You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: website/content/en/docs/best-practices/pod-security-standards.md
+4-8Lines changed: 4 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -112,15 +112,11 @@ with the requirements in the same way. You can find some examples by looking at
112
112
113
113
-**For workloads that need elevated permissions:** it is recommended that you ensure the namespace containing your
114
114
solution is labeled accordingly. You can either update your operator to manage the namespace labels or include
115
-
the namespace labeling as part of the manual install instructions. Following the labels for this case scenario:
115
+
the namespace labeling as part of the manual install instructions.
116
116
117
-
```yaml
118
-
labels:
119
-
...
120
-
pod-security.kubernetes.io/enforce: privileged
121
-
pod-security.kubernetes.io/audit: privileged
122
-
pod-security.kubernetes.io/warn: privileged
123
-
```
117
+
It is recommended that you provide a description to help cluster admins understand why elevated permissions are required.
118
+
You can add this information and the prerequisites to the description of your
119
+
Operator Bundle (CSV).
124
120
125
121
Following you will find a detailed description of how to configure and test your solutions.
126
122
The most straightforward way to ensure if your workloads will work in a restricted namespace is verifying if your solution can run in namespaces enforced as restricted.
0 commit comments