policy values.yaml📜
upstream.replicas📜
Type: int
3
upstream.revisionHistoryLimit📜
Type: int
10
upstream.auditInterval📜
Type: int
60
upstream.metricsBackends[0]📜
Type: string
"prometheus"
upstream.auditMatchKindOnly📜
Type: bool
true
upstream.constraintViolationsLimit📜
Type: int
1000
upstream.auditFromCache📜
Type: bool
false
upstream.disableMutation📜
Type: bool
true
upstream.disableAudit📜
Type: bool
false
upstream.disableValidatingWebhook📜
Type: bool
false
upstream.validatingWebhookName📜
Type: string
"gatekeeper-validating-webhook-configuration"
upstream.validatingWebhookTimeoutSeconds📜
Type: int
15
upstream.validatingWebhookFailurePolicy📜
Type: string
"Ignore"
upstream.validatingWebhookAnnotations📜
Type: object
{}
upstream.validatingWebhookExemptNamespacesLabels📜
Type: object
{}
upstream.validatingWebhookObjectSelector📜
Type: object
{}
upstream.validatingWebhookMatchConditions📜
Type: list
[]
upstream.validatingWebhookCheckIgnoreFailurePolicy📜
Type: string
"Fail"
upstream.validatingWebhookCustomRules📜
Type: object
{}
upstream.validatingWebhookSubResources[0]📜
Type: string
"pods/ephemeralcontainers"
upstream.validatingWebhookSubResources[1]📜
Type: string
"pods/exec"
upstream.validatingWebhookSubResources[2]📜
Type: string
"pods/log"
upstream.validatingWebhookSubResources[3]📜
Type: string
"pods/eviction"
upstream.validatingWebhookSubResources[4]📜
Type: string
"pods/portforward"
upstream.validatingWebhookSubResources[5]📜
Type: string
"pods/proxy"
upstream.validatingWebhookSubResources[6]📜
Type: string
"pods/attach"
upstream.validatingWebhookSubResources[7]📜
Type: string
"pods/binding"
upstream.validatingWebhookSubResources[8]📜
Type: string
"pods/resize"
upstream.validatingWebhookSubResources[9]📜
Type: string
"deployments/scale"
upstream.validatingWebhookSubResources[10]📜
Type: string
"replicasets/scale"
upstream.validatingWebhookSubResources[11]📜
Type: string
"statefulsets/scale"
upstream.validatingWebhookSubResources[12]📜
Type: string
"replicationcontrollers/scale"
upstream.validatingWebhookSubResources[13]📜
Type: string
"services/proxy"
upstream.validatingWebhookSubResources[14]📜
Type: string
"nodes/proxy"
upstream.validatingWebhookSubResources[15]📜
Type: string
"services/status"
upstream.validatingWebhookURL📜
Type: string
nil
upstream.validatingWebhookScope📜
Type: string
"*"
upstream.enableDeleteOperations📜
Type: bool
false
upstream.enableConnectOperations📜
Type: bool
false
upstream.enableExternalData📜
Type: bool
true
upstream.enableGeneratorResourceExpansion📜
Type: bool
true
upstream.enableTLSHealthcheck📜
Type: bool
false
upstream.maxServingThreads📜
Type: int
-1
upstream.mutatingWebhookName📜
Type: string
"gatekeeper-mutating-webhook-configuration"
upstream.mutatingWebhookFailurePolicy📜
Type: string
"Ignore"
upstream.mutatingWebhookReinvocationPolicy📜
Type: string
"Never"
upstream.mutatingWebhookAnnotations📜
Type: object
{}
upstream.mutatingWebhookExemptNamespacesLabels📜
Type: object
{}
upstream.mutatingWebhookObjectSelector📜
Type: object
{}
upstream.mutatingWebhookMatchConditions📜
Type: list
[]
upstream.mutatingWebhookTimeoutSeconds📜
Type: int
1
upstream.mutatingWebhookCustomRules📜
Type: object
{}
upstream.mutatingWebhookSubResources[0]📜
Type: string
"pods/ephemeralcontainers"
upstream.mutatingWebhookSubResources[1]📜
Type: string
"pods/exec"
upstream.mutatingWebhookSubResources[2]📜
Type: string
"pods/log"
upstream.mutatingWebhookSubResources[3]📜
Type: string
"pods/eviction"
upstream.mutatingWebhookSubResources[4]📜
Type: string
"pods/portforward"
upstream.mutatingWebhookSubResources[5]📜
Type: string
"pods/proxy"
upstream.mutatingWebhookSubResources[6]📜
Type: string
"pods/attach"
upstream.mutatingWebhookSubResources[7]📜
Type: string
"pods/binding"
upstream.mutatingWebhookSubResources[8]📜
Type: string
"deployments/scale"
upstream.mutatingWebhookSubResources[9]📜
Type: string
"replicasets/scale"
upstream.mutatingWebhookSubResources[10]📜
Type: string
"statefulsets/scale"
upstream.mutatingWebhookSubResources[11]📜
Type: string
"replicationcontrollers/scale"
upstream.mutatingWebhookSubResources[12]📜
Type: string
"services/proxy"
upstream.mutatingWebhookSubResources[13]📜
Type: string
"nodes/proxy"
upstream.mutatingWebhookSubResources[14]📜
Type: string
"services/status"
upstream.mutatingWebhookURL📜
Type: string
nil
upstream.mutatingWebhookScope📜
Type: string
"*"
upstream.mutationAnnotations📜
Type: bool
false
upstream.auditChunkSize📜
Type: int
500
upstream.logLevel📜
Type: string
"INFO"
upstream.logDenies📜
Type: bool
true
upstream.logMutations📜
Type: bool
true
upstream.emitAdmissionEvents📜
Type: bool
false
upstream.emitAuditEvents📜
Type: bool
false
upstream.admissionEventsInvolvedNamespace📜
Type: bool
false
upstream.auditEventsInvolvedNamespace📜
Type: bool
false
upstream.resourceQuota📜
Type: bool
true
upstream.externaldataProviderResponseCacheTTL📜
Type: string
"3m"
upstream.enableK8sNativeValidation📜
Type: bool
true
upstream.image.repository📜
Type: string
