A Kubewarden Policy that detects usage of deprecated and dropped Kubernetes resources
-
Updated
Nov 12, 2024 - Rust
A Kubewarden Policy that detects usage of deprecated and dropped Kubernetes resources
A Kubewarden Policy that verifies all the signatures of the container images referenced by a Pod
A Kubewarden Policy that limits the ability to create privileged containers
This Kubewarden Policy is a replacement for the Kubernetes Pod Security Policy that controls containers user and groups
Replacement for the Kubernetes Pod Security Policy that controls the usage of /proc mount types
A Kubewarden Pod Security Policy that controls usage of allowPrivilegeEscalation
A Kubewarden Pod Security Policy that controls usage of AppArmor profiles
A Kubewarden policy that restricts what registries, tags and images can pods on your cluster refer to
A policy that can run CEL expressions
A Kubewarden Policy that detects secrets (ssh private keys, API tokens, etc) leaked via environment variables
A Pod Security Policy that controls Container Capabilities
Kubewarden policy that validates Kubernetes' resource labels
Kubewarden policy that validates Kubernetes' resource annotations
A Kubewarden Pod Security Policy that controls usage of Seccomp profiles
Policy to enforce requirements on Kubernetes Ingress resources.
Replacement for the Kubernetes Pod Security Policy that controls the usage of fsGroup in the pod security context
A Kubewarden Policy that controls the usage of Pod runtimeClass
Replacement for the Kubernetes Pod Security Policy that controls the usage of hostpaths
Replacement for the Kubernetes Pod Security Policy that controls the usage of volumes
A Kubewarden Policy that controls the usage of `volumeMounts`
Add a description, image, and links to the kubewarden-policy topic page so that developers can more easily learn about it.
To associate your repository with the kubewarden-policy topic, visit your repo's landing page and select "manage topics."