@@ -232,56 +232,12 @@ services: {}
232232  #    securityContext:
233233  #      # Prevent privilege escalation
234234  #      allowPrivilegeEscalation: false
235-   #      # Use a read-only root filesystem
236-   #      readOnlyRootFilesystem: true
237-   #      # Run as non-root user
238-   #      runAsNonRoot: true
239235  #      # Specify user ID
240236  #      runAsUser: 1000
241237  #      # Specify group ID
242238  #      runAsGroup: 1000
243239  #      # Specify filesystem group ID for volume access
244240  #      fsGroup: 1000
245-   #      # Run container in privileged mode (not recommended)
246-   #      privileged: false
247-   #      # Specify how proc filesystem is mounted
248-   #      procMount: "Default"
249-   #      # Linux capabilities
250-   #      capabilities:
251-   #        # Add specific capabilities
252-   #        add:
253-   #          - NET_BIND_SERVICE
254-   #        # Drop specific capabilities
255-   #        drop:
256-   #          - ALL
257-   #      # Seccomp profile settings
258-   #      seccompProfile:
259-   #        # Type can be "RuntimeDefault", "Localhost", or "Unconfined"
260-   #        type: "RuntimeDefault"
261-   #        # Path to local seccomp profile (only used with type: "Localhost")
262-   #        # localhostProfile: "profiles/myprofile.json"
263-   #      # SELinux options
264-   #      seLinuxOptions:
265-   #        # SELinux level
266-   #        level: "s0:c123,c456"
267-   #        # SELinux role
268-   #        role: "object_r"
269-   #        # SELinux type
270-   #        type: "spc_t"
271-   #        # SELinux user
272-   #        user: "system_u"
273-   #      # Kernel parameters (sysctls) for the container
274-   #      # Note: These require the pod security context to be set and some sysctls might be namespaced
275-   #      sysctls:
276-   #        # Increase the maximum number of open files
277-   #        - name: "fs.file-max"
278-   #          value: "65535"
279-   #        # Increase the maximum number of memory map areas a process may have
280-   #        - name: "vm.max_map_count"
281-   #          value: "262144"
282-   #        # Increase the maximum number of incoming connections
283-   #        - name: "net.core.somaxconn"
284-   #          value: "4096"
285241
286242  #    # Enable autoscaling using HorizontalPodAutoscaler
287243  #    # see: https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale-walkthrough/
0 commit comments