1234567891011121314151617181920212223242526272829303132333435363738394041 |
- runAsContext:
- - userName: root
- groupName: root
- gid: 0
- uid: 0
- description: Diskover runs as root user.
- - userName: root
- groupName: root
- gid: 0
- uid: 0
- description: Elastic Search runs as root user.
- capabilities:
- - name: CHOWN
- description: Diskover and Elastic Search are able to chown files.
- - name: FOWNER
- description: Diskover and Elastic Search are able to bypass permission checks for it's sub-processes.
- - name: SYS_CHROOT
- description: Diskover and Elastic Search are able to use chroot.
- - name: MKNOD
- description: Diskover and Elastic Search are able to create device nodes.
- - name: DAC_OVERRIDE
- description: Diskover and Elastic Search are able to bypass permission checks.
- - name: FSETID
- description: Diskover and Elastic Search are able to set file capabilities.
- - name: KILL
- description: Diskover and Elastic Search are able to kill processes.
- - name: SETGID
- description: Diskover and Elastic Search are able to set group ID for it's sub-processes.
- - name: SETUID
- description: Diskover and Elastic Search are able to set user ID for it's sub-processes.
- - name: SETPCAP
- description: Diskover and Elastic Search are able to set process capabilities.
- - name: NET_BIND_SERVICE
- description: Diskover and Elastic Search are able to bind to privileged ports.
- - name: SETFCAP
- description: Diskover and Elastic Search are able to set file capabilities.
- - name: NET_RAW
- description: Diskover and Elastic Search are able to use raw sockets.
- - name: AUDIT_WRITE
- description: Diskover and Elastic Search are able to write to audit log.
- hostMounts: []
|