You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -22,9 +22,9 @@ KubeLinter includes the following built-in checks:
22
22
23
23
**Enabled by default**: No
24
24
25
-
**Description**: Alert on pods that use the default service account
25
+
**Description**: Indicates when pods use the default service account.
26
26
27
-
**Remediation**: Create a dedicated service account for your pod. See https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/ for more details.
27
+
**Remediation**: Create a dedicated service account for your pod. Refer to https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/ for details.
@@ -54,9 +54,9 @@ KubeLinter includes the following built-in checks:
54
54
55
55
**Enabled by default**: Yes
56
56
57
-
**Description**: Alert on containers not dropping NET_RAW capability
57
+
**Description**: Indicates when containers do not drop NET_RAW capability
58
58
59
-
**Remediation**: NET_RAW grants an application within the container the ability to craft raw packets, use raw sockets, and it also allows an application to bind to any address. Please specify to drop this capability in the containers under containers security contexts.
59
+
**Remediation**: NET_RAW makes it so that an application within the container is able to craft raw packets, use raw sockets, and bind to any address. Remove this capability in the containers under containers security contexts.
@@ -70,9 +70,9 @@ KubeLinter includes the following built-in checks:
70
70
71
71
**Enabled by default**: Yes
72
72
73
-
**Description**: Alert on objects using a secret in an environment variable
73
+
**Description**: Indicates when objects use a secret in an environment variable.
74
74
75
-
**Remediation**: Don't use raw secrets in an environment variable. Instead, either mount the secret as a file or use a secretKeyRef. See https://kubernetes.io/docs/concepts/configuration/secret/#using-secrets for more details.
75
+
**Remediation**: Do not use raw secrets in environment variables. Instead, either mount the secret as a file or use a secretKeyRef. Refer to https://kubernetes.io/docs/concepts/configuration/secret/#using-secrets for details.
@@ -102,9 +102,9 @@ KubeLinter includes the following built-in checks:
102
102
103
103
**Enabled by default**: Yes
104
104
105
-
**Description**: Alert on deployments with multiple replicas that don't specify interpod anti-affinity to ensure that the orchestrator attempts to schedule replicas on different nodes
105
+
**Description**: Indicates when deployments with multiple replicas fail to specify inter-pod anti-affinity, to ensure that the orchestrator attempts to schedule replicas on different nodes.
106
106
107
-
**Remediation**: Specify anti-affinity in your pod spec to ensure that the orchestrator attempts to schedule replicas on different nodes. You can do this by using podAntiAffinity, specifying a labelSelector that matches pods of this deployment, and setting the topologyKey to kubernetes.io/hostname. See https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity for more details.
107
+
**Remediation**: Specify anti-affinity in your pod specification to ensure that the orchestrator attempts to schedule replicas on different nodes. Using podAntiAffinity, specify a labelSelector that matches pods for the deployment, and set the topologyKey to kubernetes.io/hostname. Refer to https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity for details.
@@ -118,9 +118,9 @@ KubeLinter includes the following built-in checks:
118
118
119
119
**Enabled by default**: Yes
120
120
121
-
**Description**: Alert on objects using deprecated API versions under extensionsv1beta
121
+
**Description**: Indicates when objects use deprecated API versions under extensions/v1beta.
122
122
123
-
**Remediation**: Migrate to using the apps/v1 API versions for these objects. See https://kubernetes.io/blog/2019/07/18/api-deprecations-in-1-16/ for more details.
123
+
**Remediation**: Migrate using the apps/v1 API versions for the objects. Refer to https://kubernetes.io/blog/2019/07/18/api-deprecations-in-1-16/ for details.
@@ -134,9 +134,9 @@ KubeLinter includes the following built-in checks:
134
134
135
135
**Enabled by default**: No
136
136
137
-
**Description**: Alert on containers which don't specify a liveness probe
137
+
**Description**: Indicates when containers fail to specify a liveness probe.
138
138
139
-
**Remediation**: Specify a liveness probe in your container. See https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/ for more details.
139
+
**Remediation**: Specify a liveness probe in your container. Refer to https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/ for details.
@@ -166,9 +166,9 @@ KubeLinter includes the following built-in checks:
166
166
167
167
**Enabled by default**: No
168
168
169
-
**Description**: Alert on containers which don't specify a readiness probe
169
+
**Description**: Indicates when containers fail to specify a readiness probe.
170
170
171
-
**Remediation**: Specify a readiness probe in your container. See https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/ for more details.
171
+
**Remediation**: Specify a readiness probe in your container. Refer to https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/ for details.
@@ -246,9 +246,9 @@ KubeLinter includes the following built-in checks:
246
246
247
247
**Enabled by default**: Yes
248
248
249
-
**Description**: Alert on containers not set to runAsNonRoot
249
+
**Description**: Indicates when containers are not set to runAsNonRoot.
250
250
251
-
**Remediation**: Set runAsUser to a non-zero number, and runAsNonRoot to true, in your pod or container securityContext. See https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ for more details.
251
+
**Remediation**: Set runAsUser to a non-zero number and runAsNonRoot to true in your pod or container securityContext. Refer to https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ for details.
@@ -278,9 +278,9 @@ KubeLinter includes the following built-in checks:
278
278
279
279
**Enabled by default**: Yes
280
280
281
-
**Description**: Alert on containers without CPU requests and limits set
281
+
**Description**: Indicates when containers do not have CPU requests and limits set.
282
282
283
-
**Remediation**: Set your container's CPU requests and limits depending on its requirements. See https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/#requests-and-limits for more details.
283
+
**Remediation**: Set CPU requests and limits for your container based on its requirements. Refer to https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/#requests-and-limits for details.
@@ -294,9 +294,9 @@ KubeLinter includes the following built-in checks:
294
294
295
295
**Enabled by default**: Yes
296
296
297
-
**Description**: Alert on containers without memory requests and limits set
297
+
**Description**: Indicates when containers do not have memory requests and limits set.
298
298
299
-
**Remediation**: Set your container's memory requests and limits depending on its requirements. See https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/#requests-and-limits for more details.
299
+
**Remediation**: Set memory requests and limits for your container based on its requirements. Refer to https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/#requests-and-limits for details.
Copy file name to clipboardExpand all lines: pkg/builtinchecks/yamls/no-anti-affinity.yaml
+5-5Lines changed: 5 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,10 @@
1
1
name: "no-anti-affinity"
2
-
description: "Alert on deployments with multiple replicas that don't specify interpod anti-affinity to ensure that the orchestrator attempts to schedule replicas on different nodes"
2
+
description: "Indicates when deployments with multiple replicas fail to specify inter-pod anti-affinity, to ensure that the orchestrator attempts to schedule replicas on different nodes."
3
3
remediation: >-
4
-
Specify anti-affinity in your pod spec to ensure that the orchestrator attempts to schedule replicas on different nodes.
5
-
You can do this by using podAntiAffinity, specifying a labelSelector that matches pods of this deployment,
6
-
and setting the topologyKey to kubernetes.io/hostname.
7
-
See https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity for more details.
4
+
Specify anti-affinity in your pod specification to ensure that the orchestrator attempts to schedule replicas on different nodes.
5
+
Using podAntiAffinity, specify a labelSelector that matches pods for the deployment,
6
+
and set the topologyKey to kubernetes.io/hostname.
7
+
Refer to https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity for details.
0 commit comments