Translated ['.github/pull_request_template.md', 'src/pentesting-cloud/az

This commit is contained in:
Translator
2024-12-31 19:00:04 +00:00
parent 7770a50092
commit 10e2881a9b
244 changed files with 8499 additions and 11339 deletions

View File

@@ -1,35 +1,33 @@
# OpenShift - Basic information
# OpenShift - Osnovne informacije
## Kubernetes prior b**asic knowledge** <a href="#a94e" id="a94e"></a>
## Kubernetes prethodno b**azično znanje** <a href="#a94e" id="a94e"></a>
Before working with OpenShift, ensure you are comfortable with the Kubernetes environment. The entire OpenShift chapter assumes you have prior knowledge of Kubernetes.
Pre nego što počnete sa radom na OpenShift-u, uverite se da ste upoznati sa Kubernetes okruženjem. Ceo OpenShift deo pretpostavlja da imate prethodno znanje o Kubernetes-u.
## OpenShift - Basic Information
## OpenShift - Osnovne informacije
### Introduction
### Uvod
OpenShift is Red Hats container application platform that offers a superset of Kubernetes features. OpenShift has stricter security policies. For instance, it is forbidden to run a container as root. It also offers a secure-by-default option to enhance security. OpenShift, features an web console which includes a one-touch login page.
OpenShift je platforma za aplikacije u kontejnerima kompanije Red Hat koja nudi superset Kubernetes funkcionalnosti. OpenShift ima strože bezbednosne politike. Na primer, zabranjeno je pokretanje kontejnera kao root. Takođe nudi opciju koja je po defaultu sigurna kako bi poboljšala bezbednost. OpenShift ima web konzolu koja uključuje stranicu za prijavu na jedan dodir.
#### CLI
OpenShift come with a it's own CLI, that can be found here:
OpenShift dolazi sa svojim CLI-jem, koji se može pronaći ovde:
{{#ref}}
https://docs.openshift.com/container-platform/4.11/cli_reference/openshift_cli/getting-started-cli.html
{{#endref}}
To login using the CLI:
Da biste se prijavili koristeći CLI:
```bash
oc login -u=<username> -p=<password> -s=<server>
oc login -s=<server> --token=<bearer token>
```
### **OpenShift - Ograničenja konteksta bezbednosti** <a href="#a94e" id="a94e"></a>
### **OpenShift - Security Context Constraints** <a href="#a94e" id="a94e"></a>
Pored [RBAC resursa](https://docs.openshift.com/container-platform/3.11/architecture/additional_concepts/authorization.html#architecture-additional-concepts-authorization) koji kontrolišu šta korisnik može da radi, OpenShift Container Platform pruža _ograničenja konteksta bezbednosti_ (SCC) koja kontrolišu akcije koje pod može da izvrši i šta ima mogućnost da pristupi.
In addition to the [RBAC resources](https://docs.openshift.com/container-platform/3.11/architecture/additional_concepts/authorization.html#architecture-additional-concepts-authorization) that control what a user can do, OpenShift Container Platform provides _security context constraints_ (SCC) that control the actions that a pod can perform and what it has the ability to access.
SCC is a policy object that has special rules that correspond with the infrastructure itself, unlike RBAC that has rules that correspond with the Platform. It helps us define what Linux access-control features the container should be able to request/run. Example: Linux Capabilities, SECCOMP profiles, Mount localhost dirs, etc.
SCC je objekat politike koji ima posebna pravila koja odgovaraju samoj infrastrukturi, za razliku od RBAC-a koji ima pravila koja odgovaraju Platformi. Pomaže nam da definišemo koje Linux funkcije kontrole pristupa kontejner treba da može da zahteva/izvrši. Primer: Linux sposobnosti, SECCOMP profili, Montiranje lokalnih direktorijuma, itd.
{{#ref}}
openshift-scc.md
@@ -38,7 +36,3 @@ openshift-scc.md
{{#ref}}
https://docs.openshift.com/container-platform/3.11/architecture/additional_concepts/authorization.html#security-context-constraints
{{#endref}}