Skip to content

Security Context

  • .Values.securityContext
securityContext:
container:
PUID: 568
UMASK: "002"
runAsNonRoot: true
runAsUser: 568
runAsGroup: 568
readOnlyRootFilesystem: true
allowPrivilegeEscalation: false
privileged: false
seccompProfile:
type: RuntimeDefault
capabilities:
add: []
drop:
- ALL
pod:
fsGroup: 568
fsGroupChangePolicy: OnRootMismatch
supplementalGroups: []
sysctls: []

Defines the security context for the container. Can be overridden at container level.

See Container Security Context

Default

securityContext:
container:
PUID: 568
UMASK: "002"
runAsNonRoot: true
runAsUser: 568
runAsGroup: 568
readOnlyRootFilesystem: true
allowPrivilegeEscalation: false
privileged: false
seccompProfile:
type: RuntimeDefault
capabilities:
add: []
drop:
- ALL

See Container Fixed Env PUID

Default

securityContext:
container:
PUID: 568

See Container Fixed Env UMASK

Default

securityContext:
container:
UMASK: "002"

See Container Run As Non Root

Default

securityContext:
container:
runAsNonRoot: true

See Container Run As User

Default

securityContext:
container:
runAsUser: 568

See Container Run As Group

Default

securityContext:
container:
runAsGroup: 568

securityContext.container.readOnlyRootFilesystem

Section titled “securityContext.container.readOnlyRootFilesystem”

See Container Read Only Root Filesystem

Default

securityContext:
container:
readOnlyRootFilesystem: true

securityContext.container.allowPrivilegeEscalation

Section titled “securityContext.container.allowPrivilegeEscalation”

See Container Allow Privilege Escalation

Default

securityContext:
container:
allowPrivilegeEscalation: false

See Container Privileged

Default

securityContext:
container:
privileged: false

See Container Seccomp Profile

Default

securityContext:
container:
seccompProfile:
type: RuntimeDefault

securityContext.container.seccompProfile.type

Section titled “securityContext.container.seccompProfile.type”

See Container Seccomp Profile Type

Default

securityContext:
container:
seccompProfile:
type: RuntimeDefault

securityContext.container.seccompProfile.profile

Section titled “securityContext.container.seccompProfile.profile”

See Container Seccomp Profile Profile

Default

securityContext:
container:
seccompProfile:
profile: ""

See Container Capabilities

Default

securityContext:
container:
capabilities:
add: []
drop:
- ALL

securityContext.container.capabilities.add

Section titled “securityContext.container.capabilities.add”

See Container Capabilities Add

Default

securityContext:
container:
capabilities:
add: []

securityContext.container.capabilities.drop

Section titled “securityContext.container.capabilities.drop”

See Container Capabilities Drop

Default

securityContext:
container:
capabilities:
drop:
- ALL

Defines the security context for the pod. Can be overridden at pod level.

See Pod Security Context

Default

securityContext:
pod:
fsGroup: 568
fsGroupChangePolicy: OnRootMismatch
supplementalGroups: []
sysctls: []

See Pod FS Group

Default

securityContext:
pod:
fsGroup: 568

See Pod FS Group Change Policy

Default

securityContext:
pod:
fsGroupChangePolicy: OnRootMismatch

See Pod Supplemental Groups

Default

securityContext:
pod:
supplementalGroups: []

See Pod Sysctls

Default

securityContext:
pod:
sysctls: []

securityContext:
container:
PUID: 568
UMASK: "002"
runAsNonRoot: true
runAsUser: 568
runAsGroup: 568
readOnlyRootFilesystem: true
allowPrivilegeEscalation: false
privileged: false
seccompProfile:
type: RuntimeDefault
capabilities:
add:
- SYS_ADMIN
- SYS_PTRACE
drop:
- ALL
pod:
fsGroup: 568
fsGroupChangePolicy: OnRootMismatch
supplementalGroups:
- 568
- 1000
sysctls:
- name: net.ipv4.ip_unprivileged_port_start
value: "0"