Unverified Commit 1595324f authored by Sebastiaan van Steenis's avatar Sebastiaan van Steenis Committed by GitHub
Browse files

Merge pull request #1967 from superseb/data_20201303

update bindata/data.json
parents 02a95b7c 9392c8bf
release/v1.3 1.2.5 enable_fossa githubaction-go-generate-2022-01-19-14-09-53 githubaction-go-generate-2022-01-19-16-59-09 githubaction-go-generate-2022-02-02-16-53-10 githubaction-go-generate-2022-03-19-01-55-24 githubaction-go-generate-2022-03-19-02-28-40 githubaction-go-generate-2022-03-24-18-41-17 githubaction-go-generate-2022-03-24-19-00-43 githubaction-go-generate-2022-04-27-01-07-30 githubaction-go-generate-2022-04-27-16-36-37 githubaction-go-generate-2022-04-28-23-21-04 githubaction-go-generate-2022-04-29-00-20-33 githubaction-go-generate-2022-04-29-03-20-39 githubaction-go-generate-2022-04-29-03-34-38 githubaction-go-generate-2022-05-05-16-15-24 githubaction-go-generate-2022-05-06-15-36-45 githubaction-go-generate-2022-05-06-21-32-47 kinarashah-patch-1 label-opened-issues master rancherbot_port_2796_release/v1.2_6efce927fbafb32468ad2dc45acb64511f4a6f31 release/v1.1 release/v1.1.10 release/v1.1.13 release/v1.1.2 release/v1.2 release/v1.2.1 revert-2326-rotate-encryption-keys revert-2374-revert-2326-rotate-encryption-keys revert-2541-no_selinux_relabel wg-10699 v1.3.11-rc2 v1.3.11-rc1 v1.3.10 v1.3.10-rc7 v1.3.10-rc6 v1.3.10-rc5 v1.3.10-rc4 v1.3.10-rc3 v1.3.10-rc2 v1.3.10-rc1 v1.3.9 v1.3.9-rc1 v1.3.8 v1.3.8-rc12 v1.3.8-rc11 v1.3.8-rc10 v1.3.8-rc9 v1.3.8-rc8 v1.3.8-rc7 v1.3.8-rc6 v1.3.8-rc5 v1.3.8-rc4 v1.3.8-rc3 v1.3.8-rc2 v1.3.8-rc1 v1.3.7 v1.3.7-rc1 v1.3.6 v1.3.6-rc1 v1.3.5 v1.3.5-rc1 v1.3.5-alpha1 v1.3.4 v1.3.4-rc1 v1.3.3 v1.3.3-rc6 v1.3.3-rc5 v1.3.3-rc4 v1.3.3-rc3 v1.3.3-rc2 v1.3.3-rc1 v1.3.2 v1.3.2-rc2 v1.3.2-rc1 v1.3.1 v1.3.1-rc1 v1.3.0 v1.3.0-rc20 v1.3.0-rc19 v1.3.0-rc18 v1.3.0-rc17 v1.3.0-rc16 v1.3.0-rc15 v1.3.0-rc14 v1.3.0-rc13 v1.3.0-rc12 v1.3.0-rc11 v1.3.0-rc10 v1.3.0-rc9 v1.3.0-rc8 v1.3.0-rc7 v1.3.0-rc6 v1.3.0-rc5 v1.3.0-rc4 v1.3.0-rc3 v1.3.0-rc2 v1.3.0-rc1 v1.2.20 v1.2.20-rc1 v1.2.19 v1.2.19-rc4 v1.2.19-rc3 v1.2.19-rc2 v1.2.19-rc1 v1.2.18 v1.2.18-rc1 v1.2.17 v1.2.17-rc1 v1.2.16 v1.2.16-rc1 v1.2.15 v1.2.15-rc1 v1.2.14 v1.2.14-rc2 v1.2.14-rc1 v1.2.13 v1.2.13-rc2 v1.2.13-rc1 v1.2.12 v1.2.12-rc1 v1.2.11 v1.2.11-rc0 v1.2.10 v1.2.10-rc0 v1.2.9 v1.2.9-rc2 v1.2.9-rc1 v1.2.8 v1.2.8-rc4 v1.2.8-rc3 v1.2.8-rc2 v1.2.8-rc1 v1.2.7 v1.2.7-rc1 v1.2.6 v1.2.6-rc6 v1.2.6-rc5 v1.2.6-rc4 v1.2.6-rc3 v1.2.6-rc2 v1.2.6-rc1 v1.2.5 v1.2.5-rc2 v1.2.5-rc1 v1.2.4 v1.2.4-rc9 v1.2.4-rc8 v1.2.4-rc7 v1.2.4-rc6 v1.2.4-rc5 v1.2.4-rc4 v1.2.4-rc3 v1.2.4-rc2 v1.2.4-rc1 v1.2.3 v1.2.3-rc1 v1.2.2 v1.2.2-rc6 v1.2.2-rc5 v1.2.2-rc4 v1.2.2-rc3 v1.2.2-rc2 v1.2.2-rc1 v1.2.1 v1.2.1-rc1 v1.2.0 v1.2.0-rc17 v1.2.0-rc16 v1.2.0-rc15 v1.2.0-rc14 v1.2.0-rc13 v1.2.0-rc12 v1.2.0-rc11 v1.2.0-rc10 v1.2.0-rc9 v1.2.0-rc8 v1.2.0-rc7 v1.2.0-rc6 v1.2.0-rc5 v1.2.0-rc4 v1.2.0-rc3 v1.2.0-rc2 v1.2.0-rc1 v1.1.19 v1.1.19-rc1 v1.1.18 v1.1.18-rc2 v1.1.18-rc1 v1.1.17 v1.1.17-rc2 v1.1.17-rc1 v1.1.16 v1.1.16-rc1 v1.1.15 v1.1.15-rc4 v1.1.15-rc3 v1.1.15-rc2 v1.1.15-rc1 v1.1.14 v1.1.14-rc3 v1.1.14-rc2 v1.1.14-rc1 v1.1.13 v1.1.13-rc3 v1.1.13-rc2 v1.1.13-rc1 v1.1.12 v1.1.12-rc1 v1.1.11 v1.1.11-rc6 v1.1.11-rc5 v1.1.11-rc4 v1.1.11-rc3 v1.1.11-rc2 v1.1.11-rc1 v1.1.10 v1.1.10-rc1 v1.1.9 v1.1.9-rc3 v1.1.9-rc2 v1.1.9-rc1 v1.1.8-rc1 v1.1.7 v1.1.6 v1.1.5 v1.1.5-rc9 v1.1.5-rc8 v1.1.5-rc7 v1.1.5-rc6 v1.1.5-rc5 v1.1.5-rc4 v1.1.5-rc3 v1.1.5-rc2 v1.1.5-rc1 v1.1.4 v1.1.4-rc2 v1.1.4-rc1 v1.1.3 v1.1.3-rc6 v1.1.3-rc5 v1.1.3-rc4 v1.1.3-rc3 v1.1.3-rc2 v1.1.3-rc1 v1.1.2 v1.1.2-rc4 v1.1.2-rc3 v1.1.2-rc1 v1.1.1 v1.1.1-rc1 v1.1.0 v1.1.0-rc19 v1.1.0-rc18 v1.1.0-rc17 v1.1.0-rc16 v1.0.7-rc1
No related merge requests found
Showing with 147 additions and 63 deletions
+147 -63
This source diff could not be displayed because it is too large. You can view the blob instead.
......@@ -2916,7 +2916,37 @@
"metricsServer": "rancher/metrics-server:v0.3.3",
"windowsPodInfraContainer": "rancher/kubelet-pause:v0.1.3"
},
"v1.15.10-rancher1-2": {
"v1.15.11-rancher1-1": {
"etcd": "rancher/coreos-etcd:v3.3.10-rancher1",
"alpine": "rancher/rke-tools:v0.1.52",
"nginxProxy": "rancher/rke-tools:v0.1.52",
"certDownloader": "rancher/rke-tools:v0.1.52",
"kubernetesServicesSidecar": "rancher/rke-tools:v0.1.52",
"kubedns": "rancher/k8s-dns-kube-dns:1.15.0",
"dnsmasq": "rancher/k8s-dns-dnsmasq-nanny:1.15.0",
"kubednsSidecar": "rancher/k8s-dns-sidecar:1.15.0",
"kubednsAutoscaler": "rancher/cluster-proportional-autoscaler:1.3.0",
"coredns": "rancher/coredns-coredns:1.3.1",
"corednsAutoscaler": "rancher/cluster-proportional-autoscaler:1.3.0",
"kubernetes": "rancher/hyperkube:v1.15.11-rancher1",
"flannel": "rancher/coreos-flannel:v0.11.0-rancher1",
"flannelCni": "rancher/flannel-cni:v0.3.0-rancher5",
"calicoNode": "rancher/calico-node:v3.7.4",
"calicoCni": "rancher/calico-cni:v3.7.4",
"calicoControllers": "rancher/calico-kube-controllers:v3.7.4",
"calicoCtl": "rancher/calico-ctl:v2.0.0",
"canalNode": "rancher/calico-node:v3.7.4",
"canalCni": "rancher/calico-cni:v3.7.4",
"canalFlannel": "rancher/coreos-flannel:v0.11.0",
"weaveNode": "weaveworks/weave-kube:2.5.2",
"weaveCni": "weaveworks/weave-npc:2.5.2",
"podInfraContainer": "rancher/pause:3.1",
"ingress": "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1",
"ingressBackend": "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1",
"metricsServer": "rancher/metrics-server:v0.3.3",
"windowsPodInfraContainer": "rancher/kubelet-pause:v0.1.3"
},
"v1.15.11-rancher1-2": {
"etcd": "rancher/coreos-etcd:v3.3.10-rancher1",
"alpine": "rancher/rke-tools:v0.1.53",
"nginxProxy": "rancher/rke-tools:v0.1.53",
......@@ -2929,7 +2959,7 @@
"coredns": "rancher/coredns-coredns:1.3.1",
"corednsAutoscaler": "rancher/cluster-proportional-autoscaler:1.3.0",
"nodelocal": "rancher/k8s-dns-node-cache:1.15.7",
"kubernetes": "rancher/hyperkube:v1.15.10-rancher1",
"kubernetes": "rancher/hyperkube:v1.15.11-rancher1",
"flannel": "rancher/coreos-flannel:v0.11.0-rancher1",
"flannelCni": "rancher/flannel-cni:v0.3.0-rancher5",
"calicoNode": "rancher/calico-node:v3.13.0",
......@@ -3495,7 +3525,39 @@
"metricsServer": "rancher/metrics-server:v0.3.4",
"windowsPodInfraContainer": "rancher/kubelet-pause:v0.1.3"
},
"v1.16.7-rancher1-2": {
"v1.16.8-rancher1-1": {
"etcd": "rancher/coreos-etcd:v3.3.15-rancher1",
"alpine": "rancher/rke-tools:v0.1.52",
"nginxProxy": "rancher/rke-tools:v0.1.52",
"certDownloader": "rancher/rke-tools:v0.1.52",
"kubernetesServicesSidecar": "rancher/rke-tools:v0.1.52",
"kubedns": "rancher/k8s-dns-kube-dns:1.15.0",
"dnsmasq": "rancher/k8s-dns-dnsmasq-nanny:1.15.0",
"kubednsSidecar": "rancher/k8s-dns-sidecar:1.15.0",
"kubednsAutoscaler": "rancher/cluster-proportional-autoscaler:1.7.1",
"coredns": "rancher/coredns-coredns:1.6.2",
"corednsAutoscaler": "rancher/cluster-proportional-autoscaler:1.7.1",
"kubernetes": "rancher/hyperkube:v1.16.8-rancher1",
"flannel": "rancher/coreos-flannel:v0.11.0-rancher1",
"flannelCni": "rancher/flannel-cni:v0.3.0-rancher5",
"calicoNode": "rancher/calico-node:v3.10.2",
"calicoCni": "rancher/calico-cni:v3.10.2",
"calicoControllers": "rancher/calico-kube-controllers:v3.10.2",
