You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
## Create Pod that uses the container runtime default seccomp profile
269
+
270
+
Most container runtimes provide a sane set of default syscalls that are allowed
271
+
or not. You can adopt these defaults for your workload by setting the seccomp
272
+
type in the security context of a pod or container to `RuntimeDefault`.
273
+
274
+
{{< note >}}
275
+
If you have the `SeccompDefault`[feature gate](/docs/reference/command-line-tools-reference/feature-gates/) enabled, then Pods use the `RuntimeDefault` seccomp profile whenever
276
+
no other seccomp profile is specified. Otherwise, the default is `Unconfined`.
277
+
{{< /note >}}
278
+
279
+
Here's a manifest for a Pod that requests the `RuntimeDefault` seccomp profile
The Pod should be showing as having started successfully:
294
+
```
295
+
NAME READY STATUS RESTARTS AGE
296
+
default-pod 1/1 Running 0 20s
297
+
```
298
+
299
+
Finally, now that you saw that work OK, clean up:
300
+
301
+
```shell
302
+
kubectl delete pod default-pod --wait --now
303
+
```
304
+
268
305
## Create a Pod with a seccomp profile for syscall auditing
269
306
270
307
To start off, apply the `audit.json` profile, which will log all syscalls of the
@@ -493,43 +530,6 @@ kubectl delete service fine-pod --wait
493
530
kubectl delete pod fine-pod --wait --now
494
531
```
495
532
496
-
## Create Pod that uses the container runtime default seccomp profile
497
-
498
-
Most container runtimes provide a sane set of default syscalls that are allowed
499
-
or not. You can adopt these defaults for your workload by setting the seccomp
500
-
type in the security context of a pod or container to `RuntimeDefault`.
501
-
502
-
{{< note >}}
503
-
If you have the `SeccompDefault`[feature gate](/docs/reference/command-line-tools-reference/feature-gates/) enabled, then Pods use the `RuntimeDefault` seccomp profile whenever
504
-
no other seccomp profile is specified. Otherwise, the default is `Unconfined`.
505
-
{{< /note >}}
506
-
507
-
Here's a manifest for a Pod that requests the `RuntimeDefault` seccomp profile
0 commit comments