File tree 2 files changed +3
-3
lines changed
content/zh-cn/docs/concepts/security
2 files changed +3
-3
lines changed Original file line number Diff line number Diff line change @@ -148,7 +148,7 @@ IBM Cloud | https://www.ibm.com/cloud/security |
148
148
Microsoft Azure | https://docs.microsoft.com/en-us/azure/security/azure-security |
149
149
Oracle Cloud Infrastructure | https://www.oracle.com/security |
150
150
Tencent Cloud | https://www.tencentcloud.com/solutions/data-security-and-information-protection |
151
- VMware vSphere | https://www.vmware.com/security/hardening-guides |
151
+ VMware vSphere | https://www.vmware.com/solutions/ security/hardening-guides |
152
152
153
153
{{< /table >}}
154
154
-->
@@ -164,7 +164,7 @@ IBM 云 | https://www.ibm.com/cloud/security |
164
164
微软 Azure | https://docs.microsoft.com/en-us/azure/security/azure-security |
165
165
Oracle 云基础设施| https://www.oracle.com/security |
166
166
腾讯云 | https://www.tencentcloud.com/solutions/data-security-and-information-protection |
167
- VMware vSphere | https://www.vmware.com/security/hardening-guides |
167
+ VMware vSphere | https://www.vmware.com/solutions/ security/hardening-guides |
168
168
169
169
{{< /table >}}
170
170
Original file line number Diff line number Diff line change @@ -707,7 +707,7 @@ built-in [Pod Security Admission Controller](/docs/concepts/security/pod-securit
707
707
<!--
708
708
### What about sandboxed Pods?
709
709
710
- There is not currently an API standard that controls whether a Pod is considered sandboxed or
710
+ There is currently no API standard that controls whether a Pod is considered sandboxed or
711
711
not. Sandbox Pods may be identified by the use of a sandboxed runtime (such as gVisor or Kata
712
712
Containers), but there is no standard definition of what a sandboxed runtime is.
713
713
-->
You can’t perform that action at this time.
0 commit comments