mirror of
https://github.com/HackTricks-wiki/hacktricks-cloud.git
synced 2025-12-28 05:33:10 -08:00
Translated ['.github/pull_request_template.md', 'src/pentesting-cloud/az
This commit is contained in:
@@ -1,35 +1,33 @@
|
||||
# OpenShift - Basic information
|
||||
# OpenShift - Basiese inligting
|
||||
|
||||
## Kubernetes prior b**asic knowledge** <a href="#a94e" id="a94e"></a>
|
||||
## Kubernetes vooraf b**asiese kennis** <a href="#a94e" id="a94e"></a>
|
||||
|
||||
Before working with OpenShift, ensure you are comfortable with the Kubernetes environment. The entire OpenShift chapter assumes you have prior knowledge of Kubernetes.
|
||||
Voordat jy met OpenShift werk, moet jy gemaklik wees met die Kubernetes-omgewing. Die hele OpenShift-hoofstuk neem aan dat jy vooraf kennis van Kubernetes het.
|
||||
|
||||
## OpenShift - Basic Information
|
||||
## OpenShift - Basiese Inligting
|
||||
|
||||
### Introduction
|
||||
### Inleiding
|
||||
|
||||
OpenShift is Red Hat’s container application platform that offers a superset of Kubernetes features. OpenShift has stricter security policies. For instance, it is forbidden to run a container as root. It also offers a secure-by-default option to enhance security. OpenShift, features an web console which includes a one-touch login page.
|
||||
OpenShift is Red Hat se houer-toepassingplatform wat 'n superset van Kubernetes-funksies bied. OpenShift het strenger sekuriteitsbeleide. Byvoorbeeld, dit is verbode om 'n houer as root te laat loop. Dit bied ook 'n veilige-van-natuurlik opsie om sekuriteit te verbeter. OpenShift het 'n webkonsol wat 'n een-raak aanmeldbladsy insluit.
|
||||
|
||||
#### CLI
|
||||
|
||||
OpenShift come with a it's own CLI, that can be found here:
|
||||
OpenShift kom met sy eie CLI, wat hier gevind kan word:
|
||||
|
||||
{{#ref}}
|
||||
https://docs.openshift.com/container-platform/4.11/cli_reference/openshift_cli/getting-started-cli.html
|
||||
{{#endref}}
|
||||
|
||||
To login using the CLI:
|
||||
|
||||
Om aan te meld met die CLI:
|
||||
```bash
|
||||
oc login -u=<username> -p=<password> -s=<server>
|
||||
oc login -s=<server> --token=<bearer token>
|
||||
```
|
||||
### **OpenShift - Sekuriteitskonteksbeperkings** <a href="#a94e" id="a94e"></a>
|
||||
|
||||
### **OpenShift - Security Context Constraints** <a href="#a94e" id="a94e"></a>
|
||||
Benewens die [RBAC hulpbronne](https://docs.openshift.com/container-platform/3.11/architecture/additional_concepts/authorization.html#architecture-additional-concepts-authorization) wat beheer wat 'n gebruiker kan doen, bied OpenShift Container Platform _sekuriteitskonteksbeperkings_ (SCC) wat die aksies beheer wat 'n pod kan uitvoer en wat dit die vermoë het om toegang te verkry.
|
||||
|
||||
In addition to the [RBAC resources](https://docs.openshift.com/container-platform/3.11/architecture/additional_concepts/authorization.html#architecture-additional-concepts-authorization) that control what a user can do, OpenShift Container Platform provides _security context constraints_ (SCC) that control the actions that a pod can perform and what it has the ability to access.
|
||||
|
||||
SCC is a policy object that has special rules that correspond with the infrastructure itself, unlike RBAC that has rules that correspond with the Platform. It helps us define what Linux access-control features the container should be able to request/run. Example: Linux Capabilities, SECCOMP profiles, Mount localhost dirs, etc.
|
||||
SCC is 'n beleidsobjek wat spesiale reëls het wat ooreenstem met die infrastruktuur self, anders as RBAC wat reëls het wat ooreenstem met die Platform. Dit help ons om te definieer watter Linux toegang-beheer funksies die houer moet kan versoek/uitvoer. Voorbeeld: Linux Vermoëns, SECCOMP profiele, Mount localhost dirs, ens.
|
||||
|
||||
{{#ref}}
|
||||
openshift-scc.md
|
||||
@@ -38,7 +36,3 @@ openshift-scc.md
|
||||
{{#ref}}
|
||||
https://docs.openshift.com/container-platform/3.11/architecture/additional_concepts/authorization.html#security-context-constraints
|
||||
{{#endref}}
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Reference in New Issue
Block a user