- While creating a pod/deployment with
seccompProfile: Unconfined, why the pod's security context is matched against the
restricted-v2SCC given that
restricted-v2prohibits unconfined seccomp profiles?
- It's evident that the only
Seccompprofile allowed is
$ oc describe scc restricted-v2 | grep Seccomp
Allowed Seccomp Profiles: runtime/default
- Red Hat OpenShift Container Platform
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.