Update Pod Security Admission Controller for k8s 1.24

Update k8s version.
Remove technology preview.
Fixed typos.

Story: 2010301
Task: 46748

Signed-off-by: Elisamara Aoki Goncalves <elisamaraaoki.goncalves@windriver.com>
Change-Id: If7fcb253090975576994a7923b5c7500a184bbb0
This commit is contained in:
Elisamara Aoki Goncalves 2022-11-02 16:07:38 -03:00
parent a4597d3998
commit a8ca207890

View File

@ -1,12 +1,12 @@
.. _pod-security-admission-controller-8e9e6994100f: .. _pod-security-admission-controller-8e9e6994100f:
====================================================== =================================
Technology Preview - Pod Security Admission Controller Pod Security Admission Controller
====================================================== =================================
Pod Security Admission (PSA) Controller is the |PSP| replacement, and this Pod Security Admission (PSA) Controller is the |PSP| replacement, and this
document describes the technical preview of |PSA| functionality which is 'beta' document describes the |PSA| functionality, which is 'beta' quality in
quality in K8S v1.23 . Kubernetes v1.24 .
The |PSA| admission controller acts on creation and modification of the pod and The |PSA| admission controller acts on creation and modification of the pod and
determines if it should be admitted based on the requested security context and determines if it should be admitted based on the requested security context and
@ -54,7 +54,7 @@ enforce
audit audit
Policy violations will trigger the addition of an audit annotation to the Policy violations will trigger the addition of an audit annotation to the
event recorded in the K8S audit log but are otherwise allowed. event recorded in the Kubernetes audit log but are otherwise allowed.
warn warn
Policy violations will trigger a user-facing warning but are otherwise Policy violations will trigger a user-facing warning but are otherwise
@ -73,7 +73,7 @@ This is a generic namespace configuration using labels.
pod-security.kubernetes.io/<MODE>: <LEVEL> pod-security.kubernetes.io/<MODE>: <LEVEL>
# Optional: per-mode version label can be used to pin the policy to the # Optional: per-mode version label can be used to pin the policy to the
# version that shipped with a given Kubernetes minor version (e.g. v1.23). # version that shipped with a given Kubernetes minor version (e.g. v1.24).
# #
# MODE must be one of `enforce`, `audit`, or `warn`. # MODE must be one of `enforce`, `audit`, or `warn`.
# VERSION must be a valid Kubernetes minor version, or `latest`. # VERSION must be a valid Kubernetes minor version, or `latest`.
@ -89,7 +89,7 @@ Enable Pod Security Admission
To enable |PSA|, Pod Security feature gate must be enabled. To enable |PSA|, Pod Security feature gate must be enabled.
Starting with Kubernetes 1.23 version, PodSecurity feature gate is enabled by Starting with Kubernetes 1.24 version, Pod Security feature gate is enabled by
default. default.
For Kubernetes version 1.22, Pod Security feature gate can be enabled using For Kubernetes version 1.22, Pod Security feature gate can be enabled using
@ -111,8 +111,8 @@ configuration, ``apiserver_extra_args`` and ``apiserver_extra_volumes``.
Configure defaults for the Pod Security Admission Controller Configure defaults for the Pod Security Admission Controller
------------------------------------------------------------ ------------------------------------------------------------
For the technology preview of the |PSA| controller, the |PSA| controller can be The |PSA| controller can be configured with default security polices and
configured with default security polices and exemptions at bootstrap time. exemptions at bootstrap time.
The Default |PSA| controller configuration will apply to namespaces that are The Default |PSA| controller configuration will apply to namespaces that are
not configured with the ``pod-security.kubernetes.io`` labels to specify a not configured with the ``pod-security.kubernetes.io`` labels to specify a
@ -224,11 +224,11 @@ This page walks through a usage example of |PSA| where you will:
name: baseline-ns name: baseline-ns
labels: labels:
pod-security.kubernetes.io/enforce: baseline pod-security.kubernetes.io/enforce: baseline
pod-security.kubernetes.io/enforce-version: v1.23 pod-security.kubernetes.io/enforce-version: v1.24
pod-security.kubernetes.io/warn: baseline pod-security.kubernetes.io/warn: baseline
pod-security.kubernetes.io/warn-version: v1.23 pod-security.kubernetes.io/warn-version: v1.24
pod-security.kubernetes.io/audit: baseline pod-security.kubernetes.io/audit: baseline
pod-security.kubernetes.io/audit-version: v1.23 pod-security.kubernetes.io/audit-version: v1.24
controller-0:~$ kubectl apply -f baseline-ns.yaml controller-0:~$ kubectl apply -f baseline-ns.yaml
@ -239,11 +239,11 @@ This page walks through a usage example of |PSA| where you will:
name: privileged-ns name: privileged-ns
labels: labels:
pod-security.kubernetes.io/enforce: privileged pod-security.kubernetes.io/enforce: privileged
pod-security.kubernetes.io/enforce-version: v1.23 pod-security.kubernetes.io/enforce-version: v1.24
pod-security.kubernetes.io/warn: privileged pod-security.kubernetes.io/warn: privileged
pod-security.kubernetes.io/warn-version: v1.23 pod-security.kubernetes.io/warn-version: v1.24
pod-security.kubernetes.io/audit: privileged pod-security.kubernetes.io/audit: privileged
pod-security.kubernetes.io/audit-version: v1.23 pod-security.kubernetes.io/audit-version: v1.24
controller-0:~$ kubectl apply -f privileged-ns.yaml controller-0:~$ kubectl apply -f privileged-ns.yaml
@ -254,11 +254,11 @@ This page walks through a usage example of |PSA| where you will:
name: restricted-ns name: restricted-ns
labels: labels:
pod-security.kubernetes.io/enforce: restricted pod-security.kubernetes.io/enforce: restricted
pod-security.kubernetes.io/enforce-version: v1.23 pod-security.kubernetes.io/enforce-version: v1.24
pod-security.kubernetes.io/warn: restricted pod-security.kubernetes.io/warn: restricted
pod-security.kubernetes.io/warn-version: v1.23 pod-security.kubernetes.io/warn-version: v1.24
pod-security.kubernetes.io/audit: restricted pod-security.kubernetes.io/audit: restricted
pod-security.kubernetes.io/audit-version: v1.23 pod-security.kubernetes.io/audit-version: v1.24
controller-0:~$ kubectl apply -f restricted-ns.yaml controller-0:~$ kubectl apply -f restricted-ns.yaml