We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
charts/yeti
Improves the security of the deployment / underlying containers
Configure and test a set of security policies for the Yeti deployment.
This can include:
securityContext: readOnlyRootFilesystem: true runAsNonRoot: true allowPrivilegeEscalation: false runAsUser: <USER ID MAPPED IN CONTAINER>
Also by enabling the default seccomp profile: https://kubernetes.io/docs/tutorials/security/seccomp/
More guidance can be found here: https://kubernetes.io/docs/concepts/security/pod-security-standards/
Logging may need to be adjusted to go to the underlying pvc
No response
The text was updated successfully, but these errors were encountered:
No branches or pull requests
Name and Version
charts/yeti
What is the problem this feature will solve?
Improves the security of the deployment / underlying containers
What is the feature you are proposing to solve the problem?
Configure and test a set of security policies for the Yeti deployment.
This can include:
Also by enabling the default seccomp profile: https://kubernetes.io/docs/tutorials/security/seccomp/
More guidance can be found here: https://kubernetes.io/docs/concepts/security/pod-security-standards/
Logging may need to be adjusted to go to the underlying pvc
What alternatives have you considered?
No response
The text was updated successfully, but these errors were encountered: