We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Currently, only the "runAsUser" option is set in the controller's container securityContext.
securityContext: runAsUser: 101
Official Azure policies expect "allowPrivilegeEscalation" to be declared false. Kubernetes clusters should not allow container privilege escalation Azure policy Gatekeeper template: k8sazurev3noprivilegeescalation
I propose to upgrade the securityContext to match the official "restricted" pod security standard. Official pod security standards documentation.
Proposed securityContext:
spec: template: spec: containers: - name: controller securityContext: runAsUser: 101 allowPrivilegeEscalation: false seccompProfile: type: RuntimeDefault capabilities: drop: - ALL
The text was updated successfully, but these errors were encountered:
Working on #192 to address this.
Sorry, something went wrong.
No branches or pull requests
Currently, only the "runAsUser" option is set in the controller's container securityContext.
Official Azure policies expect "allowPrivilegeEscalation" to be declared false.
Kubernetes clusters should not allow container privilege escalation Azure policy
Gatekeeper template: k8sazurev3noprivilegeescalation
I propose to upgrade the securityContext to match the official "restricted" pod security standard.
Official pod security standards documentation.
Proposed securityContext:
The text was updated successfully, but these errors were encountered: