Skip to content
This repository has been archived by the owner on Oct 21, 2022. It is now read-only.

Latest commit

 

History

History
40 lines (35 loc) · 1.42 KB

overview.md

File metadata and controls

40 lines (35 loc) · 1.42 KB

Overview of Features provided by Karydia

Invert the Pod Defaults

The following screenshot shows the pod specification without the usage of Karydia:

  • Service accout token is mounted
  • A user is not specified (so the pod uses root by default)
  • No seccomp profile is assigned
kubectl run -it --rm --restart=Never alpine --image=alpine sh -n demo
kubectl edit  pod/alpine -n demo

If you create a pod after the installation of Karydia, the pod description is different, even if you use the same commands:

  • No service account token is mounted
  • A user is specified (the root user is not used)
  • Privilege escalation is denied
  • The seccomp profile runtime/default is assigned
kubectl run -it --rm --restart=Never alpine --image=alpine sh -n demo
kubectl edit  pod/alpine -n demo

Add a Network Policy

Karydia adds one or multiple default network policies to each namespace and reconciles it.

kubectl get networkpolicy -n demo

Features and Configuration Options

You can configure each feature to meet the needs of your applications:

  • A custom seccomp profile
  • One or multiple default network policies
  • A specific network policy per namespace
  • The usage of a root user if necessary
  • The privilege escalation container option

See all features and options.