2.4.5.3. Pod セキュリティーポリシーの例
Pod セキュリティーポリシーは、以下の YAML ファイルのようになります。
apiVersion: policy.open-cluster-management.io/v1 kind: Policy metadata: name: policy-podsecuritypolicy namespace: open-cluster-management spec: complianceType: musthave remediationAction: inform namespaces: exclude: ["kube-*"] include: ["default"] object-templates: - complianceType: musthave objectDefinition: apiVersion: policy/v1beta1 kind: PodSecurityPolicy # no privileged pods metadata: name: restricted-open-cluster-management annotations: seccomp.security.alpha.kubernetes.io/allowedProfileNames: '*' spec: privileged: false # no priviliedged pods allowPrivilegeEscalation: false allowedCapabilities: - '*' volumes: - '*' hostNetwork: true hostPorts: - min: 1000 # ports < 1000 are reserved max: 65535 hostIPC: false hostPID: false runAsUser: rule: 'RunAsAny' seLinux: rule: 'RunAsAny' supplementalGroups: rule: 'RunAsAny' fsGroup: rule: 'RunAsAny' ...
apiVersion: policy.open-cluster-management.io/v1
kind: Policy
metadata:
name: policy-podsecuritypolicy
namespace: open-cluster-management
spec:
complianceType: musthave
remediationAction: inform
namespaces:
exclude: ["kube-*"]
include: ["default"]
object-templates:
- complianceType: musthave
objectDefinition:
apiVersion: policy/v1beta1
kind: PodSecurityPolicy # no privileged pods
metadata:
name: restricted-open-cluster-management
annotations:
seccomp.security.alpha.kubernetes.io/allowedProfileNames: '*'
spec:
privileged: false # no priviliedged pods
allowPrivilegeEscalation: false
allowedCapabilities:
- '*'
volumes:
- '*'
hostNetwork: true
hostPorts:
- min: 1000 # ports < 1000 are reserved
max: 65535
hostIPC: false
hostPID: false
runAsUser:
rule: 'RunAsAny'
seLinux:
rule: 'RunAsAny'
supplementalGroups:
rule: 'RunAsAny'
fsGroup:
rule: 'RunAsAny'
...
詳細は、「 Pod セキュリティーポリシーの管理 」を参照してください。コントローラーが監視するその他の設定ポリシーについては、「 Kubernetes 設定ポリシーコントローラー 」ページを参照してください。