"calicoCtl": "rancher/calico-ctl:v2.0.0",
"calicoFlexVol": "rancher/calico-pod2daemon-flexvol:v3.10.2",
"canalNode": "rancher/calico-node:v3.10.2",
"canalCni": "rancher/calico-cni:v3.10.2",
"canalFlannel": "rancher/coreos-flannel:v0.11.0",
"canalFlexVol": "rancher/calico-pod2daemon-flexvol:v3.10.2",
"weaveNode": "weaveworks/weave-kube:2.5.2",
"weaveCni": "weaveworks/weave-npc:2.5.2",
"podInfraContainer": "rancher/pause:3.1",
"ingress": "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1",
"ingressBackend": "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1",
"metricsServer": "rancher/metrics-server:v0.3.4",
"windowsPodInfraContainer": "rancher/kubelet-pause:v0.1.3"
},
"v1.16.8-rancher1-2": {
"etcd": "rancher/coreos-etcd:v3.3.15-rancher1",
"alpine": "rancher/rke-tools:v0.1.53",
"nginxProxy": "rancher/rke-tools:v0.1.53",
......@@ -3508,7 +3570,7 @@
"coredns": "rancher/coredns-coredns:1.6.2",
"corednsAutoscaler": "rancher/cluster-proportional-autoscaler:1.7.1",
"nodelocal": "rancher/k8s-dns-node-cache:1.15.7",
"kubernetes": "rancher/hyperkube:v1.16.7-rancher1",
"kubernetes": "rancher/hyperkube:v1.16.8-rancher1",
"flannel": "rancher/coreos-flannel:v0.11.0-rancher1",
"flannelCni": "rancher/flannel-cni:v0.3.0-rancher5",
"calicoNode": "rancher/calico-node:v3.13.0",
......@@ -3685,7 +3747,39 @@
"metricsServer": "rancher/metrics-server:v0.3.6",
"windowsPodInfraContainer": "rancher/kubelet-pause:v0.1.3"
},
"v1.17.3-rancher1-2": {
"v1.17.4-rancher1-1": {
"etcd": "rancher/coreos-etcd:v3.4.3-rancher1",
"alpine": "rancher/rke-tools:v0.1.52",
"nginxProxy": "rancher/rke-tools:v0.1.52",
"certDownloader": "rancher/rke-tools:v0.1.52",
"kubernetesServicesSidecar": "rancher/rke-tools:v0.1.52",
"kubedns": "rancher/k8s-dns-kube-dns:1.15.0",
"dnsmasq": "rancher/k8s-dns-dnsmasq-nanny:1.15.0",
"kubednsSidecar": "rancher/k8s-dns-sidecar:1.15.0",
"kubednsAutoscaler": "rancher/cluster-proportional-autoscaler:1.7.1",
"coredns": "rancher/coredns-coredns:1.6.5",
"corednsAutoscaler": "rancher/cluster-proportional-autoscaler:1.7.1",
"kubernetes": "rancher/hyperkube:v1.17.4-rancher1",
"flannel": "rancher/coreos-flannel:v0.11.0-rancher1",
"flannelCni": "rancher/flannel-cni:v0.3.0-rancher5",
"calicoNode": "rancher/calico-node:v3.10.2",
"calicoCni": "rancher/calico-cni:v3.10.2",
"calicoControllers": "rancher/calico-kube-controllers:v3.10.2",
"calicoCtl": "rancher/calico-ctl:v2.0.0",
"calicoFlexVol": "rancher/calico-pod2daemon-flexvol:v3.10.2",
"canalNode": "rancher/calico-node:v3.10.2",
"canalCni": "rancher/calico-cni:v3.10.2",
"canalFlannel": "rancher/coreos-flannel:v0.11.0",
"canalFlexVol": "rancher/calico-pod2daemon-flexvol:v3.10.2",
"weaveNode": "weaveworks/weave-kube:2.5.2",
"weaveCni": "weaveworks/weave-npc:2.5.2",
"podInfraContainer": "rancher/pause:3.1",
"ingress": "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1",
"ingressBackend": "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1",
"metricsServer": "rancher/metrics-server:v0.3.6",
"windowsPodInfraContainer": "rancher/kubelet-pause:v0.1.3"
},
"v1.17.4-rancher1-2": {
"etcd": "rancher/coreos-etcd:v3.4.3-rancher1",
"alpine": "rancher/rke-tools:v0.1.53",
"nginxProxy": "rancher/rke-tools:v0.1.53",
......@@ -3698,7 +3792,7 @@
"coredns": "rancher/coredns-coredns:1.6.5",
