New validation option --rule-security-readonly-rootfs-required
In case you want to check readOnlyRootFilesystem
property globally but also allow some containers requiring writable root filesystem, they can be whitelisted by using annotations.
In order to do that you need to:
- Allow whitelisting of containers for this option by
--rule-security-readonly-rootfs-required-whitelist-enabled
option - Provide annotation
admission.validation.avast.com/readonly-rootfs-containers-whitelist
at Pod level (prefix can be changed by--annotations-prefix
option)
On-demand outside of cluster scan
This tool provides also function to scan cluster (based on current context from ~/.kube/config
) for objects that are violating given rules.
Usage:
- Create binary via
make build-binary
- Run
./k8s-admission-webhook scanner [options]