You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
= Replicating controllers and SecurityContextConstraints
20
8
21
-
When deploying {type} policies for replicating controllers, such as deployments or daemon sets, note that the `Pod` objects spawned by the controllers are not running with the identity of the user who creates the workload. Unless a `ServiceAccount` is selected, the pods might revert to using a restricted `SecurityContextConstraints` (SCC) which does not allow use of custom security policies.
9
+
When you deploy SELinux policies for replicating controllers, such as deployments or daemon sets, note that the `Pod` objects spawned by the controllers are not running with the identity of the user who creates the workload. Unless a `ServiceAccount` is selected, the pods might revert to using a restricted `SecurityContextConstraints` (SCC) which does not allow use of custom security policies.
22
10
23
11
.Procedure
24
12
@@ -29,14 +17,14 @@ When deploying {type} policies for replicating controllers, such as deployments
The SELinux type is not specified in the workload and is handled by the SCC. When the pods are created by the deployment and the `ReplicaSet`, the pods will run with the appropriate profile.
113
101
====
114
102
115
-
Ensure your SCC is only usable by the correct service account. Refer to _Additional resources_ for more information.
116
-
117
-
ifeval::["{context}" == "spo-seccomp"]
118
-
:!seccomp:
119
-
:!type:
120
-
:!kind:
121
-
endif::[]
122
-
ifeval::["{context}" == "spo-selinux"]
123
-
:!selinux:
124
-
:!type:
125
-
:!kind:
126
-
endif::[]
103
+
Ensure that your SCC is usable by only the correct service account. Refer to _Additional resources_ for more information.
0 commit comments