mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-25 20:53:33 +00:00
PodSecurity: update webhook manifest to use named port
This commit is contained in:
parent
f6456d098e
commit
9f92fb0d7e
@ -31,7 +31,11 @@ spec:
|
|||||||
image: k8s.gcr.io/sig-auth/pod-security-webhook:v1.23-beta.0
|
image: k8s.gcr.io/sig-auth/pod-security-webhook:v1.23-beta.0
|
||||||
terminationMessagePolicy: FallbackToLogsOnError
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
ports:
|
ports:
|
||||||
- containerPort: 8443
|
- name: webhook
|
||||||
|
# A port > 1024 avoids needing low port bind privileges.
|
||||||
|
# Using the same port as the kubelet is likely to already be permitted in apiserver -> node firewall rules.
|
||||||
|
# The pod has its own IP and doesn't run with hostNetwork, so there's no port conflict with the kubelet.
|
||||||
|
containerPort: 10250
|
||||||
args:
|
args:
|
||||||
[
|
[
|
||||||
"--config",
|
"--config",
|
||||||
@ -41,7 +45,7 @@ spec:
|
|||||||
"--tls-private-key-file",
|
"--tls-private-key-file",
|
||||||
"/etc/pki/tls.key",
|
"/etc/pki/tls.key",
|
||||||
"--secure-port",
|
"--secure-port",
|
||||||
"8443",
|
"10250",
|
||||||
]
|
]
|
||||||
resources:
|
resources:
|
||||||
requests:
|
requests:
|
||||||
|
@ -8,7 +8,7 @@ metadata:
|
|||||||
spec:
|
spec:
|
||||||
ports:
|
ports:
|
||||||
- port: 443
|
- port: 443
|
||||||
targetPort: 8443
|
targetPort: webhook
|
||||||
protocol: TCP
|
protocol: TCP
|
||||||
name: https
|
name: https
|
||||||
selector:
|
selector:
|
||||||
|
Loading…
Reference in New Issue
Block a user