"registry1.dso.mil/ironbank/opensource/openpolicyagent/gatekeeper"
upstream.image.release📜
Type: string
"v3.21.0"
upstream.image.pullPolicy📜
Type: string
"IfNotPresent"
upstream.image.pullSecrets[0].name📜
Type: string
"private-registry"
upstream.image.crdRepository📜
Type: string
"registry1.dso.mil/ironbank/opensource/kubernetes/kubectl"
upstream.image.crdRelease📜
Type: string
"v1.33"
upstream.preInstall.crdRepository.image.repository📜
Type: string
"registry1.dso.mil/ironbank/opensource/kubernetes/kubectl"
upstream.preInstall.crdRepository.image.tag📜
Type: string
"v1.33"
upstream.preInstall.securityContext.allowPrivilegeEscalation📜
Type: bool
false
upstream.preInstall.securityContext.capabilities.drop[0]📜
Type: string
"ALL"
upstream.preInstall.securityContext.readOnlyRootFilesystem📜
Type: bool
true
upstream.preInstall.securityContext.runAsGroup📜
Type: int
999
upstream.preInstall.securityContext.runAsNonRoot📜
Type: bool
true
upstream.preInstall.securityContext.runAsUser📜
Type: int
1000
upstream.postUpgrade.labelNamespace.serviceAccount.name📜
Type: string
"gatekeeper-update-namespace-label-post-upgrade"
upstream.postUpgrade.labelNamespace.serviceAccount.create📜
Type: bool
false
upstream.postUpgrade.labelNamespace.enabled📜
Type: bool
false
upstream.postUpgrade.labelNamespace.image.repository📜
Type: string
"registry1.dso.mil/ironbank/opensource/kubernetes/kubectl"
upstream.postUpgrade.labelNamespace.image.tag📜
Type: string
"v1.33"
upstream.postUpgrade.labelNamespace.image.pullPolicy📜
Type: string
"IfNotPresent"
upstream.postUpgrade.labelNamespace.image.pullSecrets📜
Type: list
[]
upstream.postUpgrade.labelNamespace.extraNamespaces📜
Type: list
[]
upstream.postUpgrade.labelNamespace.podSecurity📜
Type: list
[]
upstream.postUpgrade.labelNamespace.extraAnnotations📜
Type: object
{}
upstream.postUpgrade.labelNamespace.priorityClassName📜
Type: string
""
upstream.postUpgrade.affinity📜
Type: object
{}
upstream.postUpgrade.tolerations📜
Type: list
[]
upstream.postUpgrade.nodeSelector.”kubernetes.io/os”📜
Type: string
"linux"
upstream.postUpgrade.resources📜
Type: object
{}
upstream.postUpgrade.securityContext.allowPrivilegeEscalation📜
Type: bool
false
upstream.postUpgrade.securityContext.capabilities.drop[0]📜
Type: string
"ALL"
upstream.postUpgrade.securityContext.readOnlyRootFilesystem📜
Type: bool
true
upstream.postUpgrade.securityContext.runAsGroup📜
Type: int
999
upstream.postUpgrade.securityContext.runAsNonRoot📜
Type: bool
true
upstream.postUpgrade.securityContext.runAsUser📜
Type: int
1000
upstream.postInstall.labelNamespace.serviceAccount.name📜
Type: string
"gatekeeper-update-namespace-label"
upstream.postInstall.labelNamespace.serviceAccount.create📜
Type: bool
false
upstream.postInstall.labelNamespace.enabled📜
Type: bool
false
upstream.postInstall.labelNamespace.extraRules📜
Type: list
[]
upstream.postInstall.labelNamespace.image.repository📜
Type: string
"registry1.dso.mil/ironbank/opensource/kubernetes/kubectl"
upstream.postInstall.labelNamespace.image.tag📜
Type: string
"v1.33"
upstream.postInstall.labelNamespace.image.pullPolicy📜
Type: string
"IfNotPresent"
upstream.postInstall.labelNamespace.image.pullSecrets📜
Type: list
[]
upstream.postInstall.labelNamespace.extraNamespaces📜
Type: list
[]
upstream.postInstall.labelNamespace.podSecurity📜
Type: list
[]
upstream.postInstall.labelNamespace.extraAnnotations📜
Type: object
{}
upstream.postInstall.labelNamespace.priorityClassName📜
Type: string
""
upstream.postInstall.probeWebhook.enabled📜
Type: bool
true
upstream.postInstall.probeWebhook.image.repository📜
Type: string
"registry1.dso.mil/ironbank/big-bang/base"
upstream.postInstall.probeWebhook.image.tag📜
Type: string
"2.1.0"
upstream.postInstall.probeWebhook.image.pullPolicy📜
Type: string
"IfNotPresent"
upstream.postInstall.probeWebhook.image.pullSecrets📜
Type: list
[]
upstream.postInstall.probeWebhook.waitTimeout📜
Type: int
60
upstream.postInstall.probeWebhook.httpTimeout📜
Type: int
2
upstream.postInstall.probeWebhook.insecureHTTPS📜
Type: bool
false
upstream.postInstall.probeWebhook.priorityClassName📜
Type: string
""
upstream.postInstall.affinity📜
Type: object
{}
upstream.postInstall.tolerations📜
Type: list
[]
upstream.postInstall.nodeSelector.”kubernetes.io/os”📜
Type: string
"linux"
upstream.postInstall.securityContext.allowPrivilegeEscalation📜
Type: bool
false
upstream.postInstall.securityContext.capabilities.drop[0]📜
Type: string
"ALL"
upstream.postInstall.securityContext.readOnlyRootFilesystem📜
Type: bool
true
upstream.postInstall.securityContext.runAsGroup📜
Type: int
999
upstream.postInstall.securityContext.runAsNonRoot📜
Type: bool
true
upstream.postInstall.securityContext.runAsUser📜
Type: int
1000
upstream.preUninstall.deleteWebhookConfigurations.serviceAccount.name📜
Type: string
"gatekeeper-delete-webhook-configs"
upstream.preUninstall.deleteWebhookConfigurations.serviceAccount.create📜
Type: bool
true
upstream.preUninstall.deleteWebhookConfigurations.extraRules📜
Type: list
[]
