apiVersion: policy/v1beta1 kind: PodSecurityPolicy metadata: annotations: seccomp.security.alpha.kubernetes.io/allowedProfileNames: runtime/default seccomp.security.alpha.kubernetes.io/defaultProfileName: runtime/default name: traefik-ingress-controller spec: requiredDropCapabilities: - ALL allowedCapabilities: - NET_BIND_SERVICE privileged: false allowPrivilegeEscalation: false # Allow core volume types. volumes: - configMap - downwardAPI - secret - emptyDir - projected # - persistentVolumeClaim hostNetwork: false hostIPC: false hostPID: false runAsUser: # Require the container to run without root privileges. rule: 'MustRunAsNonRoot' supplementalGroups: rule: 'MustRunAs' ranges: # Forbid adding the root group. - min: 1 max: 65535 fsGroup: rule: 'MustRunAs' ranges: # Forbid adding the root group. - min: 1 max: 65535 hostPorts: readOnlyRootFilesystem: true seLinux: rule: 'RunAsAny' hostPorts: - max: 65535 min: 1 #allowedUnsafeSysctls: # - kernel.net.ipv4.ip_unprivileged_port_start