apiVersion: policy/v1beta1
kind: PodSecurityPolicy
metadata:
annotations:
kubectl.kubernetes.io/last-applied-configuration: '{"apiVersion":"policy/v1beta1","kind":"PodSecurityPolicy","metadata":{"annotations":{},"labels":{"app":"metallb","app.kubernetes.io/instance":"cluster-others-manager"},"name":"speaker"},"spec":{"allowPrivilegeEscalation":false,"allowedCapabilities":["NET_RAW"],"allowedHostPaths":[],"defaultAddCapabilities":[],"defaultAllowPrivilegeEscalation":false,"fsGroup":{"rule":"RunAsAny"},"hostIPC":false,"hostNetwork":true,"hostPID":false,"hostPorts":[{"max":7472,"min":7472},{"max":7946,"min":7946}],"privileged":true,"readOnlyRootFilesystem":true,"requiredDropCapabilities":["ALL"],"runAsUser":{"rule":"RunAsAny"},"seLinux":{"rule":"RunAsAny"},"supplementalGroups":{"rule":"RunAsAny"},"volumes":["configMap","secret","emptyDir"]}}
'
creationTimestamp: '2021-08-30T18:58:44Z'
labels:
app: metallb
app.kubernetes.io/instance: cluster-others-manager
managedFields:
- apiVersion: policy/v1beta1
fieldsType: FieldsV1
fieldsV1:
f:metadata:
f:annotations:
.: {}
f:kubectl.kubernetes.io/last-applied-configuration: {}
f:labels:
.: {}
f:app: {}
f:spec:
f:allowPrivilegeEscalation: {}
f:allowedCapabilities: {}
f:defaultAllowPrivilegeEscalation: {}
f:fsGroup:
f:rule: {}
f:hostNetwork: {}
f:hostPorts: {}
f:privileged: {}
f:readOnlyRootFilesystem: {}
f:requiredDropCapabilities: {}
f:runAsUser:
f:rule: {}
f:seLinux:
f:rule: {}
f:supplementalGroups:
f:rule: {}
f:volumes: {}
manager: kubectl-client-side-apply
operation: Update
time: '2021-08-30T18:58:44Z'
- apiVersion: policy/v1beta1
fieldsType: FieldsV1
fieldsV1:
f:metadata:
f:annotations:
f:kubectl.kubernetes.io/last-applied-configuration: {}
f:labels:
f:app.kubernetes.io/instance: {}
manager: argocd-application-controller
operation: Update
time: '2021-08-30T20:11:51Z'
name: speaker
resourceVersion: '139773'
uid: d3b3dd4a-c8dd-4215-8a4e-3754e4924bb0
spec:
allowPrivilegeEscalation: false
allowedCapabilities:
- NET_RAW
defaultAllowPrivilegeEscalation: false
fsGroup:
rule: RunAsAny
hostNetwork: true
hostPorts:
- max: 7472
min: 7472
- max: 7946
min: 7946
privileged: true
readOnlyRootFilesystem: true
requiredDropCapabilities:
- ALL
runAsUser:
rule: RunAsAny
seLinux:
rule: RunAsAny
supplementalGroups:
rule: RunAsAny
volumes:
- configMap
- secret
- emptyDir