Skip to content

Commit

Permalink
Fix typos
Browse files Browse the repository at this point in the history
Signed-off-by: Derek Nola <[email protected]>
  • Loading branch information
dereknola committed Aug 6, 2024
1 parent 189c49f commit 147f70f
Show file tree
Hide file tree
Showing 14 changed files with 22 additions and 22 deletions.
4 changes: 2 additions & 2 deletions package/cfg/rke2-cis-1.23-hardened/policies.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -208,8 +208,8 @@ groups:
text: "Minimize the admission of containers with capabilities assigned (Manual)"
type: "manual"
remediation: |
Review the use of capabilites in applications running on your cluster. Where a namespace
contains applicaions which do not require any Linux capabities to operate consider adding
Review the use of capabilities in applications running on your cluster. Where a namespace
contains applications which do not require any Linux capabities to operate consider adding
a PSP which forbids the admission of containers which do not drop all capabilities.
scored: false

Expand Down
4 changes: 2 additions & 2 deletions package/cfg/rke2-cis-1.23-permissive/policies.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -152,8 +152,8 @@ groups:
text: "Minimize the admission of containers with capabilities assigned (Manual)"
type: "manual"
remediation: |
Review the use of capabilites in applications running on your cluster. Where a namespace
contains applicaions which do not require any Linux capabities to operate consider adding
Review the use of capabilities in applications running on your cluster. Where a namespace
contains applications which do not require any Linux capabities to operate consider adding
a PSP which forbids the admission of containers which do not drop all capabilities.
scored: false

Expand Down
2 changes: 1 addition & 1 deletion package/cfg/rke2-cis-1.24-hardened/master.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -584,7 +584,7 @@ groups:
set: true
remediation: |
By default, RKE2 sets the --enable-admission-plugins to NodeRestriction.
Check the RKE2 config file /etc/rancher/rke2/config.yaml, and esnure that you are not overriding the admission plugins.
Check the RKE2 config file /etc/rancher/rke2/config.yaml, and ensure that you are not overriding the admission plugins.
If you are, include NodeRestriction in the list.
kube-apiserver-arg:
- "enable-admission-plugins=...,NodeRestriction,..."
Expand Down
4 changes: 2 additions & 2 deletions package/cfg/rke2-cis-1.24-hardened/policies.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -208,8 +208,8 @@ groups:
text: "Minimize the admission of containers with capabilities assigned (Manual)"
type: "manual"
remediation: |
Review the use of capabilites in applications running on your cluster. Where a namespace
contains applicaions which do not require any Linux capabities to operate consider adding
Review the use of capabilities in applications running on your cluster. Where a namespace
contains applications which do not require any Linux capabities to operate consider adding
a PSP which forbids the admission of containers which do not drop all capabilities.
scored: false

Expand Down
2 changes: 1 addition & 1 deletion package/cfg/rke2-cis-1.24-permissive/master.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -592,7 +592,7 @@ groups:
set: true
remediation: |
By default, RKE2 sets the --enable-admission-plugins to NodeRestriction.
Check the RKE2 config file /etc/rancher/rke2/config.yaml, and esnure that you are not overriding the admission plugins.
Check the RKE2 config file /etc/rancher/rke2/config.yaml, and ensure that you are not overriding the admission plugins.
If you are, include NodeRestriction in the list.
kube-apiserver-arg:
- "enable-admission-plugins=...,NodeRestriction,..."
Expand Down
4 changes: 2 additions & 2 deletions package/cfg/rke2-cis-1.24-permissive/policies.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -152,8 +152,8 @@ groups:
text: "Minimize the admission of containers with capabilities assigned (Manual)"
type: "manual"
remediation: |
Review the use of capabilites in applications running on your cluster. Where a namespace
contains applicaions which do not require any Linux capabities to operate consider adding
Review the use of capabilities in applications running on your cluster. Where a namespace
contains applications which do not require any Linux capabities to operate consider adding
a PSP which forbids the admission of containers which do not drop all capabilities.
scored: false

Expand Down
2 changes: 1 addition & 1 deletion package/cfg/rke2-cis-1.7-hardened/master.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -574,7 +574,7 @@ groups:
set: true
remediation: |
By default, RKE2 sets the --enable-admission-plugins to NodeRestriction.
Check the RKE2 config file /etc/rancher/rke2/config.yaml, and esnure that you are not overriding the admission plugins.
Check the RKE2 config file /etc/rancher/rke2/config.yaml, and ensure that you are not overriding the admission plugins.
If you are, include NodeRestriction in the list.
kube-apiserver-arg:
- "enable-admission-plugins=...,NodeRestriction,..."
Expand Down
4 changes: 2 additions & 2 deletions package/cfg/rke2-cis-1.7-hardened/policies.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -187,8 +187,8 @@ groups:
text: "Minimize the admission of containers with capabilities assigned (Manual)"
type: "manual"
remediation: |
Review the use of capabilites in applications running on your cluster. Where a namespace
contains applicaions which do not require any Linux capabities to operate consider adding
Review the use of capabilities in applications running on your cluster. Where a namespace
contains applications which do not require any Linux capabities to operate consider adding
a PSP which forbids the admission of containers which do not drop all capabilities.
scored: false

Expand Down
2 changes: 1 addition & 1 deletion package/cfg/rke2-cis-1.7-permissive/master.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -574,7 +574,7 @@ groups:
set: true
remediation: |
By default, RKE2 sets the --enable-admission-plugins to NodeRestriction.
Check the RKE2 config file /etc/rancher/rke2/config.yaml, and esnure that you are not overriding the admission plugins.
Check the RKE2 config file /etc/rancher/rke2/config.yaml, and ensure that you are not overriding the admission plugins.
If you are, include NodeRestriction in the list.
kube-apiserver-arg:
- "enable-admission-plugins=...,NodeRestriction,..."
Expand Down
4 changes: 2 additions & 2 deletions package/cfg/rke2-cis-1.7-permissive/policies.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -187,8 +187,8 @@ groups:
text: "Minimize the admission of containers with capabilities assigned (Manual)"
type: "manual"
remediation: |
Review the use of capabilites in applications running on your cluster. Where a namespace
contains applicaions which do not require any Linux capabities to operate consider adding
Review the use of capabilities in applications running on your cluster. Where a namespace
contains applications which do not require any Linux capabities to operate consider adding
a PSP which forbids the admission of containers which do not drop all capabilities.
scored: false

Expand Down
2 changes: 1 addition & 1 deletion package/cfg/rke2-cis-1.8-hardened/master.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -574,7 +574,7 @@ groups:
set: true
remediation: |
By default, RKE2 sets the --enable-admission-plugins to NodeRestriction.
Check the RKE2 config file /etc/rancher/rke2/config.yaml, and esnure that you are not overriding the admission plugins.
Check the RKE2 config file /etc/rancher/rke2/config.yaml, and ensure that you are not overriding the admission plugins.
If you are, include NodeRestriction in the list.
kube-apiserver-arg:
- "enable-admission-plugins=...,NodeRestriction,..."
Expand Down
4 changes: 2 additions & 2 deletions package/cfg/rke2-cis-1.8-hardened/policies.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -187,8 +187,8 @@ groups:
text: "Minimize the admission of containers with capabilities assigned (Manual)"
type: "manual"
remediation: |
Review the use of capabilites in applications running on your cluster. Where a namespace
contains applicaions which do not require any Linux capabities to operate consider adding
Review the use of capabilities in applications running on your cluster. Where a namespace
contains applications which do not require any Linux capabities to operate consider adding
a PSP which forbids the admission of containers which do not drop all capabilities.
scored: false

Expand Down
2 changes: 1 addition & 1 deletion package/cfg/rke2-cis-1.8-permissive/master.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -575,7 +575,7 @@ groups:
set: true
remediation: |
By default, RKE2 sets the --enable-admission-plugins to NodeRestriction.
Check the RKE2 config file /etc/rancher/rke2/config.yaml, and esnure that you are not overriding the admission plugins.
Check the RKE2 config file /etc/rancher/rke2/config.yaml, and ensure that you are not overriding the admission plugins.
If you are, include NodeRestriction in the list.
kube-apiserver-arg:
- "enable-admission-plugins=...,NodeRestriction,..."
Expand Down
4 changes: 2 additions & 2 deletions package/cfg/rke2-cis-1.8-permissive/policies.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -187,8 +187,8 @@ groups:
text: "Minimize the admission of containers with capabilities assigned (Manual)"
type: "manual"
remediation: |
Review the use of capabilites in applications running on your cluster. Where a namespace
contains applicaions which do not require any Linux capabities to operate consider adding
Review the use of capabilities in applications running on your cluster. Where a namespace
contains applications which do not require any Linux capabities to operate consider adding
a PSP which forbids the admission of containers which do not drop all capabilities.
scored: false

Expand Down

0 comments on commit 147f70f

Please sign in to comment.