apiVersion: policy/v1beta1
kind: PodSecurityPolicy
metadata:
annotations:
kubectl.kubernetes.io/last-applied-configuration: '{"apiVersion":"policy/v1beta1","kind":"PodSecurityPolicy","metadata":{"annotations":{},"labels":{"app":"metallb","app.kubernetes.io/instance":"cluster-others-manager"},"name":"controller"},"spec":{"allowPrivilegeEscalation":false,"allowedCapabilities":[],"allowedHostPaths":[],"defaultAddCapabilities":[],"defaultAllowPrivilegeEscalation":false,"fsGroup":{"ranges":[{"max":65535,"min":1}],"rule":"MustRunAs"},"hostIPC":false,"hostNetwork":false,"hostPID":false,"privileged":false,"readOnlyRootFilesystem":true,"requiredDropCapabilities":["ALL"],"runAsUser":{"ranges":[{"max":65535,"min":1}],"rule":"MustRunAs"},"seLinux":{"rule":"RunAsAny"},"supplementalGroups":{"ranges":[{"max":65535,"min":1}],"rule":"MustRunAs"},"volumes":["configMap","secret","emptyDir"]}}
'
creationTimestamp: '2021-08-30T18:58:44Z'
labels:
app: metallb
app.kubernetes.io/instance: cluster-others-manager
managedFields:
- apiVersion: policy/v1beta1
fieldsType: FieldsV1
fieldsV1:
f:metadata:
f:annotations:
.: {}
f:kubectl.kubernetes.io/last-applied-configuration: {}
f:labels:
.: {}
f:app: {}
f:spec:
f:allowPrivilegeEscalation: {}
f:defaultAllowPrivilegeEscalation: {}
f:fsGroup:
f:ranges: {}
f:rule: {}
f:readOnlyRootFilesystem: {}
f:requiredDropCapabilities: {}
f:runAsUser:
f:ranges: {}
f:rule: {}
f:seLinux:
f:rule: {}
f:supplementalGroups:
f:ranges: {}
f:rule: {}
f:volumes: {}
manager: kubectl-client-side-apply
operation: Update
time: '2021-08-30T18:58:44Z'
- apiVersion: policy/v1beta1
fieldsType: FieldsV1
fieldsV1:
f:metadata:
f:annotations:
f:kubectl.kubernetes.io/last-applied-configuration: {}
f:labels:
f:app.kubernetes.io/instance: {}
manager: argocd-application-controller
operation: Update
time: '2021-08-30T20:11:51Z'
name: controller
resourceVersion: '139772'
uid: 83bbcefd-ce2a-4cc1-bb28-784f1ff99226
spec:
allowPrivilegeEscalation: false
defaultAllowPrivilegeEscalation: false
fsGroup:
ranges:
- max: 65535
min: 1
rule: MustRunAs
readOnlyRootFilesystem: true
requiredDropCapabilities:
- ALL
runAsUser:
ranges:
- max: 65535
min: 1
rule: MustRunAs
seLinux:
rule: RunAsAny
supplementalGroups:
ranges:
- max: 65535
min: 1
rule: MustRunAs
volumes:
- configMap
- secret
- emptyDir