You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The Pod should be showing as having started successfully:
295
+
```
296
+
NAME READY STATUS RESTARTS AGE
297
+
default-pod 1/1 Running 0 20s
298
+
```
299
+
300
+
Finally, now that you saw that work OK, clean up:
301
+
302
+
```shell
303
+
kubectl delete pod default-pod --wait --now
304
+
```
305
+
268
306
## Create a Pod with a seccomp profile for syscall auditing
269
307
270
308
To start off, apply the `audit.json` profile, which will log all syscalls of the
@@ -493,43 +531,6 @@ kubectl delete service fine-pod --wait
493
531
kubectl delete pod fine-pod --wait --now
494
532
```
495
533
496
-
## Create Pod that uses the container runtime default seccomp profile
497
-
498
-
Most container runtimes provide a sane set of default syscalls that are allowed
499
-
or not. You can adopt these defaults for your workload by setting the seccomp
500
-
type in the security context of a pod or container to `RuntimeDefault`.
501
-
502
-
{{< note >}}
503
-
If you have the `SeccompDefault`[feature gate](/docs/reference/command-line-tools-reference/feature-gates/) enabled, then Pods use the `RuntimeDefault` seccomp profile whenever
504
-
no other seccomp profile is specified. Otherwise, the default is `Unconfined`.
505
-
{{< /note >}}
506
-
507
-
Here's a manifest for a Pod that requests the `RuntimeDefault` seccomp profile
0 commit comments