upstream.preUninstall.deleteWebhookConfigurations.enabled📜
Type: bool
false
upstream.preUninstall.deleteWebhookConfigurations.image.repository📜
Type: string
"registry1.dso.mil/ironbank/opensource/kubernetes/kubectl"
upstream.preUninstall.deleteWebhookConfigurations.image.tag📜
Type: string
"v1.33"
upstream.preUninstall.deleteWebhookConfigurations.image.pullPolicy📜
Type: string
"IfNotPresent"
upstream.preUninstall.deleteWebhookConfigurations.image.pullSecrets📜
Type: list
[]
upstream.preUninstall.deleteWebhookConfigurations.priorityClassName📜
Type: string
""
upstream.preUninstall.affinity📜
Type: object
{}
upstream.preUninstall.tolerations📜
Type: list
[]
upstream.preUninstall.nodeSelector.”kubernetes.io/os”📜
Type: string
"linux"
upstream.preUninstall.resources📜
Type: object
{}
upstream.preUninstall.securityContext.allowPrivilegeEscalation📜
Type: bool
false
upstream.preUninstall.securityContext.capabilities.drop[0]📜
Type: string
"ALL"
upstream.preUninstall.securityContext.readOnlyRootFilesystem📜
Type: bool
true
upstream.preUninstall.securityContext.runAsGroup📜
Type: int
999
upstream.preUninstall.securityContext.runAsNonRoot📜
Type: bool
true
upstream.preUninstall.securityContext.runAsUser📜
Type: int
1000
upstream.podAnnotations.”container.seccomp.security.alpha.kubernetes.io/manager”📜
Type: string
"runtime/default"
upstream.auditPodAnnotations📜
Type: object
{}
upstream.podLabels📜
Type: object
{}
upstream.podCountLimit📜
Type: string
"100"
upstream.secretAnnotations📜
Type: object
{}
upstream.enableRuntimeDefaultSeccompProfile📜
Type: bool
true
upstream.controllerManager.serviceAccount.name📜
Type: string
"gatekeeper-admin"
upstream.controllerManager.containerName📜
Type: string
"manager"
upstream.controllerManager.exemptNamespaces📜
Type: list
[]
upstream.controllerManager.exemptNamespacePrefixes📜
Type: list
[]
upstream.controllerManager.hostNetwork📜
Type: bool
false
upstream.controllerManager.dnsPolicy📜
Type: string
"ClusterFirst"
upstream.controllerManager.port📜
Type: int
8443
upstream.controllerManager.metricsPort📜
Type: int
8888
upstream.controllerManager.healthPort📜
Type: int
9090
upstream.controllerManager.readinessTimeout📜
Type: int
1
upstream.controllerManager.livenessTimeout📜
Type: int
1
upstream.controllerManager.priorityClassName📜
Type: string
"system-cluster-critical"
upstream.controllerManager.disableCertRotation📜
Type: bool
false
upstream.controllerManager.tlsMinVersion📜
Type: float
1.3
upstream.controllerManager.clientCertName📜
Type: string
""
upstream.controllerManager.strategyType📜
Type: string
"RollingUpdate"
upstream.controllerManager.strategyRollingUpdate📜
Type: object
{}
upstream.controllerManager.podLabels📜
Type: object
{}
upstream.controllerManager.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.labelSelector.matchExpressions[0].key📜
Type: string
"gatekeeper.sh/operation"
upstream.controllerManager.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.labelSelector.matchExpressions[0].operator📜
Type: string
"In"
upstream.controllerManager.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.labelSelector.matchExpressions[0].values[0]📜
Type: string
"webhook"
upstream.controllerManager.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.topologyKey📜
Type: string
"kubernetes.io/hostname"
upstream.controllerManager.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].weight📜
Type: int
100
upstream.controllerManager.topologySpreadConstraints📜
Type: list
[]
upstream.controllerManager.tolerations📜
Type: list
[]
upstream.controllerManager.nodeSelector.”kubernetes.io/os”📜
Type: string
"linux"
upstream.controllerManager.resources.limits.cpu📜
Type: string
"175m"
upstream.controllerManager.resources.limits.memory📜
Type: string
"512Mi"
upstream.controllerManager.resources.requests.cpu📜
Type: string
"175m"
upstream.controllerManager.resources.requests.memory📜
Type: string
"512Mi"
upstream.controllerManager.securityContext.allowPrivilegeEscalation📜
Type: bool
false
upstream.controllerManager.securityContext.capabilities.drop[0]📜
Type: string
"ALL"
upstream.controllerManager.securityContext.readOnlyRootFilesystem📜
Type: bool
true
upstream.controllerManager.securityContext.runAsGroup📜
Type: int
999
upstream.controllerManager.securityContext.runAsNonRoot📜
Type: bool
true
upstream.controllerManager.securityContext.runAsUser📜
Type: int
1000
upstream.controllerManager.podSecurityContext.fsGroup📜
Type: int
999
upstream.controllerManager.podSecurityContext.supplementalGroups[0]📜
Type: int
999
upstream.controllerManager.extraRules📜
Type: list
[]
upstream.controllerManager.networkPolicy.enabled📜
Type: bool
false
upstream.controllerManager.networkPolicy.ingress📜
Type: list
[]
upstream.controllerManager.disableWebhookOperation📜
Type: bool
false
upstream.controllerManager.disableGenerateOperation📜
Type: bool
true
upstream.exportBackend📜
Type: string
""
upstream.audit.exportConnection.path📜
Type: string
"/tmp/violations/topics"
upstream.audit.exportConnection.maxAuditResults📜
Type: int
3
