Merge pull request #40046 from howieyuen/concept-4

[zh-cn] sync concepts files of workloads
pull/40073/head
Kubernetes Prow Robot 2023-03-16 20:17:22 -07:00 committed by GitHub
commit 0dabbdc827
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
5 changed files with 11 additions and 11 deletions

View File

@ -1,12 +1,12 @@
---
title: "工作负载"
weight: 50
weight: 55
description: 理解 PodsKubernetes 中可部署的最小计算对象,以及辅助它运行它们的高层抽象对象。
---
<!--
title: "Workloads"
weight: 50
weight: 55
description: >
Understand Pods, the smallest deployable compute object in Kubernetes, and the higher-level abstractions that help you to run them.
no_list: true

View File

@ -398,7 +398,7 @@ That is, the CronJob does _not_ update existing Jobs, even if those remain runni
A CronJob creates a Job object approximately once per execution time of its schedule.
The scheduling is approximate because there
are certain circumstances where two Jobs might be created, or no Job might be created.
Kubernetes tries to avoid those situations, but do not completely prevent them. Therefore,
Kubernetes tries to avoid those situations, but does not completely prevent them. Therefore,
the Jobs that you define should be _idempotent_.
-->
### Job 创建 {#job-creation}

View File

@ -1353,7 +1353,7 @@ These are some requirements and semantics of the API:
are evaluated in order. Once a rule matches a Pod failure, the remaining rules
are ignored. When no rule matches the Pod failure, the default
handling applies.
- you may want to restrict a rule to a specific container by specifing its name
- you may want to restrict a rule to a specific container by specifying its name
in`spec.podFailurePolicy.rules[*].containerName`. When not specified the rule
applies to all containers. When specified, it should match one the container
or `initContainer` names in the Pod template.

View File

@ -555,14 +555,14 @@ Pod 中的所有容器都可以在特权模式下运行,以使用原本无法
此模式同时适用于 Windows 和 Linux。
<!--
### Linux priviledged containers
### Linux privileged containers
In Linux, any container in a Pod can enable privileged mode using the `privileged` (Linux) flag
on the [security context](/docs/tasks/configure-pod-container/security-context/) of the
container spec. This is useful for containers that want to use operating system administrative
capabilities such as manipulating the network stack or accessing hardware devices.
-->
### Linux 特权容器 {#linux-priviledged-containers}
### Linux 特权容器 {#linux-privileged-containers}
在 Linux 中Pod 中的所有容器都可以使用容器规约中的
[安全性上下文](/zh-cn/docs/tasks/configure-pod-container/security-context/)中的
@ -570,9 +570,9 @@ capabilities such as manipulating the network stack or accessing hardware device
这对于想要使用操作系统管理权能Capabilities如操纵网络堆栈和访问硬件设备的容器很有用。
<!--
### Windows priviledged containers
### Windows privileged containers
-->
### Windows 特权容器 {#windows-priviledged-containers}
### Windows 特权容器 {#windows-privileged-containers}
{{< feature-state for_k8s_version="v1.26" state="stable" >}}

View File

@ -16,7 +16,7 @@ min-kubernetes-server-version: v1.25
{{< feature-state for_k8s_version="v1.25" state="alpha" >}}
<!--
This page explains how user namespaces are used in Kubernetes pods. A user
namespace allows to isolate the user running inside the container from the one
namespace isolates the user running inside the container from the one
in the host.
A process running as root in a container can run as a different (non-root) user
@ -24,8 +24,8 @@ in the host; in other words, the process has full privileges for operations
inside the user namespace, but is unprivileged for operations outside the
namespace.
-->
本页解释了在 Kubernetes pods 中如何使用用户命名空间。
用户命名空间允许将容器内运行的用户与主机内的用户隔离开来。
本页解释了在 Kubernetes Pod 中如何使用用户命名空间。
用户命名空间将容器内运行的用户与主机中的用户隔离开来。
在容器中以 root 身份运行的进程可以在主机中以不同的(非 root用户身份运行
换句话说,该进程在用户命名空间内的操作具有完全的权限,