-
Notifications
You must be signed in to change notification settings - Fork 10
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
feat: add Pod Security Standard reference
Signed-off-by: SdgJlbl <sarah.diot-girard@owkin.com>
- Loading branch information
Showing
2 changed files
with
22 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,21 @@ | ||
Kubernetes deployment reference | ||
=============================== | ||
|
||
For a step-by-step guide on how to deploy the application on Kubernetes, please refer to the | ||
`the deployment how-to <how-to/deploying-substra/index>`_. | ||
|
||
This section provides a reference of how various Kubernetes resources should look like once deployed with the default settings. | ||
Substra is distributed as Helm charts, and most values can be customized to accommodate the requirements of your environment. | ||
|
||
Pod Security Standards | ||
---------------------- | ||
|
||
All pods in a Substra deployment are compliant with the *baseline* policy of the | ||
`Pod Security Standards <https://kubernetes.io/docs/concepts/security/pod-security-standards>`_. | ||
|
||
All pods can run as non-root, with two exceptions: | ||
|
||
* If the builder feature is enabled (at least one backend per network must have the ability to build images), Kaniko pods used for building images run as root. | ||
* If the private CA feature is used, the initContainer `add-cert` runs as root. | ||
|
||
We are working on ensuring that all pods except the two listed above are compliant with the *restricted* policy. |