Changes

Openshift basics

1,147 bytes added, 16:09, 6 August 2019
Router
name: router
</pre>
 
<br>
 
 
==SecurityContextConstraints==
 
<source lang="C++">
# kubectl get SecurityContextConstraints anyuid -n default -o yaml
allowHostDirVolumePlugin: false
allowHostIPC: false
allowHostNetwork: false
allowHostPID: false
allowHostPorts: false
allowPrivilegeEscalation: true
allowPrivilegedContainer: false
allowedCapabilities: null
apiVersion: security.openshift.io/v1
defaultAddCapabilities: null
fsGroup:
type: RunAsAny
groups:
- system:cluster-admins
kind: SecurityContextConstraints
metadata:
annotations:
kubernetes.io/description: anyuid provides all features of the restricted SCC
but allows users to run with any UID and any GID.
creationTimestamp: "2019-07-05T14:25:44Z"
name: anyuid
resourceVersion: "641"
selfLink: /apis/security.openshift.io/v1/securitycontextconstraints/anyuid
uid: c6610551-9f30-11e9-ba85-525400efb4ec
priority: 10
readOnlyRootFilesystem: false
requiredDropCapabilities:
- MKNOD
runAsUser:
type: RunAsAny
seLinuxContext:
type: MustRunAs
supplementalGroups:
type: RunAsAny
users: []
volumes:
- configMap
- downwardAPI
- emptyDir
- persistentVolumeClaim
- projected
- secret
</source>
 
<br>