upstream.audit.exportVolumeMount.path📜
Type: string
"/tmp/violations"
upstream.audit.exportVolume.name📜
Type: string
"tmp-violations"
upstream.audit.exportVolume.emptyDir📜
Type: object
{}
upstream.audit.exportSidecar.name📜
Type: string
"reader"
upstream.audit.exportSidecar.image📜
Type: string
"ghcr.io/open-policy-agent/fake-reader:latest"
upstream.audit.exportSidecar.imagePullPolicy📜
Type: string
"Always"
upstream.audit.exportSidecar.securityContext.allowPrivilegeEscalation📜
Type: bool
false
upstream.audit.exportSidecar.securityContext.capabilities.drop[0]📜
Type: string
"ALL"
upstream.audit.exportSidecar.securityContext.readOnlyRootFilesystem📜
Type: bool
true
upstream.audit.exportSidecar.securityContext.runAsGroup📜
Type: int
999
upstream.audit.exportSidecar.securityContext.runAsNonRoot📜
Type: bool
true
upstream.audit.exportSidecar.securityContext.runAsUser📜
Type: int
1000
upstream.audit.exportSidecar.securityContext.seccompProfile.type📜
Type: string
"RuntimeDefault"
upstream.audit.exportSidecar.volumeMounts[0].mountPath📜
Type: string
"/tmp/violations"
upstream.audit.exportSidecar.volumeMounts[0].name📜
Type: string
"tmp-violations"
upstream.audit.serviceAccount.name📜
Type: string
"gatekeeper-admin"
upstream.audit.enablePubsub📜
Type: bool
false
upstream.audit.containerName📜
Type: string
"manager"
upstream.audit.hostNetwork📜
Type: bool
false
upstream.audit.dnsPolicy📜
Type: string
"ClusterFirst"
upstream.audit.metricsPort📜
Type: int
8888
upstream.audit.healthPort📜
Type: int
9090
upstream.audit.readinessTimeout📜
Type: int
1
upstream.audit.livenessTimeout📜
Type: int
1
upstream.audit.priorityClassName📜
Type: string
"system-cluster-critical"
upstream.audit.disableCertRotation📜
Type: bool
false
upstream.audit.podLabels📜
Type: object
{}
upstream.audit.affinity📜
Type: object
{}
upstream.audit.tolerations📜
Type: list
[]
upstream.audit.nodeSelector.”kubernetes.io/os”📜
Type: string
"linux"
upstream.audit.resources.limits.cpu📜
Type: float
1.2
upstream.audit.resources.limits.memory📜
Type: string
"768Mi"
upstream.audit.resources.requests.cpu📜
Type: float
1.2
upstream.audit.resources.requests.memory📜
Type: string
"768Mi"
upstream.audit.securityContext.allowPrivilegeEscalation📜
Type: bool
false
upstream.audit.securityContext.capabilities.drop[0]📜
Type: string
"ALL"
upstream.audit.securityContext.readOnlyRootFilesystem📜
Type: bool
true
upstream.audit.securityContext.runAsGroup📜
Type: int
999
upstream.audit.securityContext.runAsNonRoot📜
Type: bool
true
upstream.audit.securityContext.runAsUser📜
Type: int
1000
upstream.audit.podSecurityContext.fsGroup📜
Type: int
999
upstream.audit.podSecurityContext.supplementalGroups[0]📜
Type: int
999
upstream.audit.writeToRAMDisk📜
Type: bool
false
upstream.audit.extraRules📜
Type: list
[]
upstream.audit.disableGenerateOperation📜
Type: bool
false
upstream.audit.disableAuditOperation📜
Type: bool
false
upstream.audit.disableStatusOperation📜
Type: bool
false
upstream.crds.affinity📜
Type: object
{}
upstream.crds.tolerations📜
Type: list
[]
upstream.crds.nodeSelector.”kubernetes.io/os”📜
Type: string
"linux"
upstream.crds.resources📜
Type: object
{}
upstream.crds.securityContext.allowPrivilegeEscalation📜
Type: bool
false
upstream.crds.securityContext.capabilities.drop[0]📜
Type: string
"ALL"
upstream.crds.securityContext.readOnlyRootFilesystem📜
Type: bool
true
upstream.crds.securityContext.runAsGroup📜
Type: int
65532
upstream.crds.securityContext.runAsNonRoot📜
Type: bool
true
upstream.crds.securityContext.runAsUser📜
Type: int
65532
upstream.pdb.controllerManager.minAvailable📜
Type: int
1
upstream.service📜
Type: object
{}
upstream.disabledBuiltins[0]📜
Type: string
"{http.send}"
upstream.psp.enabled📜
Type: bool
false
upstream.upgradeCRDs.serviceAccount.create📜
Type: bool
true
upstream.upgradeCRDs.serviceAccount.name📜
Type: string
"gatekeeper-admin-upgrade-crds"
upstream.upgradeCRDs.enabled📜
Type: bool
true
upstream.upgradeCRDs.extraRules📜
Type: list
[]
upstream.upgradeCRDs.priorityClassName📜
Type: string
""
upstream.cleanupCRDs.enabled📜
Type: bool
true
upstream.cleanupCRDs.containerSecurityContext.allowPrivilegeEscalation📜
Type: bool
false
upstream.cleanupCRDs.containerSecurityContext.capabilities.drop[0]📜
Type: string
"ALL"
upstream.cleanupCRDs.containerSecurityContext.readOnlyRootFilesystem📜
Type: bool
true
upstream.cleanupCRDs.containerSecurityContext.runAsGroup📜
Type: int
999
upstream.cleanupCRDs.containerSecurityContext.runAsNonRoot📜
Type: bool
true
upstream.cleanupCRDs.containerSecurityContext.runAsUser📜
Type: int
1000
upstream.cleanupCRDs.securityContext.readOnlyRootFilesystem📜
Type: bool
true
upstream.cleanupCRDs.securityContext.runAsGroup📜
Type: int
999
upstream.cleanupCRDs.securityContext.runAsNonRoot📜
Type: bool
true
upstream.cleanupCRDs.securityContext.runAsUser📜
Type: int
1000
upstream.cleanupCRDs.securityContext.fsGroup📜
Type: int
999
upstream.cleanupCRDs.securityContext.supplementalGroups[0]📜
Type: int
999
upstream.rbac.create📜
Type: bool
true
upstream.externalCertInjection.enabled📜
Type: bool
false
upstream.externalCertInjection.secretName📜
Type: string
"gatekeeper-webhook-server-cert"
upstream.serviceAccount.gatekeeperAdmin.create📜
Type: bool
false
violations.allowedAppArmorProfiles.enabled📜
Type: bool
false
violations.allowedAppArmorProfiles.enforcementAction📜
Type: string
"dryrun"
violations.allowedAppArmorProfiles.kind📜
Type: string
"K8sPSPAppArmor"
violations.allowedAppArmorProfiles.name📜
Type: string
"allowed-app-armor-profiles"
violations.allowedAppArmorProfiles.match📜
Type: object
{}
violations.allowedAppArmorProfiles.parameters.allowedProfiles[0]📜
Type: string
"runtime/default"
violations.allowedAppArmorProfiles.parameters.excludedResources📜
Type: list
[]
violations.allowedCapabilities.enabled📜
Type: bool
true
violations.allowedCapabilities.enforcementAction📜
Type: string
"dryrun"
violations.allowedCapabilities.kind📜
Type: string
"K8sPSPCapabilities"
violations.allowedCapabilities.name📜
Type: string
"allowed-capabilities"
violations.allowedCapabilities.match📜
Type: object
{}
violations.allowedCapabilities.parameters.allowedCapabilities📜
Type: list
[]
violations.allowedCapabilities.parameters.requiredDropCapabilities[0]📜
Type: string
"all"
violations.allowedCapabilities.parameters.excludedResources📜
Type: list
[]
violations.allowedDockerRegistries.enabled📜
Type: bool
true
violations.allowedDockerRegistries.enforcementAction📜
Type: string
"deny"
violations.allowedDockerRegistries.kind📜
Type: string
"K8sAllowedRepos"
violations.allowedDockerRegistries.name📜
Type: string
"allowed-docker-registries"
violations.allowedDockerRegistries.match📜
Type: object
{}
violations.allowedDockerRegistries.parameters.repos[0]📜
Type: string
"registry1.dso.mil"
violations.allowedDockerRegistries.parameters.excludedResources📜
Type: list
[]
violations.allowedFlexVolumes.enabled📜
Type: bool
true
violations.allowedFlexVolumes.enforcementAction📜
Type: string
"deny"
violations.allowedFlexVolumes.kind📜
Type: string
"K8sPSPFlexVolumes"
violations.allowedFlexVolumes.name📜
Type: string
"allowed-flex-volumes"
violations.allowedFlexVolumes.match📜
Type: object
{}
violations.allowedFlexVolumes.parameters.allowedFlexVolumes📜
Type: list
[]
violations.allowedFlexVolumes.parameters.excludedResources📜
Type: list
[]
violations.allowedHostFilesystem.enabled📜
Type: bool
true
violations.allowedHostFilesystem.enforcementAction📜
Type: string
"deny"
violations.allowedHostFilesystem.kind📜
Type: string
"K8sPSPHostFilesystem"
violations.allowedHostFilesystem.name📜
Type: string
"allowed-host-filesystem"
violations.allowedHostFilesystem.match📜
Type: object
{}
violations.allowedHostFilesystem.parameters.allowedHostPaths📜
Type: list
[]
violations.allowedHostFilesystem.parameters.excludedResources📜
Type: list
[]
violations.allowedIPs.enabled📜
Type: bool
true
violations.allowedIPs.enforcementAction📜
Type: string
"deny"
violations.allowedIPs.kind📜
Type: string
"K8sExternalIPs"
violations.allowedIPs.name📜
Type: string
"allowed-ips"
violations.allowedIPs.match📜
Type: object
{}
violations.allowedIPs.parameters.allowedIPs📜
Type: list
[]
violations.allowedIPs.parameters.excludedResources📜
Type: list
[]
violations.allowedProcMount.enabled📜
Type: bool
true
violations.allowedProcMount.enforcementAction📜
Type: string
"deny"
violations.allowedProcMount.kind📜
Type: string
"K8sPSPProcMount"
violations.allowedProcMount.name📜
Type: string
"allowed-proc-mount"
violations.allowedProcMount.match📜
Type: object
{}
violations.allowedProcMount.parameters.procMount📜
Type: string
"Default"
violations.allowedProcMount.parameters.excludedResources📜
Type: list
[]
violations.allowedSecCompProfiles.enabled📜
Type: bool
true
violations.allowedSecCompProfiles.enforcementAction📜
Type: string
"dryrun"
violations.allowedSecCompProfiles.kind📜
Type: string
"K8sPSPSeccomp"
violations.allowedSecCompProfiles.name📜
Type: string
"allowed-sec-comp-profiles"
violations.allowedSecCompProfiles.match📜
Type: object
{}
violations.allowedSecCompProfiles.parameters.allowedProfiles[0]📜
Type: string
"runtime/default"
violations.allowedSecCompProfiles.parameters.excludedResources📜
Type: list
[]
violations.allowedUsers.enabled📜
Type: bool
true
violations.allowedUsers.enforcementAction📜
Type: string
"dryrun"
violations.allowedUsers.kind📜
Type: string
"K8sPSPAllowedUsers"
violations.allowedUsers.name📜
Type: string
"allowed-users"
violations.allowedUsers.match📜
Type: object
{}
violations.allowedUsers.parameters.runAsUser.rule📜
Type: string
"MustRunAsNonRoot"
violations.allowedUsers.parameters.fsGroup.rule📜
Type: string
"MustRunAs"
violations.allowedUsers.parameters.fsGroup.ranges[0].min📜
Type: int
1000
violations.allowedUsers.parameters.fsGroup.ranges[0].max📜
Type: int
65535
violations.allowedUsers.parameters.runAsGroup.rule📜
Type: string
"MustRunAs"
violations.allowedUsers.parameters.runAsGroup.ranges[0].min📜
Type: int
1000
violations.allowedUsers.parameters.runAsGroup.ranges[0].max📜
Type: int
65535
violations.allowedUsers.parameters.supplementalGroups.rule📜
Type: string
"MustRunAs"
violations.allowedUsers.parameters.supplementalGroups.ranges[0].min📜
Type: int
1000
violations.allowedUsers.parameters.supplementalGroups.ranges[0].max📜
Type: int
65535
violations.allowedUsers.parameters.excludedResources📜
Type: list
[]
violations.bannedImageTags.enabled📜
Type: bool
true
violations.bannedImageTags.enforcementAction📜
Type: string
"deny"
violations.bannedImageTags.kind📜
Type: string
"K8sBannedImageTags"
violations.bannedImageTags.name📜
Type: string
"banned-image-tags"
violations.bannedImageTags.match📜
Type: object
{}
violations.bannedImageTags.parameters.tags[0]📜
Type: string
"latest"
violations.bannedImageTags.parameters.excludedResources📜
Type: list
[]
violations.blockNodePort.enabled📜
Type: bool
true
violations.blockNodePort.enforcementAction📜
Type: string
"dryrun"
violations.blockNodePort.kind📜
Type: string
"K8sBlockNodePort"
violations.blockNodePort.name📜
Type: string
"block-node-ports"
violations.blockNodePort.match📜
Type: object
{}
violations.blockNodePort.parameters.excludedResources📜
Type: list
[]
violations.containerRatio.enabled📜
Type: bool
true
violations.containerRatio.enforcementAction📜
Type: string
"dryrun"
violations.containerRatio.kind📜
Type: string
"K8sContainerRatios"
violations.containerRatio.name📜
Type: string
"container-ratios"
violations.containerRatio.match📜
Type: object
{}
violations.containerRatio.parameters.ratio📜
Type: string
"2"
violations.containerRatio.parameters.excludedResources📜
Type: list
[]
violations.hostNetworking.enabled📜
Type: bool
true
violations.hostNetworking.enforcementAction📜
Type: string
"deny"
violations.hostNetworking.kind📜
Type: string
"K8sPSPHostNetworkingPorts"
violations.hostNetworking.name📜
Type: string
"host-networking"
violations.hostNetworking.match📜
Type: object
{}
violations.hostNetworking.parameters.hostNetwork📜
Type: bool
false
violations.hostNetworking.parameters.min📜
Type: int
0
violations.hostNetworking.parameters.max📜
Type: int
0
violations.hostNetworking.parameters.excludedResources📜
Type: list
[]
violations.httpsOnly.enabled📜
Type: bool
true
violations.httpsOnly.enforcementAction📜
Type: string
"deny"
violations.httpsOnly.kind📜
Type: string
"K8sHttpsOnly2"
violations.httpsOnly.name📜
Type: string
"https-only"
violations.httpsOnly.match📜
Type: object
{}
violations.httpsOnly.parameters.excludedResources📜
Type: list
[]
violations.imageDigest.enabled📜
Type: bool
true
violations.imageDigest.enforcementAction📜
Type: string
"dryrun"
violations.imageDigest.kind📜
Type: string
"K8sImageDigests2"
violations.imageDigest.name📜
Type: string
"image-digest"
violations.imageDigest.match📜
Type: object
{}
violations.imageDigest.parameters.excludedResources📜
Type: list
[]
violations.namespacesHaveIstio.enabled📜
Type: bool
true
violations.namespacesHaveIstio.enforcementAction📜
Type: string
"dryrun"
violations.namespacesHaveIstio.kind📜
Type: string
"K8sRequiredLabelValues"
violations.namespacesHaveIstio.name📜
Type: string
"namespaces-have-istio"
violations.namespacesHaveIstio.match.namespaceSelector.matchExpressions[0].key📜
Type: string
"admission.gatekeeper.sh/ignore"
violations.namespacesHaveIstio.match.namespaceSelector.matchExpressions[0].operator📜
Type: string
"DoesNotExist"
violations.namespacesHaveIstio.parameters.labels[0].allowedRegex📜
Type: string
"^enabled"
violations.namespacesHaveIstio.parameters.labels[0].key📜
Type: string
"istio-injection"
violations.namespacesHaveIstio.parameters.excludedResources📜
Type: list
[]
violations.noBigContainers.enabled📜
Type: bool
true
violations.noBigContainers.enforcementAction📜
Type: string
"dryrun"
violations.noBigContainers.kind📜
Type: string
"K8sContainerLimits"
violations.noBigContainers.name📜
Type: string
"no-big-container"
violations.noBigContainers.match📜
Type: object
{}
violations.noBigContainers.parameters.cpu📜
Type: string
"2000m"
violations.noBigContainers.parameters.memory📜
Type: string
"4G"
violations.noBigContainers.parameters.excludedResources📜
Type: list
[]
violations.noHostNamespace.enabled📜
Type: bool
true
violations.noHostNamespace.enforcementAction📜
Type: string
"deny"
violations.noHostNamespace.kind📜
Type: string
"K8sPSPHostNamespace2"
violations.noHostNamespace.name📜
Type: string
"no-host-namespace"
violations.noHostNamespace.match📜
Type: object
{}
violations.noHostNamespace.parameters.excludedResources📜
Type: list
[]
violations.noPrivilegedContainers.enabled📜
Type: bool
true
violations.noPrivilegedContainers.enforcementAction📜
Type: string
"deny"
violations.noPrivilegedContainers.kind📜
Type: string
"K8sPSPPrivilegedContainer2"
violations.noPrivilegedContainers.name📜
Type: string
"no-privileged-containers"
violations.noPrivilegedContainers.match📜
Type: object
{}
violations.noPrivilegedContainers.parameters.excludedResources📜
Type: list
[]
violations.noDefaultServiceAccount.enabled📜
Type: bool
true
violations.noDefaultServiceAccount.enforcementAction📜
Type: string
"dryrun"
