Skip to content

why use annotation? kubearmor-policy: enabled #282

Answered by nam-jaehyun
nyrahul asked this question in Q&A
Discussion options

You must be logged in to vote

By default, KubeArmor enforces security policies into pods (no need for "kubearmor-policy: enabled").

Then, why is "kubearmor-policy: enabled" defined in the annotations?
This is for the case that "enableEnforcerPerPod" is set.

If "enableEnforcerPerPod" is set, KubeArmor works as the audit mode by default.
It means that "kubearmor-policy: audited" is automatically added for all pods.

However, if a pod has the "kubearmor-policy: enabled" annotation,
KubeArmor specifically enforces security policies into the pod.

In conclusion, "kubearmor-policy: {enabled | audited | disabled}" provides an operator more flexibility.
In particular, this can be used for testing KubeArmor before the actual dep…

Replies: 1 comment

Comment options

You must be logged in to vote
0 replies
Answer selected by nyrahul
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants