Difference between revisions of "Spec.securityContext"
Jump to navigation
Jump to search
(→Errors) |
|||
Line 15: | Line 15: | ||
== Errors == | == Errors == | ||
− | * [[Error: container's runAsUser breaks non-root policy]] | + | * <code>[[Error: container's runAsUser breaks non-root policy]]</code> |
== Related == | == Related == |
Revision as of 09:09, 21 May 2024
securityContext:
spec: securityContext: runAsNonRoot: true
runAsNonRoot runAsUser runAsGroup
Errors
Related
- Kubernetes changelog: AppArmor profiles can now be configured through fields on the
PodSecurityContext
and containerSecurityContext
See also
spec.securityContext, spec.securityContext.runAsUser, spec.securityContext.fsGroup
- CKA: v1.28: API, Namespace, Pods, secrets, Services, deployments, nodes, Volumes, Ingress, CKS
- Kubernetes security, OPA, EKS security, PSA, PSS, CKS,
SecurityContext
, Trivy, KubeBench, Kubernetes Admission Controllersadmissionregistration.k8s.io
, Hardeneks, Gatekeeper (Kubernetes),kubernetes.io/enforce-mountable-secrets
, Auditing
Advertising: