A Kubewarden Policy that detects usage of deprecated and dropped Kubernetes resources
-
Updated
Nov 26, 2024 - Rust
A Kubewarden Policy that detects usage of deprecated and dropped Kubernetes resources
A Kubewarden Policy that verifies all the signatures of the container images referenced by a Pod
A Kubewarden Policy that limits the ability to create privileged containers
Replacement for the Kubernetes Pod Security Policy that controls the usage of /proc mount types
This Kubewarden Policy is a replacement for the Kubernetes Pod Security Policy that controls containers user and groups
A Kubewarden Pod Security Policy that controls usage of allowPrivilegeEscalation
A Kubewarden policy that restricts what registries, tags and images can pods on your cluster refer to
A Kubewarden Pod Security Policy that controls usage of AppArmor profiles
A policy that can run CEL expressions
A Kubewarden Policy that detects secrets (ssh private keys, API tokens, etc) leaked via environment variables
Kubewarden policy that validates Kubernetes' resource labels
A Pod Security Policy that controls Container Capabilities
Kubewarden policy that validates Kubernetes' resource annotations
A Kubewarden Pod Security Policy that controls usage of Seccomp profiles
Replacement for the Kubernetes Pod Security Policy that controls the usage of fsGroup in the pod security context
Policy to enforce requirements on Kubernetes Ingress resources.
A Kubewarden Policy that controls the usage of Pod runtimeClass
Replacement for the Kubernetes Pod Security Policy that controls the usage of hostpaths
Replacement for the Kubernetes Pod Security Policy that controls the usage of volumes
A Kubewarden policy that enforces root filesystem to be readonly
Add a description, image, and links to the kubewarden-policy topic page so that developers can more easily learn about it.
To associate your repository with the kubewarden-policy topic, visit your repo's landing page and select "manage topics."