"corednsAutoscaler": "rancher/cluster-proportional-autoscaler:1.7.1",
"nodelocal": "rancher/k8s-dns-node-cache:1.15.7",
"kubernetes": "rancher/hyperkube:v1.17.3-rancher1",
"kubernetes": "rancher/hyperkube:v1.17.4-rancher1",
"flannel": "rancher/coreos-flannel:v0.11.0-rancher1",
"flannelCni": "rancher/flannel-cni:v0.3.0-rancher5",
"calicoNode": "rancher/calico-node:v3.13.0",
......@@ -3968,7 +4062,7 @@
},
"RKEDefaultK8sVersions": {
"0.3": "v1.16.3-rancher1-1",
"default": "v1.17.3-rancher1-2"
"default": "v1.17.4-rancher1-2"
},
"K8sVersionDockerInfo": {
"1.10": [
......@@ -4178,19 +4272,19 @@
},
"CisConfigParams": {
"default": {
"benchmarkVersion": "rke-cis-1.5"
"benchmarkVersion": "rke-cis-1.4"
},
"v1.15": {
"benchmarkVersion": "rke-cis-1.5"
"benchmarkVersion": "rke-cis-1.4"
},
"v1.16": {
"benchmarkVersion": "rke-cis-1.5"
"benchmarkVersion": "rke-cis-1.4"
},
"v1.17": {
"benchmarkVersion": "rke-cis-1.5"
"benchmarkVersion": "rke-cis-1.4"
},
"v1.18": {
"benchmarkVersion": "rke-cis-1.5"
"benchmarkVersion": "rke-cis-1.4"
}
},
"CisBenchmarkVersionInfo": {
......@@ -4208,34 +4302,28 @@
},
"rke-cis-1.4": {
"managed": true,
"minKubernetesVersion": "1.13",
"minKubernetesVersion": "1.15",
"skippedChecks": {
"1.1.11": "TODO",
"1.1.15": "TODO",
"1.1.16": "TODO",
"1.1.17": "TODO",
"1.1.18": "TODO",
"1.1.24": "Enabling Pod Security Policy can cause issues with many helm chart installations",
"1.1.34": "TODO",
"1.1.35": "TODO",
"1.1.36": "TODO",
"1.1.37a": "TODO",
"1.1.37b": "TODO",
"1.3.6": "TODO",
"1.4.12": "TODO",
"1.7.2": "Enabling Pod Security Policy can cause issues with many helm chart installations",
"1.7.3": "Enabling Pod Security Policy can cause issues with many helm chart installations",
"1.7.4": "Enabling Pod Security Policy can cause issues with many helm chart installations",
"1.7.5": "Enabling Pod Security Policy can cause issues with many helm chart installations",
"2.1.10": "TODO",
"2.1.12": "TODO",
"2.1.6": "TODO",
"2.1.8": "TODO"
"1.1.11": "Enabling AlwaysPullImages can use significant bandwidth.",
"1.1.21": "When generating serving certificates, functionality could break in conjunction with hostname overrides which are required for certain cloud providers.",
"1.1.24": "Enabling Pod Security Policy can cause applications to unexpectedly fail. ",
"1.1.36": "EventRateLimit needs to be tuned depending on the cluster.",
"1.2.2": "Adding this argument prevents Rancher's monitoring tool to collect metrics on the scheduler.",
"1.3.7": "Adding this argument prevents Rancher's monitoring tool to collect metrics on the controller manager.",
"1.4.12": "A system service account is required for etcd data directory ownership. Refer to Rancher's hardening guide for more details on how to configure this ownership.",
"1.7.2": "Enabling Pod Security Policy can cause applications to unexpectedly fail. ",
"1.7.3": "Enabling Pod Security Policy can cause applications to unexpectedly fail. ",
"1.7.4": "Enabling Pod Security Policy can cause applications to unexpectedly fail. ",
"1.7.5": "Enabling Pod Security Policy can cause applications to unexpectedly fail. ",
"2.1.10": "When generating serving certificates, functionality could break in conjunction with hostname overrides which are required for certain cloud providers.",