violations.noDefaultServiceAccount.kind📜
Type: string
"K8sDenySADefault"
violations.noDefaultServiceAccount.name📜
Type: string
"no-default-service-account"
violations.noDefaultServiceAccount.match📜
Type: object
{}
violations.noDefaultServiceAccount.parameters.excludedResources📜
Type: list
[]
violations.noPrivilegedEscalation.enabled📜
Type: bool
true
violations.noPrivilegedEscalation.enforcementAction📜
Type: string
"dryrun"
violations.noPrivilegedEscalation.kind📜
Type: string
"K8sPSPAllowPrivilegeEscalationContainer2"
violations.noPrivilegedEscalation.name📜
Type: string
"no-privileged-escalation"
violations.noPrivilegedEscalation.match📜
Type: object
{}
violations.noPrivilegedEscalation.parameters.excludedResources📜
Type: list
[]
violations.noSysctls.enabled📜
Type: bool
true
violations.noSysctls.enforcementAction📜
Type: string
"deny"
violations.noSysctls.kind📜
Type: string
"K8sPSPForbiddenSysctls"
violations.noSysctls.name📜
Type: string
"no-sysctls"
violations.noSysctls.match📜
Type: object
{}
violations.noSysctls.parameters.forbiddenSysctls[0]📜
Type: string
"*"
violations.noSysctls.parameters.excludedResources📜
Type: list
[]
violations.podsHaveIstio.enabled📜
Type: bool
true
violations.podsHaveIstio.enforcementAction📜
Type: string
"dryrun"
violations.podsHaveIstio.kind📜
Type: string
"K8sNoAnnotationValues"
violations.podsHaveIstio.name📜
Type: string
"pods-have-istio"
violations.podsHaveIstio.match📜
Type: object
{}
violations.podsHaveIstio.parameters.annotations[0].disallowedRegex📜
Type: string
"^false"
violations.podsHaveIstio.parameters.annotations[0].key📜
Type: string
"sidecar.istio.io/inject"
violations.podsHaveIstio.parameters.excludedResources📜
Type: list
[]
violations.readOnlyRoot.enabled📜
Type: bool
true
violations.readOnlyRoot.enforcementAction📜
Type: string
"dryrun"
violations.readOnlyRoot.kind📜
Type: string
"K8sPSPReadOnlyRootFilesystem2"
violations.readOnlyRoot.name📜
Type: string
"read-only-root"
violations.readOnlyRoot.match📜
Type: object
{}
violations.readOnlyRoot.parameters.excludedResources📜
Type: list
[]
violations.requiredLabels.enabled📜
Type: bool
true
violations.requiredLabels.enforcementAction📜
Type: string
"dryrun"
violations.requiredLabels.kind📜
Type: string
"K8sRequiredLabelValues"
violations.requiredLabels.name📜
Type: string
"required-labels"
violations.requiredLabels.match📜
Type: object
{}
violations.requiredLabels.parameters.labels[0].allowedRegex📜
Type: string
""
violations.requiredLabels.parameters.labels[0].key📜
Type: string
"app.kubernetes.io/name"
violations.requiredLabels.parameters.labels[1].allowedRegex📜
Type: string
""
violations.requiredLabels.parameters.labels[1].key📜
Type: string
"app.kubernetes.io/instance"
violations.requiredLabels.parameters.labels[2].allowedRegex📜
Type: string
""
violations.requiredLabels.parameters.labels[2].key📜
Type: string
"app.kubernetes.io/version"
violations.requiredLabels.parameters.labels[3].allowedRegex📜
Type: string
""
violations.requiredLabels.parameters.labels[3].key📜
Type: string
"app.kubernetes.io/component"
violations.requiredLabels.parameters.labels[4].allowedRegex📜
Type: string
""
violations.requiredLabels.parameters.labels[4].key📜
Type: string
"app.kubernetes.io/part-of"
violations.requiredLabels.parameters.labels[5].allowedRegex📜
Type: string
""
violations.requiredLabels.parameters.labels[5].key📜
Type: string
"app.kubernetes.io/managed-by"
violations.requiredLabels.parameters.excludedResources📜
Type: list
[]
violations.requiredProbes.enabled📜
Type: bool
true
violations.requiredProbes.enforcementAction📜
Type: string
"dryrun"
violations.requiredProbes.kind📜
Type: string
"K8sRequiredProbes"
violations.requiredProbes.name📜
Type: string
"required-probes"
violations.requiredProbes.match📜
Type: object
{}
violations.requiredProbes.parameters.probeTypes[0]📜
Type: string
"tcpSocket"
violations.requiredProbes.parameters.probeTypes[1]📜
Type: string
"httpGet"
violations.requiredProbes.parameters.probeTypes[2]📜
Type: string
"exec"
violations.requiredProbes.parameters.probes[0]📜
Type: string
"readinessProbe"
violations.requiredProbes.parameters.probes[1]📜
Type: string
"livenessProbe"
violations.requiredProbes.parameters.excludedResources📜
Type: list
[]
violations.restrictedTaint.enabled📜
Type: bool
true
violations.restrictedTaint.enforcementAction📜
Type: string
"deny"
violations.restrictedTaint.kind📜
Type: string
"RestrictedTaintToleration"
violations.restrictedTaint.name📜
Type: string
"restricted-taint"
violations.restrictedTaint.match📜
Type: object
{}
violations.restrictedTaint.parameters.allowGlobalToleration📜
Type: bool
false
violations.restrictedTaint.parameters.restrictedTaint.effect📜
Type: string
"NoSchedule"
violations.restrictedTaint.parameters.restrictedTaint.key📜
Type: string
"privileged"
violations.restrictedTaint.parameters.restrictedTaint.value📜
Type: string
"true"
violations.restrictedTaint.parameters.excludedResources📜
Type: list
[]
violations.selinuxPolicy.enabled📜
Type: bool
true
