Skip to content
This repository has been archived by the owner on Jan 11, 2023. It is now read-only.

Setup a default allow-all Pod Security Policy in Kubernetes API server #2123

Closed
JunSun17 opened this issue Jan 23, 2018 · 1 comment
Closed
Labels

Comments

@JunSun17
Copy link
Collaborator

Is this a request for help?: No

Is this an ISSUE or FEATURE REQUEST? (choose one): Feature

Orchestrator and version (e.g. Kubernetes, DC/OS, Swarm): Kubernetes

What you expected to happen: For security concerns and auditing requirement, we should setup a Pod Security Policy for Kubernetes API server, and users should be able to modify it to apply their customization.

@stale
Copy link

stale bot commented Mar 9, 2019

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contribution. Note that acs-engine is deprecated--see https://github.com/Azure/aks-engine instead.

@stale stale bot added the stale label Mar 9, 2019
@stale stale bot closed this as completed Mar 16, 2019
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Projects
None yet
Development

No branches or pull requests

1 participant