Policy validates pods sharing processes PID namespace
-
Updated
May 31, 2024 - Rust
Policy validates pods sharing processes PID namespace
A Chimera Policy written in Rust that ensures only trusted users can create workloads tolerating a chosen taint
A Kubernetes dynamic admission controller that uses WebAssembly policies to validate incoming requests
Policy that validates and adjusts the usage of StorageClasses in PersistentVolumeClaims
Policy validates that there are no services with the same set of selectors
Demo policy showing how to write a raw validating policy
A test policy that simulates long running policy evaluations
A Kubewarden policy to check liveness and readiness probes
A Kubewarden policy to disallow usage of the default namespace
Replacement for the Kubernetes Pod Security Policy that controls the usage of host namespaces
Replacement for the Kubernetes Pod Security Policy that controls the usage of SELinux
A demo policy showing how to access Kubernetes resources at policy evaluation time
Replacement for the Kubernetes Pod Security Policy that controls the allowed `flexVolume` drivers
A Kubewarden Policy that echoes Kubernetes' AdmissionReview objects
Kubewarden policy that ensures that namespaces have the required PSA labels
A Kubewarden Policy that controls the usage of `volumeMounts`
A Kubewarden policy that enforces root filesystem to be readonly
A Kubewarden Policy that controls the usage of environment variables
A Kubewarden Policy that controls the usage of Pod runtimeClass
A Kubewarden Pod Security Policy that controls usage of Seccomp profiles
Add a description, image, and links to the policy-as-code topic page so that developers can more easily learn about it.
To associate your repository with the policy-as-code topic, visit your repo's landing page and select "manage topics."