We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add seccompProfile.type RuntimeDefault to Deployments as per PSS/restricted spec.
This would bring the default manifests into compliance with PSS/restricted policies.
The policies currently fail because the containers in the two Deployments are missing an explicit seccompProfile type.
wget https://raw.githubusercontent.com/kyverno/policies/main/pod-security/restricted/restrict-seccomp-strict/restrict-seccomp-strict.yaml kyverno apply restrict-seccomp-strict.yaml -r \ <(helm template keda --repo https://kedacore.github.io/charts -n keda)
https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
NOTE: seccompProfile is only supported in Kubernetes 1.19+
The text was updated successfully, but these errors were encountered:
Successfully merging a pull request may close this issue.
Add seccompProfile.type RuntimeDefault to Deployments as per PSS/restricted spec.
Use-Case
This would bring the default manifests into compliance with PSS/restricted policies.
The policies currently fail because the containers in the two Deployments are missing an explicit seccompProfile type.
wget https://raw.githubusercontent.com/kyverno/policies/main/pod-security/restricted/restrict-seccomp-strict/restrict-seccomp-strict.yaml kyverno apply restrict-seccomp-strict.yaml -r \ <(helm template keda --repo https://kedacore.github.io/charts -n keda)
Specification
https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
NOTE: seccompProfile is only supported in Kubernetes 1.19+
The text was updated successfully, but these errors were encountered: