@@ -45,12 +45,12 @@ Nodes before proceeding:
45
45
The kubelet verifies that AppArmor is enabled on the host before admitting a pod with AppArmor
46
46
explicitly configured.
47
47
48
- 3 . Container runtime supports AppArmor -- All common Kubernetes-supported container
48
+ 1 . Container runtime supports AppArmor -- All common Kubernetes-supported container
49
49
runtimes should support AppArmor, including {{< glossary_tooltip term_id="containerd" >}} and
50
50
{{< glossary_tooltip term_id="cri-o" >}}. Please refer to the corresponding runtime
51
51
documentation and verify that the cluster fulfills the requirements to use AppArmor.
52
52
53
- 4 . Profile is loaded -- AppArmor is applied to a Pod by specifying an AppArmor profile that each
53
+ 1 . Profile is loaded -- AppArmor is applied to a Pod by specifying an AppArmor profile that each
54
54
container should be run with. If any of the specified profiles are not loaded in the
55
55
kernel, the kubelet will reject the Pod. You can view which profiles are loaded on a
56
56
node by checking the ` /sys/kernel/security/apparmor/profiles ` file. For example:
@@ -278,9 +278,15 @@ AppArmor profile are set, the container's profile will be used.
278
278
An AppArmor profile has 2 fields:
279
279
280
280
` type ` _ (required)_ - indicates which kind of AppArmor profile will be applied. Valid options are:
281
- - ` Localhost ` - a profile pre-loaded on the node (specified by ` localhostProfile ` ).
282
- - ` RuntimeDefault ` - the container runtime's default profile.
283
- - ` Unconfined ` - no AppArmor enforcement.
281
+
282
+ ` Localhost `
283
+ : a profile pre-loaded on the node (specified by ` localhostProfile ` ).
284
+
285
+ ` RuntimeDefault `
286
+ : the container runtime's default profile.
287
+
288
+ ` Unconfined `
289
+ : no AppArmor enforcement.
284
290
285
291
` localhostProfile ` - The name of a profile loaded on the node that should be used.
286
292
The profile must be preconfigured on the node to work.
0 commit comments