violations.selinuxPolicy.enforcementAction📜
Type: string
"deny"
violations.selinuxPolicy.kind📜
Type: string
"K8sPSPSELinuxV2"
violations.selinuxPolicy.name📜
Type: string
"selinux-policy"
violations.selinuxPolicy.match📜
Type: object
{}
violations.selinuxPolicy.parameters.allowedSELinuxOptions[0].level📜
Type: string
nil
violations.selinuxPolicy.parameters.allowedSELinuxOptions[0].role📜
Type: string
nil
violations.selinuxPolicy.parameters.allowedSELinuxOptions[0].type📜
Type: string
nil
violations.selinuxPolicy.parameters.allowedSELinuxOptions[0].user📜
Type: string
nil
violations.selinuxPolicy.parameters.excludedResources📜
Type: list
[]
violations.uniqueIngressHost.enabled📜
Type: bool
true
violations.uniqueIngressHost.enforcementAction📜
Type: string
"deny"
violations.uniqueIngressHost.kind📜
Type: string
"K8sUniqueIngressHost"
violations.uniqueIngressHost.name📜
Type: string
"unique-ingress-hosts"
violations.uniqueIngressHost.match📜
Type: object
{}
violations.uniqueIngressHost.parameters.excludedResources📜
Type: list
[]
violations.volumeTypes.enabled📜
Type: bool
true
violations.volumeTypes.enforcementAction📜
Type: string
"deny"
violations.volumeTypes.kind📜
Type: string
"K8sPSPVolumeTypes"
violations.volumeTypes.name📜
Type: string
"volume-types"
violations.volumeTypes.match📜
Type: object
{}
violations.volumeTypes.parameters.volumes[0]📜
Type: string
"configMap"
violations.volumeTypes.parameters.volumes[1]📜
Type: string
"emptyDir"
violations.volumeTypes.parameters.volumes[2]📜
Type: string
"projected"
violations.volumeTypes.parameters.volumes[3]📜
Type: string
"secret"
violations.volumeTypes.parameters.volumes[4]📜
Type: string
"downwardAPI"
violations.volumeTypes.parameters.volumes[5]📜
Type: string
"persistentVolumeClaim"
violations.volumeTypes.parameters.excludedResources📜
Type: list
[]
cleanupCRDs.enabled📜
Type: bool
true
cleanupCRDs.containerSecurityContext.allowPrivilegeEscalation📜
Type: bool
false
cleanupCRDs.containerSecurityContext.capabilities.drop[0]📜
Type: string
"ALL"
cleanupCRDs.containerSecurityContext.readOnlyRootFilesystem📜
Type: bool
true
cleanupCRDs.containerSecurityContext.runAsGroup📜
Type: int
999
cleanupCRDs.containerSecurityContext.runAsNonRoot📜
Type: bool
true
cleanupCRDs.containerSecurityContext.runAsUser📜
Type: int
1000
cleanupCRDs.securityContext.readOnlyRootFilesystem📜
Type: bool
true
cleanupCRDs.securityContext.runAsGroup📜
Type: int
999
cleanupCRDs.securityContext.runAsNonRoot📜
Type: bool
true
cleanupCRDs.securityContext.runAsUser📜
Type: int
1000
cleanupCRDs.securityContext.fsGroup📜
Type: int
999
cleanupCRDs.securityContext.supplementalGroups[0]📜
Type: int
999
image.repository📜
Type: string
"registry1.dso.mil/ironbank/opensource/kubernetes/kubectl"
image.pullPolicy📜
Type: string
"IfNotPresent"
image.pullSecrets[0].name📜
Type: string
"private-registry"
image.crdRepository📜
Type: string
"registry1.dso.mil/ironbank/opensource/kubernetes/kubectl"
image.crdRelease📜
Type: string
"v1.33"
monitoring.enabled📜
Type: bool
false
networkPolicies.enabled📜
Type: bool
false
networkPolicies.controlPlaneCidr📜
Type: string
"0.0.0.0/0"
networkPolicies.vpcCidr📜
Type: string
"0.0.0.0/0"
networkPolicies.additionalPolicies📜
Type: list
[]
bbtests.enabled📜
Type: bool
false
bbtests.scripts.image📜
Type: string
"registry1.dso.mil/ironbank/opensource/kubernetes/kubectl:v1.33"
bbtests.scripts.securityContext.allowPrivilegeEscalation📜
Type: bool
false
bbtests.scripts.securityContext.capabilities.drop[0]📜
Type: string
"ALL"
bbtests.scripts.securityContext.readOnlyRootFilesystem📜
Type: bool
true
bbtests.scripts.securityContext.runAsGroup📜
Type: int
999
bbtests.scripts.securityContext.runAsNonRoot📜
Type: bool
true
bbtests.scripts.securityContext.runAsUser📜
Type: int
1000
bbtests.scripts.additionalVolumeMounts[0].name📜
Type: string
"{{ .Chart.Name }}-test-config"
bbtests.scripts.additionalVolumeMounts[0].mountPath📜
Type: string
"/yaml"
bbtests.scripts.additionalVolumeMounts[1].name📜
Type: string
"{{ .Chart.Name }}-kube-cache"
bbtests.scripts.additionalVolumeMounts[1].mountPath📜
Type: string
"/.kube/cache"
bbtests.scripts.additionalVolumes[0].name📜
Type: string
"{{ .Chart.Name }}-test-config"
bbtests.scripts.additionalVolumes[0].configMap.name📜
Type: string
"{{ .Chart.Name }}-test-config"
bbtests.scripts.additionalVolumes[1].name📜
Type: string
"{{ .Chart.Name }}-kube-cache"
bbtests.scripts.additionalVolumes[1].emptyDir📜
Type: object
{}
bbtests.openshift📜
Type: bool
false
serviceAccount.gatekeeperAdmin.create📜
Type: bool
false
postInstall.labelNamespace.serviceAccount.name📜
Type: string
"gatekeeper-update-namespace-label"
postInstall.labelNamespace.serviceAccount.create📜
Type: bool
true
postInstall.labelNamespace.enabled📜
Type: bool
true
rbac.create📜
Type: bool
false
postUpgrade.labelNamespace.serviceAccount.name📜
Type: string
"gatekeeper-update-namespace-label-post-upgrade"
postUpgrade.labelNamespace.serviceAccount.create📜
Type: bool
true
postUpgrade.labelNamespace.enabled📜
Type: bool
true