-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add configuration flag for pod_security_policy_config
#140
Labels
enhancement
New feature or request
Comments
+1 |
1 similar comment
+1 |
aaron-lane
added a commit
that referenced
this issue
Jun 13, 2019
Add configuration flag for `pod_security_policy_config` #140
Fixed by #163. |
@aaron-lane we only did this for private clusters. Not sure why. Public clusters love PSP too! |
See #188 |
CPL-markus
pushed a commit
to WALTER-GROUP/terraform-google-kubernetes-engine
that referenced
this issue
Jul 15, 2024
CPL-markus
pushed a commit
to WALTER-GROUP/terraform-google-kubernetes-engine
that referenced
this issue
Jul 15, 2024
Add configuration flag for `pod_security_policy_config` terraform-google-modules#140
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
https://www.terraform.io/docs/providers/google/r/container_cluster.html#enabled-2
But disabled by the default variable(s).
This would allow cluster operators to enable this feature to support policies that prevent pods from being able to mount the host filesystem, run in the host network and/or process namespace, and run as a privileged user.
See: https://www.qwiklabs.com/focuses/5158?parent=catalog for more bg info if desired.
The text was updated successfully, but these errors were encountered: