You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/domains/k8s1.9.0.md
+36-36Lines changed: 36 additions & 36 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,30 +43,6 @@ SecretReference represents a Secret Reference. It has enough information to retr
43
43
| name | string | Name is unique within a namespace to reference a secret resource. |
44
44
| namespace | string | Namespace defines the space within which the secret name must be unique. |
45
45
46
-
### Security Context
47
-
48
-
SecurityContext holds security configuration that will be applied to a container. Some fields are present in both SecurityContext and PodSecurityContext. When both are set, the values in SecurityContext take precedence.
49
-
50
-
| Name | Type | Description |
51
-
| --- | --- | --- |
52
-
| allowPrivilegeEscalation | boolean | AllowPrivilegeEscalation controls whether a process can gain more privileges than its parent process. This bool directly controls if the no_new_privs flag will be set on the container process. AllowPrivilegeEscalation is true always when the container is: 1) run as Privileged 2) has CAP_SYS_ADMIN |
53
-
| capabilities |[Capabilities](#capabilities)| The capabilities to add/drop when running containers. Defaults to the default set of capabilities granted by the container runtime. |
54
-
| privileged | boolean | Run container in privileged mode. Processes in privileged containers are essentially equivalent to root on the host. Defaults to false. |
55
-
| readOnlyRootFilesystem | boolean | Whether this container has a read-only root filesystem. Default is false. |
56
-
| runAsNonRoot | boolean | Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. |
57
-
| runAsUser | integer | The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. |
58
-
| seLinuxOptions |[SE Linux Options](#se-linux-options)| The SELinux context to be applied to the container. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. |
59
-
60
-
### Env Var
61
-
62
-
EnvVar represents an environment variable present in a Container.
63
-
64
-
| Name | Type | Description |
65
-
| --- | --- | --- |
66
-
| name | string | Name of the environment variable. Must be a C_IDENTIFIER. |
67
-
| value | string | Variable references $(VAR_NAME) are expanded using the previous defined environment variables in the container and any service environment variables. If a variable cannot be resolved, the reference in the input string will be unchanged. The $(VAR_NAME) syntax can be escaped with a double $$, ie: $$(VAR_NAME). Escaped references will never be expanded, regardless of whether the variable exists or not. Defaults to "". |
68
-
| valueFrom |[Env Var Source](#env-var-source)| Source for the environment variable's value. Cannot be used if value is not empty. |
69
-
70
46
### Container
71
47
72
48
A single application container that you want to run within a pod.
@@ -95,6 +71,30 @@ A single application container that you want to run within a pod.
95
71
| volumeMounts | array of [Volume Mount](#volume-mount)| Pod volumes to mount into the container's filesystem. Cannot be updated. |
96
72
| workingDir | string | Container's working directory. If not specified, the container runtime's default will be used, which might be configured in the container image. Cannot be updated. |
97
73
74
+
### Security Context
75
+
76
+
SecurityContext holds security configuration that will be applied to a container. Some fields are present in both SecurityContext and PodSecurityContext. When both are set, the values in SecurityContext take precedence.
77
+
78
+
| Name | Type | Description |
79
+
| --- | --- | --- |
80
+
| allowPrivilegeEscalation | boolean | AllowPrivilegeEscalation controls whether a process can gain more privileges than its parent process. This bool directly controls if the no_new_privs flag will be set on the container process. AllowPrivilegeEscalation is true always when the container is: 1) run as Privileged 2) has CAP_SYS_ADMIN |
81
+
| capabilities |[Capabilities](#capabilities)| The capabilities to add/drop when running containers. Defaults to the default set of capabilities granted by the container runtime. |
82
+
| privileged | boolean | Run container in privileged mode. Processes in privileged containers are essentially equivalent to root on the host. Defaults to false. |
83
+
| readOnlyRootFilesystem | boolean | Whether this container has a read-only root filesystem. Default is false. |
84
+
| runAsNonRoot | boolean | Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. |
85
+
| runAsUser | integer | The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. |
86
+
| seLinuxOptions |[SE Linux Options](#se-linux-options)| The SELinux context to be applied to the container. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. |
87
+
88
+
### Env Var
89
+
90
+
EnvVar represents an environment variable present in a Container.
91
+
92
+
| Name | Type | Description |
93
+
| --- | --- | --- |
94
+
| name | string | Name of the environment variable. Must be a C_IDENTIFIER. |
95
+
| value | string | Variable references $(VAR_NAME) are expanded using the previous defined environment variables in the container and any service environment variables. If a variable cannot be resolved, the reference in the input string will be unchanged. The $(VAR_NAME) syntax can be escaped with a double $$, ie: $$(VAR_NAME). Escaped references will never be expanded, regardless of whether the variable exists or not. Defaults to "". |
96
+
| valueFrom |[Env Var Source](#env-var-source)| Source for the environment variable's value. Cannot be used if value is not empty. |
97
+
98
98
### Pod Security Context
99
99
100
100
PodSecurityContext holds pod-level security attributes and common container settings. Some fields are also present in container.securityContext. Field values of container.securityContext take precedence over field values of PodSecurityContext.
@@ -178,62 +178,62 @@ Volume represents a named volume in a pod that may be accessed by any container
0 commit comments