"2.1.6": "System level configurations are required prior to provisioning the cluster in order for this argument to be set to true. "
},
"notApplicableChecks": {
"1.1.9": "The argument --repair-malformed-updates has been removed as of Kubernetes version 1.14",
"1.3.6": "Cluster provisioned by RKE handles certificate rotation directly through RKE.",
"1.4.1": "Cluster provisioned by RKE doesn't require or maintain a configuration file for kube-apiserver.\nAll configuration is passed in as arguments at container run time.",
"1.4.13": "RKE does not store the kubernetes default kubeconfig credentials file on the nodes.",
"1.4.14": "RKE does not store the kubernetes default kubeconfig credentials file on the nodes.",
"1.4.13": "Cluster provisioned by RKE does not store the kubernetes default kubeconfig credentials file on the nodes.",
"1.4.14": "Cluster provisioned by RKE does not store the kubernetes default kubeconfig credentials file on the nodes.",
"1.4.2": "Cluster provisioned by RKE doesn't require or maintain a configuration file for kube-apiserver.\nAll configuration is passed in as arguments at container run time.",
"1.4.3": "Cluster provisioned by RKE doesn't require or maintain a configuration file for controller-manager.\nAll configuration is passed in as arguments at container run time.",
"1.4.4": "Cluster provisioned by RKE doesn't require or maintain a configuration file for controller-manager.\nAll configuration is passed in as arguments at container run time.",
......@@ -4243,9 +4331,12 @@
"1.4.6": "Cluster provisioned by RKE doesn't require or maintain a configuration file for scheduler.\nAll configuration is passed in as arguments at container run time.",
"1.4.7": "Cluster provisioned by RKE doesn't require or maintain a configuration file for etcd.\nAll configuration is passed in as arguments at container run time.",
"1.4.8": "Cluster provisioned by RKE doesn't require or maintain a configuration file for etcd.\nAll configuration is passed in as arguments at container run time.",
"2.1.12": "Cluster provisioned by RKE handles certificate rotation directly through RKE.",
"2.1.13": "Cluster provisioned by RKE handles certificate rotation directly through RKE.",
"2.1.8": "Clusters provisioned by RKE clusters and most cloud providers require hostnames.",
"2.2.10": "RKE doesn’t require or maintain a configuration file for the kubelet.\nAll configuration is passed in as arguments at container run time.",
"2.2.3": "RKE doesn’t require or maintain a configuration file for the kubelet service.\nAll configuration is passed in as arguments at container run time.",
"2.2.4": "RKE doesn’t require or maintain a configuration file for the kubelet service.\nAll configuration is passed in as arguments at container run time.",
"2.2.3": "Cluster provisioned by RKE doesn’t require or maintain a configuration file for the kubelet service.\nAll configuration is passed in as arguments at container run time.",
"2.2.4": "Cluster provisioned by RKE doesn’t require or maintain a configuration file for the kubelet service.\nAll configuration is passed in as arguments at container run time.",
"2.2.9": "RKE doesn’t require or maintain a configuration file for the kubelet.\nAll configuration is passed in as arguments at container run time."
