docs/assets/examples/json-report-sample.json

{
  "checks": {
    "ingressHealth": {
      "Items": [],
      "Total": 0
    },
    "missingResourceLimits": {
      "Items": [
        {
          "Namespace": "aks-istio-system",
          "Workload": "istiod-asm-1-23",
          "Kind": "Deployment",
          "Container": "discovery",
          "MissingRequests": "",
          "MissingLimits": "CPU, Memory"
        },
        {
          "Namespace": "app-routing-system",
          "Workload": "nginx",
          "Kind": "Deployment",
          "Container": "controller",
          "MissingRequests": "",
          "MissingLimits": "CPU, Memory"
        },
        {
          "Namespace": "argo-rollouts",
          "Workload": "simple-deployment",
          "Kind": "Deployment",
          "Container": "webserver-simple",
          "MissingRequests": "CPU, Memory",
          "MissingLimits": "CPU, Memory"
        },
        {
          "Namespace": "argo-workflows",
          "Workload": "simple-deployment",
          "Kind": "Deployment",
          "Container": "webserver-simple",
          "MissingRequests": "CPU, Memory",
          "MissingLimits": "CPU, Memory"
        },
        {
          "Namespace": "argocd",
          "Workload": "argocd-applicationset-controller",
          "Kind": "Deployment",
          "Container": "argocd-applicationset-controller",
          "MissingRequests": "CPU, Memory",
          "MissingLimits": "CPU, Memory"
        },
        {
          "Namespace": "argocd",
          "Workload": "argocd-dex-server",
          "Kind": "Deployment",
          "Container": "dex",
          "MissingRequests": "CPU, Memory",
          "MissingLimits": "CPU, Memory"
        },
        {
          "Namespace": "argocd",
          "Workload": "argocd-dex-server",
          "Kind": "Deployment",
          "Container": "copyutil",
          "MissingRequests": "CPU, Memory",
          "MissingLimits": "CPU, Memory"
        },
        {
          "Namespace": "argocd",
          "Workload": "argocd-notifications-controller",
          "Kind": "Deployment",
          "Container": "argocd-notifications-controller",
          "MissingRequests": "CPU, Memory",
          "MissingLimits": "CPU, Memory"
        },
        {
          "Namespace": "argocd",
          "Workload": "argocd-redis-ha-haproxy",
          "Kind": "Deployment",
          "Container": "haproxy",
          "MissingRequests": "CPU, Memory",
          "MissingLimits": "CPU, Memory"
        },
        {
          "Namespace": "argocd",
          "Workload": "argocd-redis-ha-haproxy",
          "Kind": "Deployment",
          "Container": "secret-init",
          "MissingRequests": "CPU, Memory",
          "MissingLimits": "CPU, Memory"
        },
        {
          "Namespace": "argocd",
          "Workload": "argocd-redis-ha-haproxy",
          "Kind": "Deployment",
          "Container": "config-init",
          "MissingRequests": "CPU, Memory",
          "MissingLimits": "CPU, Memory"
        },
        {
          "Namespace": "argocd",
          "Workload": "argocd-repo-server",
          "Kind": "Deployment",
          "Container": "argocd-repo-server",
          "MissingRequests": "CPU, Memory",
          "MissingLimits": "CPU, Memory"
        },
        {
          "Namespace": "argocd",
          "Workload": "argocd-repo-server",
          "Kind": "Deployment",
          "Container": "copyutil",
          "MissingRequests": "CPU, Memory",
          "MissingLimits": "CPU, Memory"
        },
        {
          "Namespace": "argocd",
          "Workload": "argocd-server",
          "Kind": "Deployment",
          "Container": "argocd-server",
          "MissingRequests": "CPU, Memory",
          "MissingLimits": "CPU, Memory"
        },
        {
          "Namespace": "cert-manager",
          "Workload": "simple-deployment",
          "Kind": "Deployment",
          "Container": "webserver-simple",
          "MissingRequests": "CPU, Memory",
          "MissingLimits": "CPU, Memory"
        },
        {
          "Namespace": "grafana",
          "Workload": "simple-deployment",
          "Kind": "Deployment",
          "Container": "webserver-simple",
          "MissingRequests": "CPU, Memory",
          "MissingLimits": "CPU, Memory"
        },
        {
          "Namespace": "kiali-operator",
          "Workload": "kiali-operator",
          "Kind": "Deployment",
          "Container": "operator",
          "MissingRequests": "",
          "MissingLimits": "CPU, Memory"
        },
        {
          "Namespace": "kubeview",
          "Workload": "simple-deployment",
          "Kind": "Deployment",
          "Container": "webserver-simple",
          "MissingRequests": "CPU, Memory",
          "MissingLimits": "CPU, Memory"
        },
        {
          "Namespace": "linkerd",
          "Workload": "simple-deployment",
          "Kind": "Deployment",
          "Container": "webserver-simple",
          "MissingRequests": "CPU, Memory",
          "MissingLimits": "CPU, Memory"
        },
        {
          "Namespace": "nginx",
          "Workload": "simple-deployment",
          "Kind": "Deployment",
          "Container": "webserver-simple",
          "MissingRequests": "CPU, Memory",
          "MissingLimits": "CPU, Memory"
        },
        {
          "Namespace": "prometheus",
          "Workload": "simple-deployment",
          "Kind": "Deployment",
          "Container": "webserver-simple",
          "MissingRequests": "CPU, Memory",
          "MissingLimits": "CPU, Memory"
        },
        {
          "Namespace": "sealed-secrets",
          "Workload": "simple-deployment",
          "Kind": "Deployment",
          "Container": "webserver-simple",
          "MissingRequests": "CPU, Memory",
          "MissingLimits": "CPU, Memory"
        },
        {
          "Namespace": "test",
          "Workload": "simple-deployment",
          "Kind": "Deployment",
          "Container": "webserver-simple",
          "MissingRequests": "CPU, Memory",
          "MissingLimits": "CPU, Memory"
        },
        {
          "Namespace": "argocd",
          "Workload": "argocd-application-controller",
          "Kind": "StatefulSet",
          "Container": "argocd-application-controller",
          "MissingRequests": "CPU, Memory",
          "MissingLimits": "CPU, Memory"
        },
        {
          "Namespace": "argocd",
          "Workload": "argocd-redis-ha-server",
          "Kind": "StatefulSet",
          "Container": "redis",
          "MissingRequests": "CPU, Memory",
          "MissingLimits": "CPU, Memory"
        },
        {
          "Namespace": "argocd",
          "Workload": "argocd-redis-ha-server",
          "Kind": "StatefulSet",
          "Container": "sentinel",
          "MissingRequests": "CPU, Memory",
          "MissingLimits": "CPU, Memory"
        },
        {
          "Namespace": "argocd",
          "Workload": "argocd-redis-ha-server",
          "Kind": "StatefulSet",
          "Container": "split-brain-fix",
          "MissingRequests": "CPU, Memory",
          "MissingLimits": "CPU, Memory"
        },
        {
          "Namespace": "argocd",
          "Workload": "argocd-redis-ha-server",
          "Kind": "StatefulSet",
          "Container": "config-init",
          "MissingRequests": "CPU, Memory",
          "MissingLimits": "CPU, Memory"
        },
        {
          "Namespace": "kube-system",
          "Workload": "ama-metrics-win-node",
          "Kind": "DaemonSet",
          "Container": "prometheus-collector",
          "MissingRequests": "CPU, Memory",
          "MissingLimits": ""
        },
        {
          "Namespace": "kube-system",
          "Workload": "azure-npm",
          "Kind": "DaemonSet",
          "Container": "block-wireserver",
          "MissingRequests": "CPU, Memory",
          "MissingLimits": "CPU, Memory"
        },
        {
          "Namespace": "kube-system",
          "Workload": "kube-proxy",
          "Kind": "DaemonSet",
          "Container": "kube-proxy",
          "MissingRequests": "",
          "MissingLimits": "CPU, Memory"
        },
        {
          "Namespace": "kube-system",
          "Workload": "kube-proxy",
          "Kind": "DaemonSet",
          "Container": "kube-proxy-bootstrap",
          "MissingRequests": "",
          "MissingLimits": "CPU, Memory"
        },
        {
          "Namespace": "kube-system",
          "Workload": "microsoft-defender-publisher-ds",
          "Kind": "DaemonSet",
          "Container": "old-file-cleaner",
          "MissingRequests": "CPU, Memory",
          "MissingLimits": "CPU, Memory"
        },
        {
          "Namespace": "kube-system",
          "Workload": "retina-agent",
          "Kind": "DaemonSet",
          "Container": "retina-agent-init",
          "MissingRequests": "CPU, Memory",
          "MissingLimits": "CPU, Memory"
        },
        {
          "Namespace": "kube-system",
          "Workload": "windows-kube-proxy-initializer",
          "Kind": "DaemonSet",
          "Container": "pause",
          "MissingRequests": "CPU, Memory",
          "MissingLimits": "CPU, Memory"
        }
      ],
      "Total": 35
    },
    "orphanedSecrets": {
      "Items": [
        {
          "Namespace": "aks-istio-system",
          "Type": "🔑 Secret",
          "Name": "istio-ca-secret"
        },
        {
          "Namespace": "argocd",
          "Type": "🔑 Secret",
          "Name": "argocd-initial-admin-secret"
        },
        {
          "Namespace": "argocd",
          "Type": "🔑 Secret",
          "Name": "argocd-notifications-secret"
        },
        {
          "Namespace": "argocd",
          "Type": "🔑 Secret",
          "Name": "argocd-secret"
        },
        {
          "Namespace": "argocd",
          "Type": "🔑 Secret",
          "Name": "repo-1114886772"
        },
        {
          "Namespace": "argocd",
          "Type": "🔑 Secret",
          "Name": "repo-1952242182"
        },
        {
          "Namespace": "kube-system",
          "Type": "🔑 Secret",
          "Name": "aad-msi-auth-token"
        },
        {
          "Namespace": "kube-system",
          "Type": "🔑 Secret",
          "Name": "azure-policy-webhook-cert"
        },
        {
          "Namespace": "kube-system",
          "Type": "🔑 Secret",
          "Name": "extensions-aad-msi-token"
        },
        {
          "Namespace": "kube-system",
          "Type": "🔑 Secret",
          "Name": "omsagent-aad-msi-token"
        }
      ],
      "Total": 10
    },
    "rbacOverexposure": {
      "Items": [
        {
          "Namespace": "🌍 Cluster-Wide",
          "Binding": "aks-cluster-admin-binding",
          "Subject": "User/clusterAdmin",
          "Role": "cluster-admin",
          "Scope": "ClusterRoleBinding",
          "Risk": "❗ cluster-admin (built-in role)",
          "Severity": "Critical",
          "Recommendation": "Replace with a least-privilege ClusterRole. This is a built-in Kubernetes role; proceed with caution when modifying."
        },
        {
          "Namespace": "🌍 Cluster-Wide",
          "Binding": "aks-cluster-admin-binding",
          "Subject": "User/clusterUser",
          "Role": "cluster-admin",
          "Scope": "ClusterRoleBinding",
          "Risk": "❗ cluster-admin (built-in role)",
          "Severity": "Critical",
          "Recommendation": "Replace with a least-privilege ClusterRole. This is a built-in Kubernetes role; proceed with caution when modifying."
        },
        {
          "Namespace": "🌍 Cluster-Wide",
          "Binding": "aks-cluster-admin-binding-aad",
          "Subject": "Group/e591c663-c79c-47a4-94b8-f646b8647046",
          "Role": "cluster-admin",
          "Scope": "ClusterRoleBinding",
          "Risk": "❗ cluster-admin (built-in role)",
          "Severity": "Critical",
          "Recommendation": "Replace with a least-privilege ClusterRole. This is a built-in Kubernetes role; proceed with caution when modifying."
        },
        {
          "Namespace": "🌍 Cluster-Wide",
          "Binding": "aks-secretprovidersyncing-rolebinding",
          "Subject": "ServiceAccount/aks-secrets-store-csi-driver",
          "Role": "aks-secretprovidersyncing-role",
          "Scope": "ClusterRoleBinding",
          "Risk": "⚠️ sensitive resource access",
          "Severity": "High",
          "Recommendation": "Restrict access to sensitive resources like secrets or pods/exec."
        },
        {
          "Namespace": "🌍 Cluster-Wide",
          "Binding": "aks-service-rolebinding",
          "Subject": "User/aks-support",
          "Role": "aks-service",
          "Scope": "ClusterRoleBinding",
          "Risk": "⚠️ sensitive resource access",
          "Severity": "High",
          "Recommendation": "Restrict access to sensitive resources like secrets or pods/exec."
        },
        {
          "Namespace": "🌍 Cluster-Wide",
          "Binding": "argocd-application-controller",
          "Subject": "ServiceAccount/argocd-application-controller",
          "Role": "argocd-application-controller",
          "Scope": "ClusterRoleBinding",
          "Risk": "⚠️ wildcard access",
          "Severity": "High",
          "Recommendation": "Restrict the ClusterRole to specific verbs, resources, and apiGroups."
        },
        {
          "Namespace": "🌍 Cluster-Wide",
          "Binding": "cluster-admin",
          "Subject": "Group/system:masters",
          "Role": "cluster-admin",
          "Scope": "ClusterRoleBinding",
          "Risk": "❗ cluster-admin (built-in role)",
          "Severity": "Critical",
          "Recommendation": "Replace with a least-privilege ClusterRole. This is a built-in Kubernetes role; proceed with caution when modifying."
        },
        {
          "Namespace": "🌍 Cluster-Wide",
          "Binding": "extension-operator",
          "Subject": "ServiceAccount/extension-operatorsa",
          "Role": "cluster-admin",
          "Scope": "ClusterRoleBinding",
          "Risk": "❗ cluster-admin (built-in role)",
          "Severity": "Critical",
          "Recommendation": "Replace with a least-privilege ClusterRole. This is a built-in Kubernetes role; proceed with caution when modifying."
        },
        {
          "Namespace": "🌍 Cluster-Wide",
          "Binding": "kiali-operator",
          "Subject": "ServiceAccount/kiali-operator",
          "Role": "kiali-operator",
          "Scope": "ClusterRoleBinding",
          "Risk": "⚠️ sensitive resource access",
          "Severity": "High",
          "Recommendation": "Restrict access to sensitive resources like secrets or pods/exec."
        },
        {
          "Namespace": "🌍 Cluster-Wide",
          "Binding": "system:controller:clusterrole-aggregation-controller",
          "Subject": "ServiceAccount/clusterrole-aggregation-controller",
          "Role": "system:controller:clusterrole-aggregation-controller",
          "Scope": "ClusterRoleBinding",
          "Risk": "⚠️ sensitive resource access (built-in role)",
          "Severity": "High",
          "Recommendation": "Restrict access to sensitive resources like secrets or pods/exec. This is a built-in Kubernetes role; proceed with caution when modifying."
        },
        {
          "Namespace": "🌍 Cluster-Wide",
          "Binding": "system:controller:legacy-service-account-token-cleaner",
          "Subject": "ServiceAccount/legacy-service-account-token-cleaner",
          "Role": "system:controller:legacy-service-account-token-cleaner",
          "Scope": "ClusterRoleBinding",
          "Risk": "⚠️ sensitive resource access (built-in role)",
          "Severity": "High",
          "Recommendation": "Restrict access to sensitive resources like secrets or pods/exec. This is a built-in Kubernetes role; proceed with caution when modifying."
        },
        {
          "Namespace": "🌍 Cluster-Wide",
          "Binding": "system:kube-controller-manager",
          "Subject": "User/system:kube-controller-manager",
          "Role": "system:kube-controller-manager",
          "Scope": "ClusterRoleBinding",
          "Risk": "⚠️ sensitive resource access (built-in role)",
          "Severity": "High",
          "Recommendation": "Restrict access to sensitive resources like secrets or pods/exec. This is a built-in Kubernetes role; proceed with caution when modifying."
        },
        {
          "Namespace": "🌍 Cluster-Wide",
          "Binding": "system:kube-scheduler",
          "Subject": "User/system:kube-scheduler",
          "Role": "system:kube-scheduler",
          "Scope": "ClusterRoleBinding",
          "Risk": "⚠️ sensitive resource access (built-in role)",
          "Severity": "High",
          "Recommendation": "Restrict access to sensitive resources like secrets or pods/exec. This is a built-in Kubernetes role; proceed with caution when modifying."
        },
        {
          "Namespace": "🌍 Cluster-Wide",
          "Binding": "system:persistent-volume-binding",
          "Subject": "ServiceAccount/persistent-volume-binder",
          "Role": "system:persistent-volume-secret-operator",
          "Scope": "ClusterRoleBinding",
          "Risk": "⚠️ sensitive resource access (built-in role)",
          "Severity": "High",
          "Recommendation": "Restrict access to sensitive resources like secrets or pods/exec. This is a built-in Kubernetes role; proceed with caution when modifying."
        },
        {
          "Namespace": "aks-istio-system",
          "Binding": "istiod-asm-1-23",
          "Subject": "ServiceAccount/istiod-asm-1-23",
          "Role": "istiod-asm-1-23",
          "Scope": "RoleBinding",
          "Risk": "⚠️ sensitive resource access",
          "Severity": "High",
          "Recommendation": "Restrict access to sensitive resources like secrets or pods/exec."
        },
        {
          "Namespace": "argocd",
          "Binding": "argocd-redis-ha-haproxy",
          "Subject": "ServiceAccount/argocd-redis-ha-haproxy",
          "Role": "argocd-redis-ha-haproxy",
          "Scope": "RoleBinding",
          "Risk": "⚠️ sensitive resource access",
          "Severity": "High",
          "Recommendation": "Restrict access to sensitive resources like secrets or pods/exec."
        },
        {
          "Namespace": "argocd",
          "Binding": "argocd-server",
          "Subject": "ServiceAccount/argocd-server",
          "Role": "argocd-server",
          "Scope": "RoleBinding",
          "Risk": "⚠️ sensitive resource access",
          "Severity": "High",
          "Recommendation": "Restrict access to sensitive resources like secrets or pods/exec."
        },
        {
          "Namespace": "gatekeeper-system",
          "Binding": "gatekeeper-manager-rolebinding",
          "Subject": "ServiceAccount/gatekeeper-admin",
          "Role": "gatekeeper-manager-role",
          "Scope": "RoleBinding",
          "Risk": "⚠️ sensitive resource access",
          "Severity": "High",
          "Recommendation": "Restrict access to sensitive resources like secrets or pods/exec."
        },
        {
          "Namespace": "kube-system",
          "Binding": "azure-policy-webhook-rolebinding",
          "Subject": "ServiceAccount/azure-policy-webhook-account",
          "Role": "azure-policy-webhook-role",
          "Scope": "RoleBinding",
          "Risk": "⚠️ sensitive resource access",
          "Severity": "High",
          "Recommendation": "Restrict access to sensitive resources like secrets or pods/exec."
        },
        {
          "Namespace": "kube-system",
          "Binding": "keda-operator-certs",
          "Subject": "ServiceAccount/keda-operator",
          "Role": "keda-operator-certs",
          "Scope": "RoleBinding",
          "Risk": "⚠️ sensitive resource access",
          "Severity": "High",
          "Recommendation": "Restrict access to sensitive resources like secrets or pods/exec."
        },
        {
          "Namespace": "kube-system",
          "Binding": "system:controller:token-cleaner",
          "Subject": "ServiceAccount/token-cleaner",
          "Role": "system:controller:token-cleaner",
          "Scope": "RoleBinding",
          "Risk": "⚠️ sensitive resource access",
          "Severity": "High",
          "Recommendation": "Restrict access to sensitive resources like secrets or pods/exec."
        }
      ],
      "Total": 21
    },
    "emptyNamespace": {
      "TotalEmptyNamespaces": 14,
      "Namespaces": [
        "1",
        "10",
        "2",
        "3",
        "4",
        "5",
        "6",
        "7",
        "8",
        "9",
        "aks-istio-egress",
        "default",
        "kube-node-lease",
        "kube-public"
      ]
    },
    "resourceQuotas": {
      "Items": [
        {
          "Namespace": "1",
          "Issue": "❌ No ResourceQuota defined"
        },
        {
          "Namespace": "10",
          "Issue": "❌ No ResourceQuota defined"
        },
        {
          "Namespace": "2",
          "Issue": "❌ No ResourceQuota defined"
        },
        {
          "Namespace": "3",
          "Issue": "❌ No ResourceQuota defined"
        },
        {
          "Namespace": "4",
          "Issue": "❌ No ResourceQuota defined"
        },
        {
          "Namespace": "5",
          "Issue": "❌ No ResourceQuota defined"
        },
        {
          "Namespace": "6",
          "Issue": "❌ No ResourceQuota defined"
        },
        {
          "Namespace": "7",
          "Issue": "❌ No ResourceQuota defined"
        },
        {
          "Namespace": "8",
          "Issue": "❌ No ResourceQuota defined"
        },
        {
          "Namespace": "9",
          "Issue": "❌ No ResourceQuota defined"
        },
        {
          "Namespace": "aks-istio-egress",
          "Issue": "❌ No ResourceQuota defined"
        },
        {
          "Namespace": "aks-istio-ingress",
          "Issue": "❌ No ResourceQuota defined"
        },
        {
          "Namespace": "aks-istio-system",
          "Issue": "❌ No ResourceQuota defined"
        },
        {
          "Namespace": "app-routing-system",
          "Issue": "❌ No ResourceQuota defined"
        },
        {
          "Namespace": "argo-rollouts",
          "Issue": "❌ No ResourceQuota defined"
        },
        {
          "Namespace": "argo-workflows",
          "Issue": "❌ No ResourceQuota defined"
        },
        {
          "Namespace": "argocd",
          "Issue": "❌ No ResourceQuota defined"
        },
        {
          "Namespace": "cert-manager",
          "Issue": "❌ No ResourceQuota defined"
        },
        {
          "Namespace": "default",
          "Issue": "❌ No ResourceQuota defined"
        },
        {
          "Namespace": "gatekeeper-system",
          "Issue": "❌ No ResourceQuota defined"
        },
        {
          "Namespace": "grafana",
          "Issue": "❌ No ResourceQuota defined"
        },
        {
          "Namespace": "kiali-operator",
          "Issue": "❌ No ResourceQuota defined"
        },
        {
          "Namespace": "kube-node-lease",
          "Issue": "❌ No ResourceQuota defined"
        },
        {
          "Namespace": "kube-public",
          "Issue": "❌ No ResourceQuota defined"
        },
        {
          "Namespace": "kube-system",
          "Issue": "❌ No ResourceQuota defined"
        },
        {
          "Namespace": "kubeview",
          "Issue": "❌ No ResourceQuota defined"
        },
        {
          "Namespace": "linkerd",
          "Issue": "❌ No ResourceQuota defined"
        },
        {
          "Namespace": "nginx",
          "Issue": "❌ No ResourceQuota defined"
        },
        {
          "Namespace": "pets",
          "Issue": "❌ No ResourceQuota defined"
        },
        {
          "Namespace": "prometheus",
          "Issue": "❌ No ResourceQuota defined"
        },
        {
          "Namespace": "sealed-secrets",
          "Issue": "❌ No ResourceQuota defined"
        },
        {
          "Namespace": "test",
          "Issue": "❌ No ResourceQuota defined"
        }
      ],
      "Total": 32
    },
    "leftoverDebug": {
      "Items": [],
      "Total": 0
    },
    "hostPidNet": {
      "Items": [
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-provider-azure-5wpww",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        },
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-provider-azure-74vvm",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        },
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-provider-azure-c6x7x",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        },
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-provider-azure-dhr9b",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        },
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-provider-azure-tvsv4",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        },
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-provider-azure-wxfc8",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        },
        {
          "Namespace": "kube-system",
          "Pod": "azure-ip-masq-agent-7lxpz",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        },
        {
          "Namespace": "kube-system",
          "Pod": "azure-ip-masq-agent-c6xzh",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        },
        {
          "Namespace": "kube-system",
          "Pod": "azure-ip-masq-agent-k4nc9",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        },
        {
          "Namespace": "kube-system",
          "Pod": "azure-ip-masq-agent-v7qfj",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        },
        {
          "Namespace": "kube-system",
          "Pod": "azure-ip-masq-agent-x4zch",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        },
        {
          "Namespace": "kube-system",
          "Pod": "azure-ip-masq-agent-z8vqr",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        },
        {
          "Namespace": "kube-system",
          "Pod": "azure-npm-559xn",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        },
        {
          "Namespace": "kube-system",
          "Pod": "azure-npm-7sp9m",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        },
        {
          "Namespace": "kube-system",
          "Pod": "azure-npm-chwl2",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        },
        {
          "Namespace": "kube-system",
          "Pod": "azure-npm-g5hx8",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        },
        {
          "Namespace": "kube-system",
          "Pod": "azure-npm-x6g85",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        },
        {
          "Namespace": "kube-system",
          "Pod": "azure-npm-xjh28",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        },
        {
          "Namespace": "kube-system",
          "Pod": "cloud-node-manager-7r45z",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        },
        {
          "Namespace": "kube-system",
          "Pod": "cloud-node-manager-lstsj",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        },
        {
          "Namespace": "kube-system",
          "Pod": "cloud-node-manager-mwl6j",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        },
        {
          "Namespace": "kube-system",
          "Pod": "cloud-node-manager-p7rf6",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        },
        {
          "Namespace": "kube-system",
          "Pod": "cloud-node-manager-swp7f",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        },
        {
          "Namespace": "kube-system",
          "Pod": "cloud-node-manager-vnbh9",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        },
        {
          "Namespace": "kube-system",
          "Pod": "kube-proxy-22hgl",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        },
        {
          "Namespace": "kube-system",
          "Pod": "kube-proxy-8dlr6",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        },
        {
          "Namespace": "kube-system",
          "Pod": "kube-proxy-fh5fr",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        },
        {
          "Namespace": "kube-system",
          "Pod": "kube-proxy-gb78q",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        },
        {
          "Namespace": "kube-system",
          "Pod": "kube-proxy-mb2c4",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        },
        {
          "Namespace": "kube-system",
          "Pod": "kube-proxy-nq2sj",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        },
        {
          "Namespace": "kube-system",
          "Pod": "retina-agent-62scz",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        },
        {
          "Namespace": "kube-system",
          "Pod": "retina-agent-ds69z",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        },
        {
          "Namespace": "kube-system",
          "Pod": "retina-agent-h5wrd",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        },
        {
          "Namespace": "kube-system",
          "Pod": "retina-agent-p74qf",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        },
        {
          "Namespace": "kube-system",
          "Pod": "retina-agent-r2bvv",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        },
        {
          "Namespace": "kube-system",
          "Pod": "retina-agent-xcvmn",
          "hostPID": "✅ false",
          "hostNetwork": "❌ true"
        }
      ],
      "Total": 36
    },
    "orphanedConfigMaps": {
      "Items": [
        {
          "Namespace": "aks-istio-system",
          "Type": "📜 ConfigMap",
          "Name": "istio-asm-1-23"
        },
        {
          "Namespace": "aks-istio-system",
          "Type": "📜 ConfigMap",
          "Name": "istio-gateway-status-leader"
        },
        {
          "Namespace": "aks-istio-system",
          "Type": "📜 ConfigMap",
          "Name": "istio-leader"
        },
        {
          "Namespace": "aks-istio-system",
          "Type": "📜 ConfigMap",
          "Name": "istio-namespace-controller-election"
        },
        {
          "Namespace": "aks-istio-system",
          "Type": "📜 ConfigMap",
          "Name": "istio-sidecar-injector-asm-1-23"
        },
        {
          "Namespace": "app-routing-system",
          "Type": "📜 ConfigMap",
          "Name": "nginx"
        },
        {
          "Namespace": "argocd",
          "Type": "📜 ConfigMap",
          "Name": "argocd-notifications-cm"
        },
        {
          "Namespace": "argocd",
          "Type": "📜 ConfigMap",
          "Name": "argocd-rbac-cm"
        },
        {
          "Namespace": "kube-system",
          "Type": "📜 ConfigMap",
          "Name": "azure-ip-masq-agent-config-reconciled"
        },
        {
          "Namespace": "kube-system",
          "Type": "📜 ConfigMap",
          "Name": "cluster-autoscaler-status"
        },
        {
          "Namespace": "kube-system",
          "Type": "📜 ConfigMap",
          "Name": "container-azm-ms-aks-k8scluster"
        },
        {
          "Namespace": "kube-system",
          "Type": "📜 ConfigMap",
          "Name": "coredns-autoscaler"
        },
        {
          "Namespace": "kube-system",
          "Type": "📜 ConfigMap",
          "Name": "extension-apiserver-authentication"
        },
        {
          "Namespace": "kube-system",
          "Type": "📜 ConfigMap",
          "Name": "extension-immutable-values"
        },
        {
          "Namespace": "kube-system",
          "Type": "📜 ConfigMap",
          "Name": "extensioncontrollerleaderid-lock"
        },
        {
          "Namespace": "kube-system",
          "Type": "📜 ConfigMap",
          "Name": "konnectivity-agent-autoscaler"
        },
        {
          "Namespace": "kube-system",
          "Type": "📜 ConfigMap",
          "Name": "kube-apiserver-legacy-service-account-token-tracking"
        },
        {
          "Namespace": "kube-system",
          "Type": "📜 ConfigMap",
          "Name": "overlay-upgrade-data"
        },
        {
          "Namespace": "kube-system",
          "Type": "📜 ConfigMap",
          "Name": "retina-config-win"
        }
      ],
      "Total": 19
    },
    "podsRoot": {
      "Items": [
        {
          "Namespace": "aks-istio-system",
          "Pod": "istiod-asm-1-23-7744d5fbf4-2q886",
          "Container": "discovery",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "aks-istio-system",
          "Pod": "istiod-asm-1-23-7744d5fbf4-kffzl",
          "Container": "discovery",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "argo-rollouts",
          "Pod": "simple-deployment-74fd649f8d-6nsqn",
          "Container": "webserver-simple",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "argo-workflows",
          "Pod": "simple-deployment-74fd649f8d-xh6fc",
          "Container": "webserver-simple",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "argocd",
          "Pod": "argocd-application-controller-0",
          "Container": "argocd-application-controller",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "argocd",
          "Pod": "argocd-applicationset-controller-6fdf84dbb6-dxmmk",
          "Container": "argocd-applicationset-controller",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "argocd",
          "Pod": "argocd-dex-server-556c76889-kspcg",
          "Container": "dex",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "argocd",
          "Pod": "argocd-notifications-controller-6ff6bf8dd6-2jmv8",
          "Container": "argocd-notifications-controller",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "argocd",
          "Pod": "argocd-repo-server-8568fc89b5-8r5mv",
          "Container": "argocd-repo-server",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "argocd",
          "Pod": "argocd-repo-server-8568fc89b5-q2tbb",
          "Container": "argocd-repo-server",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "argocd",
          "Pod": "argocd-server-5df7b9f58d-7s5qh",
          "Container": "argocd-server",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "argocd",
          "Pod": "argocd-server-5df7b9f58d-rrxzz",
          "Container": "argocd-server",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "cert-manager",
          "Pod": "simple-deployment-74fd649f8d-ps8ll",
          "Container": "webserver-simple",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "grafana",
          "Pod": "simple-deployment-74fd649f8d-f52jv",
          "Container": "webserver-simple",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kiali-operator",
          "Pod": "kiali-5b88cfb6f8-9wxkc",
          "Container": "kiali",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kiali-operator",
          "Pod": "kiali-operator-696bd54db-cv6fc",
          "Container": "operator",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-csi-driver-7ghbq",
          "Container": "node-driver-registrar",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-csi-driver-7ghbq",
          "Container": "secrets-store",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-csi-driver-7ghbq",
          "Container": "liveness-probe",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-csi-driver-dg79g",
          "Container": "node-driver-registrar",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-csi-driver-dg79g",
          "Container": "secrets-store",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-csi-driver-dg79g",
          "Container": "liveness-probe",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-csi-driver-h8s4k",
          "Container": "node-driver-registrar",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-csi-driver-h8s4k",
          "Container": "secrets-store",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-csi-driver-h8s4k",
          "Container": "liveness-probe",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-csi-driver-hpc6x",
          "Container": "node-driver-registrar",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-csi-driver-hpc6x",
          "Container": "secrets-store",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-csi-driver-hpc6x",
          "Container": "liveness-probe",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-csi-driver-v7qxk",
          "Container": "node-driver-registrar",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-csi-driver-v7qxk",
          "Container": "secrets-store",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-csi-driver-v7qxk",
          "Container": "liveness-probe",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-csi-driver-xf5d4",
          "Container": "node-driver-registrar",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-csi-driver-xf5d4",
          "Container": "secrets-store",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-csi-driver-xf5d4",
          "Container": "liveness-probe",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-provider-azure-5wpww",
          "Container": "provider-azure-installer",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-provider-azure-74vvm",
          "Container": "provider-azure-installer",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-provider-azure-c6x7x",
          "Container": "provider-azure-installer",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-provider-azure-dhr9b",
          "Container": "provider-azure-installer",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-provider-azure-tvsv4",
          "Container": "provider-azure-installer",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-provider-azure-wxfc8",
          "Container": "provider-azure-installer",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-logs-cz28v",
          "Container": "ama-logs",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-logs-cz28v",
          "Container": "ama-logs-prometheus",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-logs-d92qr",
          "Container": "ama-logs",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-logs-d92qr",
          "Container": "ama-logs-prometheus",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-logs-qlh7j",
          "Container": "ama-logs",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-logs-qlh7j",
          "Container": "ama-logs-prometheus",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-logs-rqbvf",
          "Container": "ama-logs",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-logs-rqbvf",
          "Container": "ama-logs-prometheus",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-logs-rs-64765bd4b9-22kzv",
          "Container": "ama-logs",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-logs-x4x2r",
          "Container": "ama-logs",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-logs-x4x2r",
          "Container": "ama-logs-prometheus",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-logs-zxwzq",
          "Container": "ama-logs",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-logs-zxwzq",
          "Container": "ama-logs-prometheus",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-metrics-7f878d975f-7k97h",
          "Container": "prometheus-collector",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-metrics-7f878d975f-7k97h",
          "Container": "addon-token-adapter",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-metrics-7f878d975f-q5llb",
          "Container": "prometheus-collector",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-metrics-7f878d975f-q5llb",
          "Container": "addon-token-adapter",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-metrics-node-5qnn7",
          "Container": "prometheus-collector",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-metrics-node-5qnn7",
          "Container": "addon-token-adapter",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-metrics-node-6wx54",
          "Container": "prometheus-collector",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-metrics-node-6wx54",
          "Container": "addon-token-adapter",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-metrics-node-bp2db",
          "Container": "prometheus-collector",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-metrics-node-bp2db",
          "Container": "addon-token-adapter",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-metrics-node-nw9c8",
          "Container": "prometheus-collector",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-metrics-node-nw9c8",
          "Container": "addon-token-adapter",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-metrics-node-qpq4d",
          "Container": "prometheus-collector",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-metrics-node-qpq4d",
          "Container": "addon-token-adapter",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-metrics-node-rtdhh",
          "Container": "prometheus-collector",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-metrics-node-rtdhh",
          "Container": "addon-token-adapter",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-metrics-operator-targets-66fb46c8d6-jfwrg",
          "Container": "targetallocator",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-metrics-operator-targets-66fb46c8d6-jfwrg",
          "Container": "config-reader",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "azure-ip-masq-agent-7lxpz",
          "Container": "azure-ip-masq-agent",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "azure-ip-masq-agent-c6xzh",
          "Container": "azure-ip-masq-agent",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "azure-ip-masq-agent-k4nc9",
          "Container": "azure-ip-masq-agent",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "azure-ip-masq-agent-v7qfj",
          "Container": "azure-ip-masq-agent",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "azure-ip-masq-agent-x4zch",
          "Container": "azure-ip-masq-agent",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "azure-ip-masq-agent-z8vqr",
          "Container": "azure-ip-masq-agent",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "azure-npm-559xn",
          "Container": "azure-npm",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "azure-npm-7sp9m",
          "Container": "azure-npm",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "azure-npm-chwl2",
          "Container": "azure-npm",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "azure-npm-g5hx8",
          "Container": "azure-npm",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "azure-npm-x6g85",
          "Container": "azure-npm",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "azure-npm-xjh28",
          "Container": "azure-npm",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "azure-policy-698f7c86b4-2mgdj",
          "Container": "azure-policy",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "cloud-node-manager-7r45z",
          "Container": "cloud-node-manager",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "cloud-node-manager-lstsj",
          "Container": "cloud-node-manager",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "cloud-node-manager-mwl6j",
          "Container": "cloud-node-manager",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "cloud-node-manager-p7rf6",
          "Container": "cloud-node-manager",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "cloud-node-manager-swp7f",
          "Container": "cloud-node-manager",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "cloud-node-manager-vnbh9",
          "Container": "cloud-node-manager",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "coredns-658d6d767d-dgvc7",
          "Container": "coredns",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "coredns-658d6d767d-sghts",
          "Container": "coredns",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "coredns-autoscaler-5955d6bbdb-s2gk7",
          "Container": "autoscaler",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "eraser-aks-systempool-19995743-vmss00000m-zxfzm",
          "Container": "collector",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "eraser-aks-systempool-19995743-vmss00000m-zxfzm",
          "Container": "remover",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "eraser-aks-systempool-19995743-vmss00000m-zxfzm",
          "Container": "trivy-scanner",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "eraser-aks-systempool-19995743-vmss00000n-ck6hm",
          "Container": "collector",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "eraser-aks-systempool-19995743-vmss00000n-ck6hm",
          "Container": "remover",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "eraser-aks-systempool-19995743-vmss00000n-ck6hm",
          "Container": "trivy-scanner",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "eraser-aks-systempool-19995743-vmss00000o-kpb2b",
          "Container": "collector",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "eraser-aks-systempool-19995743-vmss00000o-kpb2b",
          "Container": "remover",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "eraser-aks-systempool-19995743-vmss00000o-kpb2b",
          "Container": "trivy-scanner",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "eraser-aks-workloadpool-10479701-vmss00000e-9mcf6",
          "Container": "collector",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "eraser-aks-workloadpool-10479701-vmss00000e-9mcf6",
          "Container": "remover",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "eraser-aks-workloadpool-10479701-vmss00000e-9mcf6",
          "Container": "trivy-scanner",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "extension-agent-66c4486d68-rczq6",
          "Container": "extension-agent",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "extension-agent-66c4486d68-rczq6",
          "Container": "fluent-bit",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "extension-operator-d95fd449b-gfw8s",
          "Container": "manager",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "extension-operator-d95fd449b-gfw8s",
          "Container": "fluent-bit",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "konnectivity-agent-9f65c5cd8-jrr7v",
          "Container": "konnectivity-agent",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "konnectivity-agent-9f65c5cd8-w2zdz",
          "Container": "konnectivity-agent",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "konnectivity-agent-autoscaler-cdfc7c46-hldwj",
          "Container": "autoscaler",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "kube-proxy-22hgl",
          "Container": "kube-proxy",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "kube-proxy-8dlr6",
          "Container": "kube-proxy",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "kube-proxy-fh5fr",
          "Container": "kube-proxy",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "kube-proxy-gb78q",
          "Container": "kube-proxy",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "kube-proxy-mb2c4",
          "Container": "kube-proxy",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "kube-proxy-nq2sj",
          "Container": "kube-proxy",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "microsoft-defender-collector-ds-kqfft",
          "Container": "microsoft-defender-pod-collector",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "microsoft-defender-collector-ds-kqfft",
          "Container": "microsoft-defender-low-level-collector",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "microsoft-defender-collector-ds-mxck9",
          "Container": "microsoft-defender-pod-collector",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "microsoft-defender-collector-ds-mxck9",
          "Container": "microsoft-defender-low-level-collector",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "microsoft-defender-collector-ds-pnlvq",
          "Container": "microsoft-defender-pod-collector",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "microsoft-defender-collector-ds-pnlvq",
          "Container": "microsoft-defender-low-level-collector",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "microsoft-defender-collector-ds-r57j5",
          "Container": "microsoft-defender-pod-collector",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "microsoft-defender-collector-ds-r57j5",
          "Container": "microsoft-defender-low-level-collector",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "microsoft-defender-collector-ds-rzv62",
          "Container": "microsoft-defender-pod-collector",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "microsoft-defender-collector-ds-rzv62",
          "Container": "microsoft-defender-low-level-collector",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "microsoft-defender-collector-ds-zb6fd",
          "Container": "microsoft-defender-pod-collector",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "microsoft-defender-collector-ds-zb6fd",
          "Container": "microsoft-defender-low-level-collector",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "microsoft-defender-collector-misc-7df6776447-x9vzw",
          "Container": "microsoft-defender-pod-collector",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "microsoft-defender-publisher-ds-9glts",
          "Container": "microsoft-defender-publisher",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "microsoft-defender-publisher-ds-bsthb",
          "Container": "microsoft-defender-publisher",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "microsoft-defender-publisher-ds-dwpb7",
          "Container": "microsoft-defender-publisher",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "microsoft-defender-publisher-ds-hdpvx",
          "Container": "microsoft-defender-publisher",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "microsoft-defender-publisher-ds-n8rx5",
          "Container": "microsoft-defender-publisher",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "microsoft-defender-publisher-ds-qxcd9",
          "Container": "microsoft-defender-publisher",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "retina-agent-62scz",
          "Container": "retina",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "retina-agent-ds69z",
          "Container": "retina",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "retina-agent-h5wrd",
          "Container": "retina",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "retina-agent-p74qf",
          "Container": "retina",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "retina-agent-r2bvv",
          "Container": "retina",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kube-system",
          "Pod": "retina-agent-xcvmn",
          "Container": "retina",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "kubeview",
          "Pod": "simple-deployment-74fd649f8d-9d5gt",
          "Container": "webserver-simple",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "linkerd",
          "Pod": "simple-deployment-74fd649f8d-5bztq",
          "Container": "webserver-simple",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "nginx",
          "Pod": "simple-deployment-74fd649f8d-hf4dd",
          "Container": "webserver-simple",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "pets",
          "Pod": "order-service-6c5bfb6946-9jjrw",
          "Container": "order-service",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "pets",
          "Pod": "product-service-5dd87dfb8-h4495",
          "Container": "product-service",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "pets",
          "Pod": "rabbitmq-0",
          "Container": "rabbitmq",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "pets",
          "Pod": "store-front-658994fd95-8b7jr",
          "Container": "store-front",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "prometheus",
          "Pod": "simple-deployment-74fd649f8d-6r55l",
          "Container": "webserver-simple",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "sealed-secrets",
          "Pod": "simple-deployment-74fd649f8d-66bwl",
          "Container": "webserver-simple",
          "runAsUser": "Not Set (Defaults to root)"
        },
        {
          "Namespace": "test",
          "Pod": "simple-deployment-74fd649f8d-lgft6",
          "Container": "webserver-simple",
          "runAsUser": "Not Set (Defaults to root)"
        }
      ],
      "Total": 153
    },
    "orphanedServiceAccounts": {
      "Items": [
        {
          "Namespace": "1",
          "Name": "default"
        },
        {
          "Namespace": "10",
          "Name": "default"
        },
        {
          "Namespace": "2",
          "Name": "default"
        },
        {
          "Namespace": "3",
          "Name": "default"
        },
        {
          "Namespace": "4",
          "Name": "default"
        },
        {
          "Namespace": "5",
          "Name": "default"
        },
        {
          "Namespace": "6",
          "Name": "default"
        },
        {
          "Namespace": "7",
          "Name": "default"
        },
        {
          "Namespace": "8",
          "Name": "default"
        },
        {
          "Namespace": "9",
          "Name": "default"
        },
        {
          "Namespace": "aks-istio-egress",
          "Name": "default"
        },
        {
          "Namespace": "aks-istio-ingress",
          "Name": "default"
        },
        {
          "Namespace": "aks-istio-system",
          "Name": "default"
        },
        {
          "Namespace": "app-routing-system",
          "Name": "default"
        },
        {
          "Namespace": "argocd",
          "Name": "default"
        },
        {
          "Namespace": "default",
          "Name": "default"
        },
        {
          "Namespace": "gatekeeper-system",
          "Name": "default"
        },
        {
          "Namespace": "kiali-operator",
          "Name": "default"
        },
        {
          "Namespace": "kube-node-lease",
          "Name": "default"
        },
        {
          "Namespace": "kube-public",
          "Name": "default"
        }
      ],
      "Total": 20
    },
    "orphanedRoles": {
      "Items": [
        {
          "Namespace": "🌍 Cluster-Wide",
          "Role": "system:node",
          "Type": "ClusterRoleBinding",
          "Issue": "🚩 No subjects defined",
          "Severity": "Low",
          "Recommendation": "Delete the ClusterRoleBinding as it has no effect."
        },
        {
          "Namespace": "🌍 Cluster-Wide",
          "Role": "aks-secretproviderclasses-admin-role",
          "Type": "ClusterRole",
          "Issue": "⚠️ Unused ClusterRole",
          "Severity": "Low",
          "Recommendation": "Delete the unused ClusterRole to reduce clutter."
        },
        {
          "Namespace": "🌍 Cluster-Wide",
          "Role": "aks-secretproviderclasses-viewer-role",
          "Type": "ClusterRole",
          "Issue": "⚠️ Unused ClusterRole",
          "Severity": "Low",
          "Recommendation": "Delete the unused ClusterRole to reduce clutter."
        },
        {
          "Namespace": "🌍 Cluster-Wide",
          "Role": "eraser-imagejob-pods-cluster-role",
          "Type": "ClusterRole",
          "Issue": "🚩 No rules defined",
          "Severity": "Low",
          "Recommendation": "Delete the ClusterRole or define rules to make it effective."
        }
      ],
      "Total": 4
    },
    "HPA": {
      "Items": [],
      "Total": 0
    },
    "servicesWithoutEndpoints": {
      "Items": [
        {
          "Namespace": "kube-system",
          "Service": "extension-agent-metrics-service",
          "Type": "ClusterIP",
          "Status": "⚠️ No Endpoints"
        },
        {
          "Namespace": "kube-system",
          "Service": "extension-operator-metrics-service",
          "Type": "ClusterIP",
          "Status": "⚠️ No Endpoints"
        },
        {
          "Namespace": "kube-system",
          "Service": "network-observability",
          "Type": "ClusterIP",
          "Status": "⚠️ No Endpoints"
        }
      ],
      "Total": 3
    },
    "privilegedContainers": {
      "Items": [
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-csi-driver-7ghbq",
          "Container": "secrets-store"
        },
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-csi-driver-dg79g",
          "Container": "secrets-store"
        },
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-csi-driver-h8s4k",
          "Container": "secrets-store"
        },
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-csi-driver-hpc6x",
          "Container": "secrets-store"
        },
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-csi-driver-v7qxk",
          "Container": "secrets-store"
        },
        {
          "Namespace": "kube-system",
          "Pod": "aks-secrets-store-csi-driver-xf5d4",
          "Container": "secrets-store"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-logs-cz28v",
          "Container": "ama-logs"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-logs-cz28v",
          "Container": "ama-logs-prometheus"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-logs-d92qr",
          "Container": "ama-logs"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-logs-d92qr",
          "Container": "ama-logs-prometheus"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-logs-qlh7j",
          "Container": "ama-logs"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-logs-qlh7j",
          "Container": "ama-logs-prometheus"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-logs-rqbvf",
          "Container": "ama-logs"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-logs-rqbvf",
          "Container": "ama-logs-prometheus"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-logs-rs-64765bd4b9-22kzv",
          "Container": "ama-logs"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-logs-x4x2r",
          "Container": "ama-logs"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-logs-x4x2r",
          "Container": "ama-logs-prometheus"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-logs-zxwzq",
          "Container": "ama-logs"
        },
        {
          "Namespace": "kube-system",
          "Pod": "ama-logs-zxwzq",
          "Container": "ama-logs-prometheus"
        },
        {
          "Namespace": "kube-system",
          "Pod": "kube-proxy-22hgl",
          "Container": "kube-proxy"
        },
        {
          "Namespace": "kube-system",
          "Pod": "kube-proxy-8dlr6",
          "Container": "kube-proxy"
        },
        {
          "Namespace": "kube-system",
          "Pod": "kube-proxy-fh5fr",
          "Container": "kube-proxy"
        },
        {
          "Namespace": "kube-system",
          "Pod": "kube-proxy-gb78q",
          "Container": "kube-proxy"
        },
        {
          "Namespace": "kube-system",
          "Pod": "kube-proxy-mb2c4",
          "Container": "kube-proxy"
        },
        {
          "Namespace": "kube-system",
          "Pod": "kube-proxy-nq2sj",
          "Container": "kube-proxy"
        }
      ],
      "Total": 25
    },
    "deploymentIssues": {
      "Items": [],
      "Total": 0
    },
    "nodeResources": {
      "Items": [
        {
          "Node": "aks-systempool-19995743-vmss00000m",
          "CPU %": "8.68%",
          "CPU Used": "165 mC",
          "CPU Total": "1900 mC",
          "CPU Status": "✅ Normal",
          "Mem %": "48.65%",
          "Mem Used": "3178 Mi",
          "Mem Total": "6533 Mi",
          "Mem Status": "✅ Normal",
          "Disk %": "48%",
          "Disk Status": "✅ Normal"
        },
        {
          "Node": "aks-systempool-19995743-vmss00000n",
          "CPU %": "10.26%",
          "CPU Used": "195 mC",
          "CPU Total": "1900 mC",
          "CPU Status": "✅ Normal",
          "Mem %": "43.50%",
          "Mem Used": "2842 Mi",
          "Mem Total": "6533 Mi",
          "Mem Status": "✅ Normal",
          "Disk %": "43%",
          "Disk Status": "✅ Normal"
        },
        {
          "Node": "aks-systempool-19995743-vmss00000o",
          "CPU %": "7.42%",
          "CPU Used": "141 mC",
          "CPU Total": "1900 mC",
          "CPU Status": "✅ Normal",
          "Mem %": "50.11%",
          "Mem Used": "3274 Mi",
          "Mem Total": "6533 Mi",
          "Mem Status": "🟡 Warning",
          "Disk %": "50%",
          "Disk Status": "✅ Normal"
        },
        {
          "Node": "aks-workloadpool-10479701-vmss00000e",
          "CPU %": "5.13%",
          "CPU Used": "198 mC",
          "CPU Total": "3860 mC",
          "CPU Status": "✅ Normal",
          "Mem %": "25.03%",
          "Mem Used": "3651 Mi",
          "Mem Total": "14584 Mi",
          "Mem Status": "✅ Normal",
          "Disk %": "25%",
          "Disk Status": "✅ Normal"
        },
        {
          "Node": "aks-workloadpool-10479701-vmss00000f",
          "CPU %": "3.47%",
          "CPU Used": "134 mC",
          "CPU Total": "3860 mC",
          "CPU Status": "✅ Normal",
          "Mem %": "14.01%",
          "Mem Used": "2043 Mi",
          "Mem Total": "14584 Mi",
          "Mem Status": "✅ Normal",
          "Disk %": "14%",
          "Disk Status": "✅ Normal"
        },
        {
          "Node": "aks-workloadpool-10479701-vmss00000g",
          "CPU %": "3.19%",
          "CPU Used": "123 mC",
          "CPU Total": "3860 mC",
          "CPU Status": "✅ Normal",
          "Mem %": "12.25%",
          "Mem Used": "1786 Mi",
          "Mem Total": "14584 Mi",
          "Mem Status": "✅ Normal",
          "Disk %": "12%",
          "Disk Status": "✅ Normal"
        }
      ],
      "Total": 6,
      "Warnings": 1
    },
    "crashloop": {
      "Items": [],
      "Total": 0
    },
    "rbacMisconfig": {
      "Items": [
        {
          "Namespace": "kube-system",
          "Type": "🔹 Namespace Role",
          "RoleBinding": "system::leader-locking-kube-controller-manager",
          "Subject": "ServiceAccount/kube-controller-manager",
          "Issue": "❌ ServiceAccount does not exist in namespace kube-system",
          "Severity": "High",
          "Recommendation": "Create the missing ServiceAccount or update the RoleBinding to reference an existing ServiceAccount."
        },
        {
          "Namespace": "kube-system",
          "Type": "🔹 Namespace Role",
          "RoleBinding": "system::leader-locking-kube-scheduler",
          "Subject": "ServiceAccount/kube-scheduler",
          "Issue": "❌ ServiceAccount does not exist in namespace kube-system",
          "Severity": "High",
          "Recommendation": "Create the missing ServiceAccount or update the RoleBinding to reference an existing ServiceAccount."
        },
        {
          "Namespace": "kube-system",
          "Type": "🔹 Namespace Role",
          "RoleBinding": "system:controller:cloud-provider",
          "Subject": "ServiceAccount/cloud-provider",
          "Issue": "❌ ServiceAccount does not exist in namespace kube-system",
          "Severity": "High",
          "Recommendation": "Create the missing ServiceAccount or update the RoleBinding to reference an existing ServiceAccount."
        },
        {
          "Namespace": "🌍 Cluster-Wide",
          "Type": "🔸 Cluster Role",
          "RoleBinding": "istio-reader-clusterrole-asm-1-23-aks-istio-system",
          "Subject": "ServiceAccount/istio-reader-service-account",
          "Issue": "❌ ServiceAccount does not exist in namespace aks-istio-system",
          "Severity": "High",
          "Recommendation": "Create the missing ServiceAccount or update the ClusterRoleBinding to reference an existing ServiceAccount."
        },
        {
          "Namespace": "🌍 Cluster-Wide",
          "Type": "🔸 Cluster Role",
          "RoleBinding": "secretproviderrotation-rolebinding",
          "Subject": "ServiceAccount/secrets-store-csi-driver",
          "Issue": "❌ ServiceAccount does not exist in namespace kube-system",
          "Severity": "High",
          "Recommendation": "Create the missing ServiceAccount or update the ClusterRoleBinding to reference an existing ServiceAccount."
        },
        {
          "Namespace": "🌍 Cluster-Wide",
          "Type": "🔸 Cluster Role",
          "RoleBinding": "system:azure-cloud-provider",
          "Subject": "ServiceAccount/azure-cloud-provider",
          "Issue": "❌ ServiceAccount does not exist in namespace kube-system",
          "Severity": "High",
          "Recommendation": "Create the missing ServiceAccount or update the ClusterRoleBinding to reference an existing ServiceAccount."
        },
        {
          "Namespace": "🌍 Cluster-Wide",
          "Type": "🔸 Cluster Role",
          "RoleBinding": "system:azure-cloud-provider-secret-getter",
          "Subject": "ServiceAccount/azure-cloud-provider",
          "Issue": "❌ ServiceAccount does not exist in namespace kube-system",
          "Severity": "High",
          "Recommendation": "Create the missing ServiceAccount or update the ClusterRoleBinding to reference an existing ServiceAccount."
        },
        {
          "Namespace": "🌍 Cluster-Wide",
          "Type": "🔸 Cluster Role",
          "RoleBinding": "system:controller:route-controller",
          "Subject": "ServiceAccount/route-controller",
          "Issue": "❌ ServiceAccount does not exist in namespace kube-system",
          "Severity": "High",
          "Recommendation": "Create the missing ServiceAccount or update the ClusterRoleBinding to reference an existing ServiceAccount."
        },
        {
          "Namespace": "🌍 Cluster-Wide",
          "Type": "🔸 Cluster Role",
          "RoleBinding": "system:controller:service-controller",
          "Subject": "ServiceAccount/service-controller",
          "Issue": "❌ ServiceAccount does not exist in namespace kube-system",
          "Severity": "High",
          "Recommendation": "Create the missing ServiceAccount or update the ClusterRoleBinding to reference an existing ServiceAccount."
        },
        {
          "Namespace": "🌍 Cluster-Wide",
          "Type": "🔸 Cluster Role",
          "RoleBinding": "system:kube-dns",
          "Subject": "ServiceAccount/kube-dns",
          "Issue": "❌ ServiceAccount does not exist in namespace kube-system",
          "Severity": "High",
          "Recommendation": "Create the missing ServiceAccount or update the ClusterRoleBinding to reference an existing ServiceAccount."
