--- allowHostDirVolumePlugin: true allowHostIPC: true allowHostNetwork: true allowHostPID: true allowHostPorts: true allowPrivilegeEscalation: true allowPrivilegedContainer: false allowedCapabilities: null apiVersion: security.openshift.io/v1 defaultAddCapabilities: null fsGroup: type: MustRunAs groups: [] kind: SecurityContextConstraints metadata: annotations: include.release.openshift.io/ibm-cloud-managed: "true" include.release.openshift.io/self-managed-high-availability: "true" include.release.openshift.io/single-node-developer: "true" kubernetes.io/description: 'hostaccess allows access to all host namespaces but still requires pods to be run with a UID and SELinux context that are allocated to the namespace. WARNING: this SCC allows host access to namespaces, file systems, and PIDS. It should only be used by trusted pods. Grant with caution.' release.openshift.io/create-only: "true" creationTimestamp: "2025-10-11T10:24:18Z" generation: 1 managedFields: - apiVersion: security.openshift.io/v1 fieldsType: FieldsV1 fieldsV1: f:allowHostDirVolumePlugin: {} f:allowHostIPC: {} f:allowHostNetwork: {} f:allowHostPID: {} f:allowHostPorts: {} f:allowPrivilegeEscalation: {} f:allowPrivilegedContainer: {} f:allowedCapabilities: {} f:defaultAddCapabilities: {} f:fsGroup: .: {} f:type: {} f:groups: {} f:metadata: f:annotations: .: {} f:include.release.openshift.io/ibm-cloud-managed: {} f:include.release.openshift.io/self-managed-high-availability: {} f:include.release.openshift.io/single-node-developer: {} f:kubernetes.io/description: {} f:release.openshift.io/create-only: {} f:priority: {} f:readOnlyRootFilesystem: {} f:requiredDropCapabilities: {} f:runAsUser: .: {} f:type: {} f:seLinuxContext: .: {} f:type: {} f:supplementalGroups: .: {} f:type: {} f:users: {} f:volumes: {} manager: cluster-bootstrap operation: Update time: "2025-10-11T10:24:18Z" name: hostaccess resourceVersion: "339" uid: aefa0012-8cf8-4f56-a2fc-820c40838191 priority: null readOnlyRootFilesystem: false requiredDropCapabilities: - KILL - MKNOD - SETUID - SETGID runAsUser: type: MustRunAsRange seLinuxContext: type: MustRunAs supplementalGroups: type: RunAsAny users: [] volumes: - configMap - csi - downwardAPI - emptyDir - ephemeral - hostPath - persistentVolumeClaim - projected - secret