Translated ['.github/pull_request_template.md', 'src/pentesting-cloud/az

This commit is contained in:
Translator
2024-12-31 19:02:02 +00:00
parent 7770a50092
commit 2753c75e8b
244 changed files with 8471 additions and 11302 deletions

View File

@@ -1,35 +1,33 @@
# OpenShift - Basic information
# OpenShift - Basiese inligting
## Kubernetes prior b**asic knowledge** <a href="#a94e" id="a94e"></a>
## Kubernetes vooraf b**asiese kennis** <a href="#a94e" id="a94e"></a>
Before working with OpenShift, ensure you are comfortable with the Kubernetes environment. The entire OpenShift chapter assumes you have prior knowledge of Kubernetes.
Voordat jy met OpenShift werk, moet jy gemaklik wees met die Kubernetes-omgewing. Die hele OpenShift-hoofstuk neem aan dat jy vooraf kennis van Kubernetes het.
## OpenShift - Basic Information
## OpenShift - Basiese Inligting
### Introduction
### Inleiding
OpenShift is Red Hats container application platform that offers a superset of Kubernetes features. OpenShift has stricter security policies. For instance, it is forbidden to run a container as root. It also offers a secure-by-default option to enhance security. OpenShift, features an web console which includes a one-touch login page.
OpenShift is Red Hat se houer-toepassingplatform wat 'n superset van Kubernetes-funksies bied. OpenShift het strenger sekuriteitsbeleide. Byvoorbeeld, dit is verbode om 'n houer as root te laat loop. Dit bied ook 'n veilige-van-natuurlik opsie om sekuriteit te verbeter. OpenShift het 'n webkonsol wat 'n een-raak aanmeldbladsy insluit.
#### CLI
OpenShift come with a it's own CLI, that can be found here:
OpenShift kom met sy eie CLI, wat hier gevind kan word:
{{#ref}}
https://docs.openshift.com/container-platform/4.11/cli_reference/openshift_cli/getting-started-cli.html
{{#endref}}
To login using the CLI:
Om aan te meld met die CLI:
```bash
oc login -u=<username> -p=<password> -s=<server>
oc login -s=<server> --token=<bearer token>
```
### **OpenShift - Sekuriteitskonteksbeperkings** <a href="#a94e" id="a94e"></a>
### **OpenShift - Security Context Constraints** <a href="#a94e" id="a94e"></a>
Benewens die [RBAC hulpbronne](https://docs.openshift.com/container-platform/3.11/architecture/additional_concepts/authorization.html#architecture-additional-concepts-authorization) wat beheer wat 'n gebruiker kan doen, bied OpenShift Container Platform _sekuriteitskonteksbeperkings_ (SCC) wat die aksies beheer wat 'n pod kan uitvoer en wat dit die vermoë het om toegang te verkry.
In addition to the [RBAC resources](https://docs.openshift.com/container-platform/3.11/architecture/additional_concepts/authorization.html#architecture-additional-concepts-authorization) that control what a user can do, OpenShift Container Platform provides _security context constraints_ (SCC) that control the actions that a pod can perform and what it has the ability to access.
SCC is a policy object that has special rules that correspond with the infrastructure itself, unlike RBAC that has rules that correspond with the Platform. It helps us define what Linux access-control features the container should be able to request/run. Example: Linux Capabilities, SECCOMP profiles, Mount localhost dirs, etc.
SCC is 'n beleidsobjek wat spesiale reëls het wat ooreenstem met die infrastruktuur self, anders as RBAC wat reëls het wat ooreenstem met die Platform. Dit help ons om te definieer watter Linux toegang-beheer funksies die houer moet kan versoek/uitvoer. Voorbeeld: Linux Vermoëns, SECCOMP profiele, Mount localhost dirs, ens.
{{#ref}}
openshift-scc.md
@@ -38,7 +36,3 @@ openshift-scc.md
{{#ref}}
https://docs.openshift.com/container-platform/3.11/architecture/additional_concepts/authorization.html#security-context-constraints
{{#endref}}