        }
      ],
      "Total": 10
    },
    "publicServices": {
      "Items": [
        {
          "Namespace": "aks-istio-ingress",
          "Service": "aks-istio-ingressgateway-external",
          "Type": "LoadBalancer",
          "Ports": "15021/TCP, 80/TCP, 443/TCP",
          "ExternalIP": "131.145.32.126"
        },
        {
          "Namespace": "app-routing-system",
          "Service": "nginx",
          "Type": "LoadBalancer",
          "Ports": "80/TCP, 443/TCP",
          "ExternalIP": "4.250.59.60"
        },
        {
          "Namespace": "pets",
          "Service": "store-front",
          "Type": "LoadBalancer",
          "Ports": "80/TCP",
          "ExternalIP": "85.210.102.171"
        },
        {
          "Namespace": "test",
          "Service": "simple-service",
          "Type": "NodePort",
          "Ports": "8080/TCP",
          "ExternalIP": "None"
        }
      ],
      "Total": 4
    },
    "namespaceLimitRanges": {
      "Items": [
        {
          "Namespace": "1",
          "Issue": "❌ No LimitRange defined"
        },
        {
          "Namespace": "10",
          "Issue": "❌ No LimitRange defined"
        },
        {
          "Namespace": "2",
          "Issue": "❌ No LimitRange defined"
        },
        {
          "Namespace": "3",
          "Issue": "❌ No LimitRange defined"
        },
        {
          "Namespace": "4",
          "Issue": "❌ No LimitRange defined"
        },
        {
          "Namespace": "5",
          "Issue": "❌ No LimitRange defined"
        },
        {
          "Namespace": "6",
          "Issue": "❌ No LimitRange defined"
        },
        {
          "Namespace": "7",
          "Issue": "❌ No LimitRange defined"
        },
        {
          "Namespace": "8",
          "Issue": "❌ No LimitRange defined"
        },
        {
          "Namespace": "9",
          "Issue": "❌ No LimitRange defined"
        },
        {
          "Namespace": "aks-istio-egress",
          "Issue": "❌ No LimitRange defined"
        },
        {
          "Namespace": "aks-istio-ingress",
          "Issue": "❌ No LimitRange defined"
        },
        {
          "Namespace": "aks-istio-system",
          "Issue": "❌ No LimitRange defined"
        },
        {
          "Namespace": "app-routing-system",
          "Issue": "❌ No LimitRange defined"
        },
        {
          "Namespace": "argo-rollouts",
          "Issue": "❌ No LimitRange defined"
        },
        {
          "Namespace": "argo-workflows",
          "Issue": "❌ No LimitRange defined"
        },
        {
          "Namespace": "argocd",
          "Issue": "❌ No LimitRange defined"
        },
        {
          "Namespace": "cert-manager",
          "Issue": "❌ No LimitRange defined"
        },
        {
          "Namespace": "default",
          "Issue": "❌ No LimitRange defined"
        },
        {
          "Namespace": "gatekeeper-system",
          "Issue": "❌ No LimitRange defined"
        },
        {
          "Namespace": "grafana",
          "Issue": "❌ No LimitRange defined"
        },
        {
          "Namespace": "kiali-operator",
          "Issue": "❌ No LimitRange defined"
        },
        {
          "Namespace": "kube-node-lease",
          "Issue": "❌ No LimitRange defined"
        },
        {
          "Namespace": "kube-public",
          "Issue": "❌ No LimitRange defined"
        },
        {
          "Namespace": "kube-system",
          "Issue": "❌ No LimitRange defined"
        },
        {
          "Namespace": "kubeview",
          "Issue": "❌ No LimitRange defined"
        },
        {
          "Namespace": "linkerd",
          "Issue": "❌ No LimitRange defined"
        },
        {
          "Namespace": "nginx",
          "Issue": "❌ No LimitRange defined"
        },
        {
          "Namespace": "pets",
          "Issue": "❌ No LimitRange defined"
        },
        {
          "Namespace": "prometheus",
          "Issue": "❌ No LimitRange defined"
        },
        {
          "Namespace": "sealed-secrets",
          "Issue": "❌ No LimitRange defined"
        },
        {
          "Namespace": "test",
          "Issue": "❌ No LimitRange defined"
        }
      ],
      "Total": 32
    },
    "podFail": {
      "Items": {
        "Namespace": "kube-system",
        "Pod": "eraser-aks-systempool-19995743-vmss00000n-ck6hm",
        "Reason": "UnexpectedAdmissionError",
        "Message": "Pod was rejected: Unexpected error while attempting to recover from admission failure: preemption: error finding a set of pods to preempt: no set of running pods found to reclaim resources: [(res: cpu, q: 38), ]"
      },
      "Total": 1
    },
    "AKSBestPractices": null,
    "PDB": {
      "Items": [
        {
          "Namespace": "app-routing-system",
          "Name": "nginx",
          "Kind": "PDB",
          "Issue": "⚠️ maxUnavailable = 100%"
        },
        {
          "Namespace": "argo-rollouts",
          "Name": "simple-deployment",
          "Kind": "Deployment",
          "Issue": "❌ No matching PDB"
        },
        {
          "Namespace": "argo-workflows",
          "Name": "simple-deployment",
          "Kind": "Deployment",
          "Issue": "❌ No matching PDB"
        },
        {
          "Namespace": "argocd",
          "Name": "argocd-applicationset-controller",
          "Kind": "Deployment",
          "Issue": "❌ No matching PDB"
        },
        {
          "Namespace": "argocd",
          "Name": "argocd-dex-server",
          "Kind": "Deployment",
          "Issue": "❌ No matching PDB"
        },
        {
          "Namespace": "argocd",
          "Name": "argocd-notifications-controller",
          "Kind": "Deployment",
          "Issue": "❌ No matching PDB"
        },
        {
          "Namespace": "argocd",
          "Name": "argocd-redis-ha-haproxy",
          "Kind": "Deployment",
          "Issue": "❌ No matching PDB"
        },
        {
          "Namespace": "argocd",
          "Name": "argocd-repo-server",
          "Kind": "Deployment",
          "Issue": "❌ No matching PDB"
        },
        {
          "Namespace": "argocd",
          "Name": "argocd-server",
          "Kind": "Deployment",
          "Issue": "❌ No matching PDB"
        },
        {
          "Namespace": "cert-manager",
          "Name": "simple-deployment",
          "Kind": "Deployment",
          "Issue": "❌ No matching PDB"
        },
        {
          "Namespace": "grafana",
          "Name": "simple-deployment",
          "Kind": "Deployment",
          "Issue": "❌ No matching PDB"
        },
        {
          "Namespace": "kiali-operator",
          "Name": "kiali",
          "Kind": "Deployment",
          "Issue": "❌ No matching PDB"
        },
        {
          "Namespace": "kiali-operator",
          "Name": "kiali-operator",
          "Kind": "Deployment",
          "Issue": "❌ No matching PDB"
        },
        {
          "Namespace": "kubeview",
          "Name": "simple-deployment",
          "Kind": "Deployment",
          "Issue": "❌ No matching PDB"
        },
        {
          "Namespace": "linkerd",
          "Name": "simple-deployment",
          "Kind": "Deployment",
          "Issue": "❌ No matching PDB"
        },
        {
          "Namespace": "nginx",
          "Name": "simple-deployment",
          "Kind": "Deployment",
          "Issue": "❌ No matching PDB"
        },
        {
          "Namespace": "pets",
          "Name": "order-service",
          "Kind": "Deployment",
          "Issue": "❌ No matching PDB"
        },
        {
          "Namespace": "pets",
          "Name": "product-service",
          "Kind": "Deployment",
          "Issue": "❌ No matching PDB"
        },
        {
          "Namespace": "pets",
          "Name": "store-front",
          "Kind": "Deployment",
          "Issue": "❌ No matching PDB"
        },
        {
          "Namespace": "prometheus",
          "Name": "simple-deployment",
          "Kind": "Deployment",
          "Issue": "❌ No matching PDB"
        },
        {
          "Namespace": "sealed-secrets",
          "Name": "simple-deployment",
          "Kind": "Deployment",
          "Issue": "❌ No matching PDB"
        },
        {
          "Namespace": "test",
          "Name": "simple-deployment",
          "Kind": "Deployment",
          "Issue": "❌ No matching PDB"
        },
        {
          "Namespace": "argocd",
          "Name": "argocd-application-controller",
          "Kind": "StatefulSet",
          "Issue": "❌ No matching PDB"
        },
        {
          "Namespace": "argocd",
          "Name": "argocd-redis-ha-server",
          "Kind": "StatefulSet",
          "Issue": "❌ No matching PDB"
        },
        {
          "Namespace": "pets",
          "Name": "rabbitmq",
          "Kind": "StatefulSet",
          "Issue": "❌ No matching PDB"
        }
      ],
      "Total": 25
    },
    "podPending": {
      "Items": [],
      "Total": 0
    },
    "unmountedPV": {
      "Items": [],
      "Total": 0
    },
    "podsRestart": {
      "Items": [],
      "Total": 0
    },
    "statefulSetIssues": {
      "Items": [],
      "Total": 0
    },
    "daemonSetIssues": {
      "Items": [],
      "Total": 0
    },
    "stuckJobs": null,
    "podLongRunning": {
      "Items": [],
      "Total": 0
    },
    "nodeConditions": {
      "Total": 6,
      "NotReady": 0,
      "Items": [
        {
          "Node": "aks-systempool-19995743-vmss00000m",
          "Status": "✅ Healthy",
          "Issues": "None"
        },
        {
          "Node": "aks-systempool-19995743-vmss00000n",
          "Status": "✅ Healthy",
          "Issues": "None"
        },
        {
          "Node": "aks-systempool-19995743-vmss00000o",
          "Status": "✅ Healthy",
          "Issues": "None"
        },
        {
          "Node": "aks-workloadpool-10479701-vmss00000e",
          "Status": "✅ Healthy",
          "Issues": "None"
        },
        {
          "Node": "aks-workloadpool-10479701-vmss00000f",
          "Status": "✅ Healthy",
          "Issues": "None"
        },
        {
          "Node": "aks-workloadpool-10479701-vmss00000g",
          "Status": "✅ Healthy",
          "Issues": "None"
        }
      ]
    },
    "eventSummary": {
      "TotalWarnings": 0,
      "Summary": [],
      "Events": []
    },
    "missingProbes": {
      "Items": [
        {
          "Namespace": "aks-istio-ingress",
          "Workload": "aks-istio-ingressgateway-external-asm-1-23",
          "Kind": "Deployment",
          "Container": "istio-proxy",
          "Missing": "readiness, liveness"
        },
        {
          "Namespace": "aks-istio-system",
          "Workload": "istiod-asm-1-23",
          "Kind": "Deployment",
          "Container": "discovery",
          "Missing": "liveness"
        },
        {
          "Namespace": "argo-rollouts",
          "Workload": "simple-deployment",
          "Kind": "Deployment",
          "Container": "webserver-simple",
          "Missing": "readiness, liveness"
        },
        {
          "Namespace": "argo-workflows",
          "Workload": "simple-deployment",
          "Kind": "Deployment",
          "Container": "webserver-simple",
          "Missing": "readiness, liveness"
        },
        {
          "Namespace": "argocd",
          "Workload": "argocd-applicationset-controller",
          "Kind": "Deployment",
          "Container": "argocd-applicationset-controller",
          "Missing": "readiness, liveness"
        },
        {
          "Namespace": "argocd",
          "Workload": "argocd-dex-server",
          "Kind": "Deployment",
          "Container": "dex",
          "Missing": "readiness, liveness"
        },
        {
          "Namespace": "argocd",
          "Workload": "argocd-notifications-controller",
          "Kind": "Deployment",
          "Container": "argocd-notifications-controller",
          "Missing": "readiness"
        },
        {
          "Namespace": "cert-manager",
          "Workload": "simple-deployment",
          "Kind": "Deployment",
          "Container": "webserver-simple",
          "Missing": "readiness, liveness"
        },
        {
          "Namespace": "grafana",
          "Workload": "simple-deployment",
          "Kind": "Deployment",
          "Container": "webserver-simple",
          "Missing": "readiness, liveness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "ama-logs-rs",
          "Kind": "Deployment",
          "Container": "ama-logs",
          "Missing": "readiness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "ama-metrics",
          "Kind": "Deployment",
          "Container": "prometheus-collector",
          "Missing": "readiness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "ama-metrics",
          "Kind": "Deployment",
          "Container": "addon-token-adapter",
          "Missing": "readiness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "ama-metrics-operator-targets",
          "Kind": "Deployment",
          "Container": "targetallocator",
          "Missing": "readiness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "ama-metrics-operator-targets",
          "Kind": "Deployment",
          "Container": "config-reader",
          "Missing": "readiness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "coredns-autoscaler",
          "Kind": "Deployment",
          "Container": "autoscaler",
          "Missing": "readiness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "extension-agent",
          "Kind": "Deployment",
          "Container": "extension-agent",
          "Missing": "readiness, liveness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "extension-agent",
          "Kind": "Deployment",
          "Container": "fluent-bit",
          "Missing": "readiness, liveness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "extension-operator",
          "Kind": "Deployment",
          "Container": "manager",
          "Missing": "readiness, liveness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "extension-operator",
          "Kind": "Deployment",
          "Container": "fluent-bit",
          "Missing": "readiness, liveness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "konnectivity-agent-autoscaler",
          "Kind": "Deployment",
          "Container": "autoscaler",
          "Missing": "readiness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "metrics-server",
          "Kind": "Deployment",
          "Container": "metrics-server-vpa",
          "Missing": "readiness, liveness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "microsoft-defender-collector-misc",
          "Kind": "Deployment",
          "Container": "microsoft-defender-pod-collector",
          "Missing": "readiness, liveness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "vpa-admission-controller",
          "Kind": "Deployment",
          "Container": "admission-controller",
          "Missing": "readiness, liveness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "vpa-recommender",
          "Kind": "Deployment",
          "Container": "recommender",
          "Missing": "readiness, liveness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "vpa-updater",
          "Kind": "Deployment",
          "Container": "updater",
          "Missing": "readiness, liveness"
        },
        {
          "Namespace": "kubeview",
          "Workload": "simple-deployment",
          "Kind": "Deployment",
          "Container": "webserver-simple",
          "Missing": "readiness, liveness"
        },
        {
          "Namespace": "linkerd",
          "Workload": "simple-deployment",
          "Kind": "Deployment",
          "Container": "webserver-simple",
          "Missing": "readiness, liveness"
        },
        {
          "Namespace": "nginx",
          "Workload": "simple-deployment",
          "Kind": "Deployment",
          "Container": "webserver-simple",
          "Missing": "readiness, liveness"
        },
        {
          "Namespace": "prometheus",
          "Workload": "simple-deployment",
          "Kind": "Deployment",
          "Container": "webserver-simple",
          "Missing": "readiness, liveness"
        },
        {
          "Namespace": "sealed-secrets",
          "Workload": "simple-deployment",
          "Kind": "Deployment",
          "Container": "webserver-simple",
          "Missing": "readiness, liveness"
        },
        {
          "Namespace": "test",
          "Workload": "simple-deployment",
          "Kind": "Deployment",
          "Container": "webserver-simple",
          "Missing": "readiness, liveness"
        },
        {
          "Namespace": "argocd",
          "Workload": "argocd-application-controller",
          "Kind": "StatefulSet",
          "Container": "argocd-application-controller",
          "Missing": "liveness"
        },
        {
          "Namespace": "argocd",
          "Workload": "argocd-redis-ha-server",
          "Kind": "StatefulSet",
          "Container": "split-brain-fix",
          "Missing": "readiness, liveness"
        },
        {
          "Namespace": "pets",
          "Workload": "rabbitmq",
          "Kind": "StatefulSet",
          "Container": "rabbitmq",
          "Missing": "readiness, liveness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "aks-secrets-store-csi-driver",
          "Kind": "DaemonSet",
          "Container": "node-driver-registrar",
          "Missing": "readiness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "aks-secrets-store-csi-driver",
          "Kind": "DaemonSet",
          "Container": "secrets-store",
          "Missing": "readiness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "aks-secrets-store-csi-driver",
          "Kind": "DaemonSet",
          "Container": "liveness-probe",
          "Missing": "readiness, liveness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "aks-secrets-store-csi-driver-windows",
          "Kind": "DaemonSet",
          "Container": "node-driver-registrar",
          "Missing": "readiness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "aks-secrets-store-csi-driver-windows",
          "Kind": "DaemonSet",
          "Container": "secrets-store",
          "Missing": "readiness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "aks-secrets-store-csi-driver-windows",
          "Kind": "DaemonSet",
          "Container": "liveness-probe",
          "Missing": "readiness, liveness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "aks-secrets-store-provider-azure",
          "Kind": "DaemonSet",
          "Container": "provider-azure-installer",
          "Missing": "readiness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "aks-secrets-store-provider-azure-windows",
          "Kind": "DaemonSet",
          "Container": "provider-azure-installer",
          "Missing": "readiness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "ama-logs",
          "Kind": "DaemonSet",
          "Container": "ama-logs",
          "Missing": "readiness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "ama-logs",
          "Kind": "DaemonSet",
          "Container": "ama-logs-prometheus",
          "Missing": "readiness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "ama-logs-windows",
          "Kind": "DaemonSet",
          "Container": "ama-logs-windows",
          "Missing": "readiness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "ama-metrics-node",
          "Kind": "DaemonSet",
          "Container": "prometheus-collector",
          "Missing": "readiness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "ama-metrics-node",
          "Kind": "DaemonSet",
          "Container": "addon-token-adapter",
          "Missing": "readiness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "ama-metrics-win-node",
          "Kind": "DaemonSet",
          "Container": "prometheus-collector",
          "Missing": "readiness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "ama-metrics-win-node",
          "Kind": "DaemonSet",
          "Container": "addon-token-adapter-win",
          "Missing": "readiness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "azure-ip-masq-agent",
          "Kind": "DaemonSet",
          "Container": "azure-ip-masq-agent",
          "Missing": "readiness, liveness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "azure-npm",
          "Kind": "DaemonSet",
          "Container": "azure-npm",
          "Missing": "readiness, liveness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "cloud-node-manager",
          "Kind": "DaemonSet",
          "Container": "cloud-node-manager",
          "Missing": "readiness, liveness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "cloud-node-manager-windows",
          "Kind": "DaemonSet",
          "Container": "cloud-node-manager",
          "Missing": "readiness, liveness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "kube-proxy",
          "Kind": "DaemonSet",
          "Container": "kube-proxy",
          "Missing": "readiness, liveness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "microsoft-defender-collector-ds",
          "Kind": "DaemonSet",
          "Container": "microsoft-defender-pod-collector",
          "Missing": "readiness, liveness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "microsoft-defender-collector-ds",
          "Kind": "DaemonSet",
          "Container": "microsoft-defender-low-level-collector",
          "Missing": "readiness, liveness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "microsoft-defender-publisher-ds",
          "Kind": "DaemonSet",
          "Container": "microsoft-defender-publisher",
          "Missing": "readiness, liveness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "retina-agent",
          "Kind": "DaemonSet",
          "Container": "retina",
          "Missing": "liveness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "retina-agent-win",
          "Kind": "DaemonSet",
          "Container": "retinawin",
          "Missing": "readiness, liveness"
        },
        {
          "Namespace": "kube-system",
          "Workload": "windows-kube-proxy-initializer",
          "Kind": "DaemonSet",
          "Container": "pause",
          "Missing": "readiness, liveness"
        }
      ],
      "Total": 60
    },
    "jobFail": null
  },
  "metadata": {
    "generatedAt": "2025-04-14T13:54:48Z",
    "kubernetesVersion": "v1.30.11",
    "aks": {
      "id": "/subscriptions/ee360ac1-ac8d-45c9-9bcf-76d19ae08a33/resourcegroups/rg-aks-0402-dev-uks/providers/Microsoft.ContainerService/managedClusters/aks-0402-dev-uks",
      "location": "uksouth",
      "name": "aks-0402-dev-uks",
      "tags": {
        "Customer": "0402",
        "Environment": "dev",
        "LastDeployedBy": "Richard.Hooper@pixelrobots.co.uk",
        "LastUpdatedOn": "04/02/2025"
      },
      "type": "Microsoft.ContainerService/ManagedClusters",
      "properties": {
        "provisioningState": "Succeeded",
        "powerState": {
          "code": "Running"
        },
        "kubernetesVersion": "1.30.11",
        "currentKubernetesVersion": "1.30.11",
        "dnsPrefix": "aks-0402-dev-uks",
        "fqdn": "aks-0402-dev-uks-okv6e22w.hcp.uksouth.azmk8s.io",
        "azurePortalFQDN": "aks-0402-dev-uks-okv6e22w.portal.hcp.uksouth.azmk8s.io",
        "agentPoolProfiles": [
          {
            "name": "systempool",
            "count": 3,
            "vmSize": "Standard_D2ds_v5",
            "osDiskSizeGB": 70,
            "osDiskType": "Ephemeral",
            "kubeletDiskType": "OS",
            "workloadRuntime": "OCIContainer",
            "vnetSubnetID": "/subscriptions/ee360ac1-ac8d-45c9-9bcf-76d19ae08a33/resourceGroups/rg-aks-0402-dev-uks/providers/Microsoft.Network/virtualNetworks/vnet-0402-dev-uks/subnets/snet-aks-resources",
            "maxPods": 50,
            "type": "VirtualMachineScaleSets",
            "availabilityZones": [
              "1",
              "2",
              "3"
            ],
            "maxCount": 5,
            "minCount": 3,
            "enableAutoScaling": true,
            "scaleDownMode": "Delete",
            "provisioningState": "Succeeded",
            "powerState": {
              "code": "Running"
            },
            "orchestratorVersion": "1.30.11",
            "currentOrchestratorVersion": "1.30.11",
            "enableNodePublicIP": false,
            "tags": {
              "Customer": "0402",
