You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/reference/profiles.md
+42-2Lines changed: 42 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -80,7 +80,7 @@ The configuration use the exact options that you find in the Kubernetes document
80
80
81
81
#### Implement the restricted Pod Security Standard
82
82
83
-
This example requires OpenFaaS for Enterprises and is aimed at securing enterprise and multi-tenant workloads.
83
+
This example requires OpenFaaS for Enterprises with (`faas-netes:0.5.65` or higher) and is aimed at securing enterprise and multi-tenant workloads.
84
84
85
85
[Pod Security Standards](https://kubernetes.io/docs/concepts/security/pod-security-standards/) were introduced in K8s v1.25 and are a set of best practices for securing your Pods. The `restricted` profile is the most secure option.
86
86
@@ -89,7 +89,7 @@ The below example deploys a function which will pass the `restricted` Pod Securi
89
89
It defines:
90
90
91
91
* A new namespace for functions called `restricted-fn`, which has been labeled with `pod-security.kubernetes.io/enforce: restricted`
92
-
* A new Profile called `restricted` which sets the Pod Security Context to use `RuntimeDefault` and `runAsNonRoot: true`
92
+
* A new Profile called `restricted` which sets the Pod Security Context to use `RuntimeDefault` and `runAsNonRoot: true` - any name can be used, or you could update an existing Profile that you're already using
93
93
* A function called `env` which uses the `restricted` Profile
94
94
95
95
```yaml
@@ -161,6 +161,46 @@ securityContext:
161
161
runAsNonRoot: true
162
162
```
163
163
164
+
To upgrade existing functions, upgrade OpenFaaS via Helm, then run:
0 commit comments