-
Bug
-
Resolution: Done
-
Undefined
-
None
-
4.11.z
-
Quality / Stability / Reliability
-
False
-
-
None
-
None
-
No
-
None
-
None
-
None
-
CMP Sprint 67, CMP Sprint 68, CMP Sprint 69, CMP Sprint 70, CMP Sprint 71, CMP Sprint 72, CMP Sprint 73, CMP Sprint 74, CMP Sprint 75
-
9
-
None
-
None
-
-
None
-
None
-
None
-
None
Description of problem:
After cluster upgrade to 4.11, PodSecurity violation alerts are triggered by compliance-operator:
1 openshift-compliance ocp4-cis-node-infra-rs deployments would violate PodSecurity "restricted:latest": seccompProfile (pod or container "result-server" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") 1 openshift-compliance ocp4-cis-node-master-rs deployments would violate PodSecurity "restricted:latest": seccompProfile (pod or container "result-server" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") 1 openshift-compliance ocp4-cis-node-storage-rs deployments would violate PodSecurity "restricted:latest": seccompProfile (pod or container "result-server" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") 1 openshift-compliance ocp4-cis-node-worker-rs deployments would violate PodSecurity "restricted:latest": seccompProfile (pod or container "result-server" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") 1 openshift-compliance vz-ocp4-cis-rs deployments would violate PodSecurity "restricted:latest": seccompProfile (pod or container "result-server" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost")
Version-Release number of selected component (if applicable):
v0.1.61
- links to
-
RHBA-2023:7658
OpenShift Compliance Operator bug fix and enhancement update