}
},
......@@ -4253,32 +4344,23 @@
"managed": true,
"minKubernetesVersion": "1.15",
"skippedChecks": {
"1.1.12": "TODO",
"1.2.16": "Enabling Pod Security Policy can cause issues with many helm chart installations",
"1.2.22": "TODO",
"1.2.23": "TODO",
"1.2.24": "TODO",
"1.2.25": "TODO",
"1.2.33": "TODO",
"1.2.34": "TODO",
"1.2.6": "TODO",
"1.3.6": "TODO",
"3.2.1": "TODO",
"4.2.10": "TODO",
"4.2.12": "TODO",
"4.2.6": "TODO",
"1.1.12": "A system service account is required for etcd data directory ownership. Refer to Rancher's hardening guide for more details on how to configure this ownership.",
"1.2.16": "Enabling Pod Security Policy can cause applications to unexpectedly fail. ",
"1.2.6": "When generating serving certificates, functionality could break in conjunction with hostname overrides which are required for certain cloud providers.",
"4.2.10": "When generating serving certificates, functionality could break in conjunction with hostname overrides which are required for certain cloud providers.",
"4.2.6": "System level configurations are required prior to provisioning the cluster in order for this argument to be set to true. ",
"5.1.5": "TODO",
"5.2.2": "Enabling Pod Security Policy can cause issues with many helm chart installations",
"5.2.3": "Enabling Pod Security Policy can cause issues with many helm chart installations",
"5.2.4": "Enabling Pod Security Policy can cause issues with many helm chart installations",
"5.2.5": "Enabling Pod Security Policy can cause issues with many helm chart installations",
"5.2.2": "Enabling Pod Security Policy can cause applications to unexpectedly fail. ",
"5.2.3": "Enabling Pod Security Policy can cause applications to unexpectedly fail. ",
"5.2.4": "Enabling Pod Security Policy can cause applications to unexpectedly fail. ",
"5.2.5": "Enabling Pod Security Policy can cause applications to unexpectedly fail. ",
"5.3.2": "Enabling Network Policies can cause lot of unintended network traffic disruptions",
"5.6.4": "A default namespace provides a flexible workspace to try out various deployments"
},
"notApplicableChecks": {
"1.1.1": "Cluster provisioned by RKE doesn't require or maintain a configuration file for kube-apiserver.\nAll configuration is passed in as arguments at container run time.",
"1.1.13": "RKE does not store the kubernetes default kubeconfig credentials file on the nodes.",
"1.1.14": "RKE does not store the kubernetes default kubeconfig credentials file on the nodes.",
"1.1.13": "Cluster provisioned by RKE does not store the kubernetes default kubeconfig credentials file on the nodes.",
"1.1.14": "Cluster provisioned by RKE does not store the kubernetes default kubeconfig credentials file on the nodes.",
"1.1.15": "Cluster provisioned by RKE doesn't require or maintain a configuration file for scheduler.\nAll configuration is passed in as arguments at container run time.",
"1.1.16": "Cluster provisioned by RKE doesn't require or maintain a configuration file for scheduler.\nAll configuration is passed in as arguments at container run time.",
"1.1.17": "Cluster provisioned by RKE doesn't require or maintain a configuration file for controller-manager.\nAll configuration is passed in as arguments at container run time.",
......@@ -4290,10 +4372,12 @@
"1.1.6": "Cluster provisioned by RKE doesn't require or maintain a configuration file for kube-apiserver.\nAll configuration is passed in as arguments at container run time.",
"1.1.7": "Cluster provisioned by RKE doesn't require or maintain a configuration file for kube-apiserver.\nAll configuration is passed in as arguments at container run time.",
"1.1.8": "Cluster provisioned by RKE doesn't require or maintain a configuration file for kube-apiserver.\nAll configuration is passed in as arguments at container run time.",
"4.1.1": "RKE doesn’t require or maintain a configuration file for the kubelet service.\nAll configuration is passed in as arguments at container run time.",
"1.3.6": "Cluster provisioned by RKE handles certificate rotation directly through RKE.",
"4.1.1": "Cluster provisioned by RKE doesn’t require or maintain a configuration file for the kubelet service.\nAll configuration is passed in as arguments at container run time.",
"4.1.10": "RKE doesn’t require or maintain a configuration file for the kubelet.\nAll configuration is passed in as arguments at container run time.",
"4.1.2": "RKE doesn’t require or maintain a configuration file for the kubelet service.\nAll configuration is passed in as arguments at container run time.",
"4.1.9": "RKE doesn’t require or maintain a configuration file for the kubelet.\nAll configuration is passed in as arguments at container run time."
"4.1.2": "Cluster provisioned by RKE doesn’t require or maintain a configuration file for the kubelet service.\nAll configuration is passed in as arguments at container run time.",
"4.1.9": "RKE doesn’t require or maintain a configuration file for the kubelet.\nAll configuration is passed in as arguments at container run time.",
"4.2.12": "Cluster provisioned by RKE handles certificate rotation directly through RKE."
}
}
},
......
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment