This repository has been archived by the owner on Mar 12, 2024. It is now read-only.
KICS #194
Annotations
10 warnings
[MEDIUM] CPU Limits Not Set:
charts/daps-server/templates/deployment.yaml#L1
CPU limits should be set because if the system has CPU time free, a container is guaranteed to be allocated as much CPU as it requests
|
[MEDIUM] CPU Requests Not Set:
charts/daps-server/templates/deployment.yaml#L1
CPU requests should be set to ensure the sum of the resource requests of the scheduled Containers is less than the capacity of the node
|
[MEDIUM] Container Running With Low UID:
charts/daps-server/templates/deployment.yaml#L23
Check if containers are running with low UID, which might cause conflicts with the host's user table.
|
[MEDIUM] Memory Limits Not Defined:
charts/daps-server/templates/deployment.yaml#L1
Memory limits should be defined for each container. This prevents potential resource exhaustion by ensuring that containers consume not more than the designated amount of memory
|
[MEDIUM] Memory Requests Not Defined:
charts/daps-server/templates/deployment.yaml#L1
Memory requests should be defined for each container. This allows the kubelet to reserve the requested amount of system resources and prevents over-provisioning on individual nodes
|
[MEDIUM] NET_RAW Capabilities Not Being Dropped:
charts/daps-server/templates/deployment.yaml#L1
Containers should drop 'ALL' or at least 'NET_RAW' capabilities
|
[MEDIUM] NET_RAW Capabilities Not Being Dropped:
charts/daps-server/templates/deployment.yaml#L1
Containers should drop 'ALL' or at least 'NET_RAW' capabilities
|
[MEDIUM] Readiness Probe Is Not Configured:
charts/daps-server/templates/deployment.yaml#L1
Check if Readiness Probe is not configured.
|
[MEDIUM] Seccomp Profile Is Not Configured:
charts/daps-server/templates/deployment.yaml#L1
Containers should be configured with a secure Seccomp profile to restrict potentially dangerous syscalls
|
[MEDIUM] Seccomp Profile Is Not Configured:
charts/daps-server/templates/deployment.yaml#L1
Containers should be configured with a secure Seccomp profile to restrict potentially dangerous syscalls
|