Skip to content

Commit d705d9e

Browse files
committed
Batch fix links (3)
1 parent 5a1c17a commit d705d9e

File tree

9 files changed

+195
-100
lines changed

9 files changed

+195
-100
lines changed

content/en/docs/concepts/scheduling-eviction/node-pressure-eviction.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -66,8 +66,8 @@ the signal.
6666

6767
The value for `memory.available` is derived from the cgroupfs instead of tools
6868
like `free -m`. This is important because `free -m` does not work in a
69-
container, and if users use the [node
70-
allocatable](/docs/tasks/administer-cluster/reserve-compute-resources/#node-allocatable) feature, out of resource decisions
69+
container, and if users use the [node allocatable](/docs/tasks/administer-cluster/reserve-compute-resources/#node-allocatable)
70+
feature, out of resource decisions
7171
are made local to the end user Pod part of the cgroup hierarchy as well as the
7272
root node. This [script](/examples/admin/resource/memory-available.sh)
7373
reproduces the same set of steps that the kubelet performs to calculate
@@ -87,7 +87,8 @@ does not support other configurations.
8787

8888
{{<note>}}
8989
Some kubelet garbage collection features are deprecated in favor of eviction.
90-
For a list of the deprecated features, see [kubelet garbage collection deprecation](/docs/concepts/cluster-administration/kubelet-garbage-collection/#deprecation).
90+
For a list of the deprecated features, see
91+
[kubelet garbage collection deprecation](/docs/concepts/architecture/garbage-collection/#deprecation).
9192
{{note>}}
9293

9394
### Eviction thresholds

content/en/docs/concepts/scheduling-eviction/taint-and-toleration.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -15,14 +15,15 @@ is a property of {{< glossary_tooltip text="Pods" term_id="pod" >}} that *attrac
1515
a set of {{< glossary_tooltip text="nodes" term_id="node" >}} (either as a preference or a
1616
hard requirement). _Taints_ are the opposite -- they allow a node to repel a set of pods.
1717

18-
_Tolerations_ are applied to pods. Tolerations allow the scheduler to schedule pods with matching taints. Tolerations allow scheduling but don't guarantee scheduling: the scheduler also [evaluates other parameters](/docs/concepts/scheduling-eviction/pod-priority-preemption/) as part of its function.
18+
_Tolerations_ are applied to pods. Tolerations allow the scheduler to schedule pods with matching
19+
taints. Tolerations allow scheduling but don't guarantee scheduling: the scheduler also
20+
[evaluates other parameters](/docs/concepts/scheduling-eviction/pod-priority-preemption/)
21+
as part of its function.
1922

2023
Taints and tolerations work together to ensure that pods are not scheduled
2124
onto inappropriate nodes. One or more taints are applied to a node; this
2225
marks that the node should not accept any pods that do not tolerate the taints.
2326

24-
25-
2627
2728

2829
## Concepts
@@ -266,7 +267,8 @@ This ensures that DaemonSet pods are never evicted due to these problems.
266267
## Taint Nodes by Condition
267268

268269
The control plane, using the node {{}},
269-
automatically creates taints with a `NoSchedule` effect for [node conditions](/docs/concepts/scheduling-eviction/node-pressure-eviction/#node-conditions).
270+
automatically creates taints with a `NoSchedule` effect for
271+
[node conditions](/docs/concepts/scheduling-eviction/node-pressure-eviction/#node-conditions).
270272

271273
The scheduler checks taints, not node conditions, when it makes scheduling
272274
decisions. This ensures that node conditions don't directly affect scheduling.
@@ -297,7 +299,7 @@ arbitrary tolerations to DaemonSets.
297299

298300
## {{% heading "whatsnext" %}}
299301

300-
* Read about [Node-pressure Eviction](/docs/concepts/scheduling-eviction/node-pressure-eviction/) and how you can configure it
302+
* Read about [Node-pressure Eviction](/docs/concepts/scheduling-eviction/node-pressure-eviction/)
303+
and how you can configure it
301304
* Read about [Pod Priority](/docs/concepts/scheduling-eviction/pod-priority-preemption/)
302305

303-

content/en/docs/concepts/security/pod-security-standards.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -462,11 +462,11 @@ of individual policies are not defined here.
462462
{{% thirdparty-content %}}
463463

464464
Other alternatives for enforcing policies are being developed in the Kubernetes ecosystem, such as:
465+
465466
- [Kubewarden](https://github.com/kubewarden)
466467
- [Kyverno](https://kyverno.io/policies/pod-security/)
467468
- [OPA Gatekeeper](https://github.com/open-policy-agent/gatekeeper)
468469

469-
470470
## FAQ
471471

472472
### Why isn't there a profile between privileged and baseline?
@@ -493,9 +493,9 @@ built-in [Pod Security Admission Controller](/docs/concepts/security/pod-securit
493493
### What profiles should I apply to my Windows Pods?
494494

495495
Windows in Kubernetes has some limitations and differentiators from standard Linux-based
496-
workloads. Specifically, many of the Pod SecurityContext fields [have no effect on
497-
Windows](/docs/setup/production-environment/windows/intro-windows-in-kubernetes/#v1-podsecuritycontext). As
498-
such, no standardized Pod Security profiles currently exist.
496+
workloads. Specifically, many of the Pod SecurityContext fields
497+
[have no effect on Windows](/docs/concepts/windows/intro/#compatibility-v1-pod-spec-containers-securitycontext).
498+
As such, no standardized Pod Security profiles currently exist.
499499

500500
If you apply the restricted profile for a Windows pod, this **may** have an impact on the pod
501501
at runtime. The restricted profile requires enforcing Linux-specific restrictions (such as seccomp
@@ -504,7 +504,9 @@ these Linux-specific values, then the Windows pod should still work normally wit
504504
profile. However, the lack of enforcement means that there is no additional restriction, for Pods
505505
that use Windows containers, compared to the baseline profile.
506506

507-
The use of the HostProcess flag to create a HostProcess pod should only be done in alignment with the privileged policy. Creation of a Windows HostProcess pod is blocked under the baseline and restricted policies, so any HostProcess pod should be considered privileged.
507+
The use of the HostProcess flag to create a HostProcess pod should only be done in alignment with the privileged policy.
508+
Creation of a Windows HostProcess pod is blocked under the baseline and restricted policies,
509+
so any HostProcess pod should be considered privileged.
508510

509511
### What about sandboxed Pods?
510512

@@ -518,3 +520,4 @@ kernel. This allows for workloads requiring heightened permissions to still be i
518520

519521
Additionally, the protection of sandboxed workloads is highly dependent on the method of
520522
sandboxing. As such, no single recommended profile is recommended for all sandboxed workloads.
523+

content/en/docs/concepts/security/rbac-good-practices.md

Lines changed: 20 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,8 @@ execute their roles. It is important to ensure that, when designing permissions
1515
users, the cluster administrator understands the areas where privilge escalation could occur,
1616
to reduce the risk of excessive access leading to security incidents.
1717

18-
The good practices laid out here should be read in conjunction with the general [RBAC documentation](/docs/reference/access-authn-authz/rbac/#restrictions-on-role-creation-or-update).
18+
The good practices laid out here should be read in conjunction with the general
19+
[RBAC documentation](/docs/reference/access-authn-authz/rbac/#restrictions-on-role-creation-or-update).
1920

2021
2122

@@ -34,7 +35,8 @@ some general rules that can be applied are :
3435
not just to all object types presently in the cluster, but also to all future object types
3536
which are created in the future.
3637
- Administrators should not use `cluster-admin` accounts except where specifically needed.
37-
Providing a low privileged account with [impersonation rights](/docs/reference/access-authn-authz/authentication/#user-impersonation)
38+
Providing a low privileged account with
39+
[impersonation rights](/docs/reference/access-authn-authz/authentication/#user-impersonation)
3840
can avoid accidental modification of cluster resources.
3941
- Avoid adding users to the `system:masters` group. Any user who is a member of this group
4042
bypasses all RBAC rights checks and will always have unrestricted superuser access, which cannot be
@@ -44,15 +46,17 @@ some general rules that can be applied are :
4446

4547
### Minimize distribution of privileged tokens
4648

47-
Ideally, pods shouldn't be assigned service accounts that have been granted powerful permissions (for example, any of the rights listed under
48-
[privilege escalation risks](#privilege-escalation-risks)).
49+
Ideally, pods shouldn't be assigned service accounts that have been granted powerful permissions
50+
(for example, any of the rights listed under [privilege escalation risks](#privilege-escalation-risks)).
4951
In cases where a workload requires powerful permissions, consider the following practices:
5052

5153
- Limit the number of nodes running powerful pods. Ensure that any DaemonSets you run
5254
are necessary and are run with least privilege to limit the blast radius of container escapes.
5355
- Avoid running powerful pods alongside untrusted or publicly-exposed ones. Consider using
54-
[Taints and Toleration](/docs/concepts/scheduling-eviction/taint-and-toleration/), [NodeAffinity](/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity), or [PodAntiAffinity](/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity) to ensure
55-
pods don't run alongside untrusted or less-trusted Pods. Pay especial attention to
56+
[Taints and Toleration](/docs/concepts/scheduling-eviction/taint-and-toleration/),
57+
[NodeAffinity](/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity), or
58+
[PodAntiAffinity](/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity)
59+
to ensure pods don't run alongside untrusted or less-trusted Pods. Pay especial attention to
5660
situations where less-trustworthy Pods are not meeting the **Restricted** Pod Security Standard.
5761

5862
### Hardening
@@ -107,7 +111,7 @@ with the ability to create suitably secure and isolated Pods, you should enforce
107111
You can use [Pod Security admission](/docs/concepts/security/pod-security-admission/)
108112
or other (third party) mechanisms to implement that enforcement.
109113

110-
You can also use the deprecated [PodSecurityPolicy](/docs/concepts/policy/pod-security-policy/) mechanism
114+
You can also use the deprecated [PodSecurityPolicy](/docs/concepts/security/pod-security-policy/) mechanism
111115
to restrict users' abilities to create privileged Pods (N.B. PodSecurityPolicy is scheduled for removal
112116
in version 1.25).
113117

@@ -117,7 +121,9 @@ Secrets they would not have through RBAC directly.
117121

118122
### Persistent volume creation
119123

120-
As noted in the [PodSecurityPolicy](/docs/concepts/policy/pod-security-policy/#volumes-and-file-systems) documentation, access to create PersistentVolumes can allow for escalation of access to the underlying host. Where access to persistent storage is required trusted administrators should create
124+
As noted in the [PodSecurityPolicy](/docs/concepts/security/pod-security-policy/#volumes-and-file-systems)
125+
documentation, access to create PersistentVolumes can allow for escalation of access to the underlying host.
126+
Where access to persistent storage is required trusted administrators should create
121127
PersistentVolumes, and constrained users should use PersistentVolumeClaims to access that storage.
122128

123129
### Access to `proxy` subresource of Nodes
@@ -130,7 +136,8 @@ granting rights to this resource.
130136
### Escalate verb
131137

132138
Generally the RBAC system prevents users from creating clusterroles with more rights than
133-
they possess. The exception to this is the `escalate` verb. As noted in the [RBAC documentation](/docs/reference/access-authn-authz/rbac/#restrictions-on-role-creation-or-update),
139+
they possess. The exception to this is the `escalate` verb. As noted in the
140+
[RBAC documentation](/docs/reference/access-authn-authz/rbac/#restrictions-on-role-creation-or-update),
134141
users with this right can effectively escalate their privileges.
135142

136143
### Bind verb
@@ -173,8 +180,11 @@ objects to create a denial of service condition either based on the size or numb
173180
specifically relevant in multi-tenant clusters if semi-trusted or untrusted users
174181
are allowed limited access to a system.
175182

176-
One option for mitigation of this issue would be to use [resource quotas](/docs/concepts/policy/resource-quotas/#object-count-quota)
183+
One option for mitigation of this issue would be to use
184+
[resource quotas](/docs/concepts/policy/resource-quotas/#object-count-quota)
177185
to limit the quantity of objects which can be created.
178186

179187
## {{% heading "whatsnext" %}}
188+
180189
* To learn more about RBAC, see the [RBAC documentation](/docs/reference/access-authn-authz/rbac/).
190+

content/en/docs/concepts/security/windows-security.md

Lines changed: 15 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -22,34 +22,41 @@ storage (as compared to using tmpfs / in-memory filesystems on Linux). As a clus
2222
operator, you should take both of the following additional measures:
2323

2424
1. Use file ACLs to secure the Secrets' file location.
25-
1. Apply volume-level encryption using [BitLocker](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-how-to-deploy-on-windows-server).
25+
1. Apply volume-level encryption using
26+
[BitLocker](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-how-to-deploy-on-windows-server).
2627

2728
## Container users
2829

2930
[RunAsUsername](/docs/tasks/configure-pod-container/configure-runasusername)
3031
can be specified for Windows Pods or containers to execute the container
3132
processes as specific user. This is roughly equivalent to
32-
[RunAsUser](/docs/concepts/policy/pod-security-policy/#users-and-groups).
33+
[RunAsUser](/docs/concepts/security/pod-security-policy/#users-and-groups).
3334

3435
Windows containers offer two default user accounts, ContainerUser and ContainerAdministrator.
3536
The differences between these two user accounts are covered in
36-
[When to use ContainerAdmin and ContainerUser user accounts](https://docs.microsoft.com/virtualization/windowscontainers/manage-containers/container-security#when-to-use-containeradmin-and-containeruser-user-accounts) within Microsoft's _Secure Windows containers_ documentation.
37+
[When to use ContainerAdmin and ContainerUser user accounts](https://docs.microsoft.com/virtualization/windowscontainers/manage-containers/container-security#when-to-use-containeradmin-and-containeruser-user-accounts)
38+
within Microsoft's _Secure Windows containers_ documentation.
3739

3840
Local users can be added to container images during the container build process.
3941

4042
{{< note >}}
4143

42-
* [Nano Server](https://hub.docker.com/_/microsoft-windows-nanoserver) based images run as `ContainerUser` by default
43-
* [Server Core](https://hub.docker.com/_/microsoft-windows-servercore) based images run as `ContainerAdministrator` by default
44+
* [Nano Server](https://hub.docker.com/_/microsoft-windows-nanoserver) based images run as
45+
`ContainerUser` by default
46+
* [Server Core](https://hub.docker.com/_/microsoft-windows-servercore) based images run as
47+
`ContainerAdministrator` by default
4448

4549
{{< /note >}}
4650

47-
Windows containers can also run as Active Directory identities by utilizing [Group Managed Service Accounts](/docs/tasks/configure-pod-container/configure-gmsa/)
51+
Windows containers can also run as Active Directory identities by utilizing
52+
[Group Managed Service Accounts](/docs/tasks/configure-pod-container/configure-gmsa/)
4853

4954
## Pod-level security isolation
5055

5156
Linux-specific pod security context mechanisms (such as SELinux, AppArmor, Seccomp, or custom
5257
POSIX capabilities) are not supported on Windows nodes.
5358

54-
Privileged containers are [not supported](/docs/concepts/windows/intro/#compatibility-v1-pod-spec-containers-securitycontext) on Windows.
55-
Instead [HostProcess containers](/docs/tasks/configure-pod-container/create-hostprocess-pod) can be used on Windows to perform many of the tasks performed by privileged containers on Linux.
59+
Privileged containers are [not supported](/docs/concepts/windows/intro/#compatibility-v1-pod-spec-containers-securitycontext)
60+
on Windows.
61+
Instead [HostProcess containers](/docs/tasks/configure-pod-container/create-hostprocess-pod)
62+
can be used on Windows to perform many of the tasks performed by privileged containers on Linux.

0 commit comments

Comments
 (0)