are evaluated in order. Once a rule matches a Pod failure, the remaining rules
|
are evaluated in order. Once a rule matches a Pod failure, the remaining rules
|
||||||
are ignored. When no rule matches the Pod failure, the default
|
are ignored. When no rule matches the Pod failure, the default
|
||||||
handling applies.
|
handling applies.
|
||||||
- you may want to restrict a rule to a specific container by specifing its name
|
- you may want to restrict a rule to a specific container by specifying its name
|
||||||
in`spec.podFailurePolicy.rules[*].containerName`. When not specified the rule
|
in`spec.podFailurePolicy.rules[*].containerName`. When not specified the rule
|
||||||
applies to all containers. When specified, it should match one the container
|
applies to all containers. When specified, it should match one the container
|
||||||
or `initContainer` names in the Pod template.
|
or `initContainer` names in the Pod template.
|
||||||
|
|
|
@ -555,14 +555,14 @@ Pod 中的所有容器都可以在特权模式下运行,以使用原本无法
|
||||||
此模式同时适用于 Windows 和 Linux。
|
此模式同时适用于 Windows 和 Linux。
|
||||||
|
|
||||||
<!--
|
<!--
|
||||||
### Linux priviledged containers
|
### Linux privileged containers
|
||||||
|
|
||||||
In Linux, any container in a Pod can enable privileged mode using the `privileged` (Linux) flag
|
In Linux, any container in a Pod can enable privileged mode using the `privileged` (Linux) flag
|
||||||
on the [security context](/docs/tasks/configure-pod-container/security-context/) of the
|
on the [security context](/docs/tasks/configure-pod-container/security-context/) of the
|
||||||
container spec. This is useful for containers that want to use operating system administrative
|
container spec. This is useful for containers that want to use operating system administrative
|
||||||
capabilities such as manipulating the network stack or accessing hardware devices.
|
capabilities such as manipulating the network stack or accessing hardware devices.
|
||||||
-->
|
-->
|
||||||
### Linux 特权容器 {#linux-priviledged-containers}
|
### Linux 特权容器 {#linux-privileged-containers}
|
||||||
|
|
||||||
在 Linux 中,Pod 中的所有容器都可以使用容器规约中的
|
在 Linux 中,Pod 中的所有容器都可以使用容器规约中的
|
||||||
[安全性上下文](/zh-cn/docs/tasks/configure-pod-container/security-context/)中的
|
[安全性上下文](/zh-cn/docs/tasks/configure-pod-container/security-context/)中的
|
||||||
|
@ -570,9 +570,9 @@ capabilities such as manipulating the network stack or accessing hardware device
|
||||||
这对于想要使用操作系统管理权能(Capabilities,如操纵网络堆栈和访问硬件设备)的容器很有用。
|
这对于想要使用操作系统管理权能(Capabilities,如操纵网络堆栈和访问硬件设备)的容器很有用。
|
||||||
|
|
||||||
<!--
|
<!--
|
||||||
### Windows priviledged containers
|
### Windows privileged containers
|
||||||
-->
|
-->
|
||||||
### Windows 特权容器 {#windows-priviledged-containers}
|
### Windows 特权容器 {#windows-privileged-containers}
|
||||||
|
|
||||||
{{< feature-state for_k8s_version="v1.26" state="stable" >}}
|
{{< feature-state for_k8s_version="v1.26" state="stable" >}}
|
||||||
|
|
||||||
|
|
|
@ -16,7 +16,7 @@ min-kubernetes-server-version: v1.25
|
||||||
{{< feature-state for_k8s_version="v1.25" state="alpha" >}}
|
{{< feature-state for_k8s_version="v1.25" state="alpha" >}}
|
||||||
<!--
|
<!--
|
||||||
This page explains how user namespaces are used in Kubernetes pods. A user
|
This page explains how user namespaces are used in Kubernetes pods. A user
|
||||||
namespace allows to isolate the user running inside the container from the one
|
namespace isolates the user running inside the container from the one
|
||||||
in the host.
|
in the host.
|
||||||
|
|
||||||
A process running as root in a container can run as a different (non-root) user
|
A process running as root in a container can run as a different (non-root) user
|
||||||
|
@ -24,8 +24,8 @@ in the host; in other words, the process has full privileges for operations
|
||||||
inside the user namespace, but is unprivileged for operations outside the
|
inside the user namespace, but is unprivileged for operations outside the
|
||||||
namespace.
|
namespace.
|
||||||
-->
|
-->
|
||||||
本页解释了在 Kubernetes pods 中如何使用用户命名空间。
|
本页解释了在 Kubernetes Pod 中如何使用用户命名空间。
|
||||||
用户命名空间允许将容器内运行的用户与主机内的用户隔离开来。
|
用户命名空间将容器内运行的用户与主机中的用户隔离开来。
|
||||||
|
|
||||||
在容器中以 root 身份运行的进程可以在主机中以不同的(非 root)用户身份运行;
|
在容器中以 root 身份运行的进程可以在主机中以不同的(非 root)用户身份运行;
|
||||||
换句话说,该进程在用户命名空间内的操作具有完全的权限,
|
换句话说,该进程在用户命名空间内的操作具有完全的权限,
|
||||||
|
|
Loading…
Reference in New Issue