Skip to content

Commit 23d4345

Browse files
doc: add recommendation to the best practices (#5985)
* doc: add recommendation to the best practices * Update website/content/en/docs/best-practices/pod-security-standards.md Co-authored-by: Bryce Palmer <[email protected]> Co-authored-by: Bryce Palmer <[email protected]>
1 parent 317d046 commit 23d4345

File tree

1 file changed

+4
-8
lines changed

1 file changed

+4
-8
lines changed

website/content/en/docs/best-practices/pod-security-standards.md

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -112,15 +112,11 @@ with the requirements in the same way. You can find some examples by looking at
112112

113113
- **For workloads that need elevated permissions:** it is recommended that you ensure the namespace containing your
114114
solution is labeled accordingly. You can either update your operator to manage the namespace labels or include
115-
the namespace labeling as part of the manual install instructions. Following the labels for this case scenario:
115+
the namespace labeling as part of the manual install instructions.
116116

117-
```yaml
118-
labels:
119-
...
120-
pod-security.kubernetes.io/enforce: privileged
121-
pod-security.kubernetes.io/audit: privileged
122-
pod-security.kubernetes.io/warn: privileged
123-
```
117+
It is recommended that you provide a description to help cluster admins understand why elevated permissions are required.
118+
You can add this information and the prerequisites to the description of your
119+
Operator Bundle (CSV).
124120

125121
Following you will find a detailed description of how to configure and test your solutions.
126122
The most straightforward way to ensure if your workloads will work in a restricted namespace is verifying if your solution can run in namespaces enforced as restricted.

0 commit comments

Comments
 (0)