Skip to content

Instantly share code, notes, and snippets.

@ravisantoshgudimetla
Created November 2, 2017 02:47
Show Gist options
  • Save ravisantoshgudimetla/91748a20766672d2f26b93b3c42517b4 to your computer and use it in GitHub Desktop.
Save ravisantoshgudimetla/91748a20766672d2f26b93b3c42517b4 to your computer and use it in GitHub Desktop.
sample restricted scc.
allowHostDirVolumePlugin: true
allowHostIPC: false
allowHostNetwork: false
allowHostPID: false
allowHostPorts: false
allowPrivilegedContainer: false
allowedCapabilities: null
apiVersion: v1
defaultAddCapabilities: null
fsGroup:
type: MustRunAs
groups:
- system:authenticated
kind: SecurityContextConstraints
metadata:
annotations:
kubernetes.io/description: restricted denies access to all host features and requires
pods to be run with a UID, and SELinux context that are allocated to the namespace. This
is the most restrictive SCC.
creationTimestamp: 2017-10-26T21:52:31Z
name: restricted
resourceVersion: "2836"
selfLink: /api/v1/securitycontextconstraintsrestricted
uid: f79b76fa-ba97-11e7-be1e-c85b76333877
priority: null
readOnlyRootFilesystem: false
requiredDropCapabilities:
- KILL
- MKNOD
- SYS_CHROOT
- SETUID
- SETGID
runAsUser:
type: RunAsAny
seLinuxContext:
type: MustRunAs
supplementalGroups:
type: RunAsAny
volumes:
- configMap
- downwardAPI
- emptyDir
- hostPath
- persistentVolumeClaim
- secret
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment