adamant-kite-43734
11/09/2023, 7:54 PMcreamy-pencil-82913
11/09/2023, 8:52 PMcreamy-pencil-82913
11/09/2023, 8:52 PMpolite-translator-35958
11/09/2023, 9:12 PMpolite-translator-35958
11/09/2023, 9:13 PMpolite-translator-35958
11/09/2023, 9:13 PMgray-lawyer-73831
11/09/2023, 9:24 PMpod-security-admission-config-file: /path/to/that/file
You can also do the piecemeal approach for namespaces one at a time. Note that rancher needs privileged access. Below is an example for cattle-system
but you’d need to do the same or similar for any of the relevant rancher namespaces
apiVersion: v1
kind: Namespace
metadata:
name: cattle-system
labels:
<http://pod-security.kubernetes.io/enforce|pod-security.kubernetes.io/enforce>: privileged
<http://pod-security.kubernetes.io/enforce-version|pod-security.kubernetes.io/enforce-version>: v1.25
<http://pod-security.kubernetes.io/audit|pod-security.kubernetes.io/audit>: privileged
<http://pod-security.kubernetes.io/audit-version|pod-security.kubernetes.io/audit-version>: v1.25
<http://pod-security.kubernetes.io/warn|pod-security.kubernetes.io/warn>: privileged
<http://pod-security.kubernetes.io/warn-version|pod-security.kubernetes.io/warn-version>: v1.25
polite-translator-35958
11/09/2023, 9:29 PM