PodSecurityPolicy:
privileged: false
allowPrivilegeEscalation: true
defaultAllowPrivilegeEscalation: false
allowedCapabilities:
- NET_ADMIN
defaultAddCapabilities: []
requiredDropCapabilities:
- ALL
runAsUser:
rule: 'MustRunAsNonRoot'
SecurityContect in deployment.yaml
privileged: false
allowPrivilegeEscalation: true
runAsUser: 1001
capabilities:
add:
- NET_ADMIN
TCPDUMP not permit operation inside constainer with nonrootuser. I think only rootuser container can be permission for tcpdump operation. Can anyone please let me know do we have any configuration in pod policy and security context to achieve the same in nonrootuser.