              "Environment": "dev",
              "LastDeployedBy": "Richard.Hooper@pixelrobots.co.uk",
              "LastUpdatedOn": "04/02/2025"
            },
            "nodeLabels": {
              "nodetype": "system"
            },
            "nodeTaints": [
              "CriticalAddonsOnly=true:NoSchedule"
            ],
            "mode": "System",
            "enableEncryptionAtHost": false,
            "enableUltraSSD": false,
            "osType": "Linux",
            "osSKU": "AzureLinux",
            "nodeImageVersion": "AKSAzureLinux-V2gen2-202504.02.0",
            "upgradeSettings": {
              "maxSurge": "10%"
            },
            "enableFIPS": false,
            "securityProfile": {
              "enableVTPM": false,
              "enableSecureBoot": false
            }
          },
          {
            "name": "workloadpool",
            "count": 3,
            "vmSize": "Standard_D4ds_v5",
            "osDiskSizeGB": 70,
            "osDiskType": "Ephemeral",
            "kubeletDiskType": "OS",
            "vnetSubnetID": "/subscriptions/ee360ac1-ac8d-45c9-9bcf-76d19ae08a33/resourceGroups/rg-aks-0402-dev-uks/providers/Microsoft.Network/virtualNetworks/vnet-0402-dev-uks/subnets/snet-aks-resources",
            "maxPods": 50,
            "type": "VirtualMachineScaleSets",
            "availabilityZones": [
              "1",
              "2",
              "3"
            ],
            "maxCount": 12,
            "minCount": 1,
            "enableAutoScaling": true,
            "scaleDownMode": "Delete",
            "provisioningState": "Succeeded",
            "powerState": {
              "code": "Running"
            },
            "orchestratorVersion": "1.30.11",
            "currentOrchestratorVersion": "1.30.11",
            "enableNodePublicIP": false,
            "tags": {
              "Customer": "0402",
              "Environment": "dev",
              "LastDeployedBy": "Richard.Hooper@pixelrobots.co.uk",
              "LastUpdatedOn": "04/02/2025"
            },
            "mode": "User",
            "enableEncryptionAtHost": false,
            "enableUltraSSD": false,
            "osType": "Linux",
            "osSKU": "AzureLinux",
            "nodeImageVersion": "AKSAzureLinux-V2gen2-202504.02.0",
            "upgradeSettings": {},
            "enableFIPS": false,
            "securityProfile": {
              "enableVTPM": false,
              "enableSecureBoot": false
            }
          }
        ],
        "windowsProfile": {
          "adminUsername": "azureuser",
          "enableCSIProxy": true
        },
        "servicePrincipalProfile": {
          "clientId": "msi"
        },
        "addonProfiles": {
          "aciConnectorLinux": {
            "enabled": false,
            "config": {}
          },
          "azureKeyvaultSecretsProvider": {
            "enabled": true,
            "config": {
              "enableSecretRotation": "true"
            },
            "identity": {
              "resourceId": "/subscriptions/ee360ac1-ac8d-45c9-9bcf-76d19ae08a33/resourcegroups/rg-aks-nodes-0402-dev-uks/providers/Microsoft.ManagedIdentity/userAssignedIdentities/azurekeyvaultsecretsprovider-aks-0402-dev-uks",
              "clientId": "33cd05e6-e21f-499d-8eaa-e0a4fe944209",
              "objectId": "5cb84804-0ec3-43c1-a3ec-4aa370a849e9"
            }
          },
          "azurepolicy": {
            "enabled": true,
            "config": {
              "version": "v2"
            },
            "identity": {
              "resourceId": "/subscriptions/ee360ac1-ac8d-45c9-9bcf-76d19ae08a33/resourcegroups/rg-aks-nodes-0402-dev-uks/providers/Microsoft.ManagedIdentity/userAssignedIdentities/azurepolicy-aks-0402-dev-uks",
              "clientId": "7dd24ec2-87c4-49c5-8e54-856e99e98d37",
              "objectId": "3b51aafc-947a-4dde-bc74-e34009b356c0"
            }
          },
          "extensionManager": {
            "enabled": true,
            "config": null,
            "identity": {
              "resourceId": "/subscriptions/ee360ac1-ac8d-45c9-9bcf-76d19ae08a33/resourcegroups/rg-aks-nodes-0402-dev-uks/providers/Microsoft.ManagedIdentity/userAssignedIdentities/extensionmanager-aks-0402-dev-uks",
              "clientId": "aeb9ea13-379d-47c0-88a3-3cd4a8050b11",
              "objectId": "2c1dc30c-b46a-4c8b-9d61-eb4a33128d68"
            }
          },
          "httpApplicationRouting": {
            "enabled": false,
            "config": null
          },
          "ingressApplicationGateway": {
            "enabled": false,
            "config": null
          },
          "kubeDashboard": {
            "enabled": false,
            "config": null
          },
          "omsagent": {
            "enabled": true,
            "config": {
              "logAnalyticsWorkspaceResourceID": "/subscriptions/ee360ac1-ac8d-45c9-9bcf-76d19ae08a33/resourceGroups/rg-monitoring-0402-dev-uks/providers/Microsoft.OperationalInsights/workspaces/ws-aks-0402-dev-uks"
            },
            "identity": {
              "resourceId": "/subscriptions/ee360ac1-ac8d-45c9-9bcf-76d19ae08a33/resourcegroups/rg-aks-nodes-0402-dev-uks/providers/Microsoft.ManagedIdentity/userAssignedIdentities/omsagent-aks-0402-dev-uks",
              "clientId": "07a57f6c-d628-4c7b-b55b-68565aabb6f5",
              "objectId": "5da3aad1-0808-4133-a4f8-5ffeeb8b85ef"
            }
          },
          "openServiceMesh": {
            "enabled": false,
            "config": null
          }
        },
        "nodeResourceGroup": "rg-aks-nodes-0402-dev-uks",
        "enableRBAC": true,
        "enablePodSecurityPolicy": false,
        "supportPlan": "KubernetesOfficial",
        "networkProfile": {
          "networkPlugin": "azure",
          "networkPolicy": "azure",
          "networkDataplane": "azure",
          "loadBalancerSku": "standard",
          "loadBalancerProfile": {
            "managedOutboundIPs": {
              "count": 1
            },
            "effectiveOutboundIPs": [
              {
                "id": "/subscriptions/ee360ac1-ac8d-45c9-9bcf-76d19ae08a33/resourceGroups/rg-aks-nodes-0402-dev-uks/providers/Microsoft.Network/publicIPAddresses/cc3be770-5fa8-47ee-afb8-6c7b875ad974"
              }
            ],
            "backendPoolType": "nodeIP"
          },
          "serviceCidr": "172.16.0.0/24",
          "dnsServiceIP": "172.16.0.10",
          "outboundType": "loadBalancer",
          "serviceCidrs": [
            "172.16.0.0/24"
          ],
          "ipFamilies": [
            "IPv4"
          ]
        },
        "aadProfile": {
          "managed": true,
          "adminGroupObjectIDs": [
            "e591c663-c79c-47a4-94b8-f646b8647046"
          ],
          "adminUsers": null,
          "enableAzureRBAC": true,
          "tenantID": "d8171bb5-a0de-40a6-afdf-8b569cf6dbb8"
        },
        "maxAgentPools": 100,
        "identityProfile": {
          "kubeletidentity": {
            "resourceId": "/subscriptions/ee360ac1-ac8d-45c9-9bcf-76d19ae08a33/resourcegroups/rg-aks-nodes-0402-dev-uks/providers/Microsoft.ManagedIdentity/userAssignedIdentities/aks-0402-dev-uks-agentpool",
            "clientId": "6734db78-f28f-4b22-b64e-f5d618a5587b",
            "objectId": "e2ea25b7-da90-497b-a678-32589c6c4c16"
          }
        },
        "autoScalerProfile": {
          "balance-similar-node-groups": "false",
          "daemonset-eviction-for-empty-nodes": false,
          "daemonset-eviction-for-occupied-nodes": true,
          "expander": "random",
          "ignore-daemonsets-utilization": false,
          "max-empty-bulk-delete": "10",
          "max-graceful-termination-sec": "600",
          "max-node-provision-time": "15m",
          "max-total-unready-percentage": "45",
          "new-pod-scale-up-delay": "0s",
          "ok-total-unready-count": "3",
          "scale-down-delay-after-add": "10m",
          "scale-down-delay-after-delete": "10s",
          "scale-down-delay-after-failure": "3m",
          "scale-down-unneeded-time": "10m",
          "scale-down-unready-time": "20m",
          "scale-down-utilization-threshold": "0.5",
          "scan-interval": "10s",
          "skip-nodes-with-local-storage": "false",
          "skip-nodes-with-system-pods": "true"
        },
        "autoUpgradeProfile": {
          "upgradeChannel": "patch",
          "nodeOSUpgradeChannel": "NodeImage"
        },
        "podIdentityProfile": {
          "allowNetworkPluginKubenet": false
        },
        "disableLocalAccounts": true,
        "securityProfile": {
          "defender": {
            "logAnalyticsWorkspaceResourceId": "/subscriptions/ee360ac1-ac8d-45c9-9bcf-76d19ae08a33/resourceGroups/rg-monitoring-0402-dev-uks/providers/Microsoft.OperationalInsights/workspaces/ws-aks-0402-dev-uks",
            "securityMonitoring": {
              "enabled": true
            }
          },
          "imageCleaner": {
            "enabled": true,
            "intervalHours": 168
          },
          "workloadIdentity": {
            "enabled": true
          }
        },
        "storageProfile": {
          "diskCSIDriver": {
            "enabled": false
          },
          "fileCSIDriver": {
            "enabled": false
          },
          "snapshotController": {
            "enabled": false
          },
          "blobCSIDriver": {
            "enabled": false
          }
        },
        "publicNetworkAccess": "Enabled",
        "oidcIssuerProfile": {
          "enabled": true,
          "issuerURL": "https://uksouth.oic.prod-aks.azure.com/d8171bb5-a0de-40a6-afdf-8b569cf6dbb8/79d223da-9c3d-47f2-89c9-7941a0cbabe7/"
        },
        "ingressProfile": {
          "webAppRouting": {
            "enabled": true,
            "dnsZoneResourceIds": null,
            "identity": {
              "resourceId": "/subscriptions/ee360ac1-ac8d-45c9-9bcf-76d19ae08a33/resourcegroups/rg-aks-nodes-0402-dev-uks/providers/Microsoft.ManagedIdentity/userAssignedIdentities/webapprouting-aks-0402-dev-uks",
              "clientId": "5282f73f-a384-4024-bca0-e68ec2eba48b",
              "objectId": "12ea4dd2-0069-4a0a-ba34-edbe3ecbdde1"
            },
            "nginx": {
              "defaultIngressControllerType": "AnnotationControlled"
            }
          }
        },
        "workloadAutoScalerProfile": {
          "keda": {
            "enabled": true
          },
          "verticalPodAutoscaler": {
            "enabled": true
          }
        },
        "azureMonitorProfile": {
          "metrics": {
            "enabled": true,
            "kubeStateMetrics": {
              "metricLabelsAllowlist": "",
              "metricAnnotationsAllowList": ""
            }
          }
        },
        "resourceUID": "67a2676fa14f1a0001d1b85a",
        "serviceMeshProfile": {
          "mode": "Istio",
          "istio": {
            "components": {
              "ingressGateways": [
                {
                  "mode": "External",
                  "enabled": true
                }
              ]
            },
            "revisions": [
              "asm-1-23"
            ]
          }
        },
        "metricsProfile": {
          "costAnalysis": {
            "enabled": false
          }
        },
        "bootstrapProfile": {
          "artifactSource": "Direct"
        }
      },
      "identity": {
        "type": "UserAssigned",
        "userAssignedIdentities": {
          "/subscriptions/ee360ac1-ac8d-45c9-9bcf-76d19ae08a33/resourceGroups/rg-aks-0402-dev-uks/providers/Microsoft.ManagedIdentity/userAssignedIdentities/id-aks-0402-dev-uks-control": {
            "clientId": "69ca4f0c-8725-4c6a-81c2-b937b03e10cc",
            "principalId": "ed817eff-6790-4bde-81b8-2a21644a5f87"
          }
        }
      },
      "sku": {
        "name": "Base",
        "tier": "Standard"
      },
      "KubeData": {
        "Constraints": [
          {
            "apiVersion": "constraints.gatekeeper.sh/v1beta1",
            "kind": "K8sAzureV1BlockDefault",
            "metadata": {
              "annotations": {
                "azure-policy-assignment-id": "/subscriptions/ee360ac1-ac8d-45c9-9bcf-76d19ae08a33/providers/Microsoft.Authorization/policyAssignments/securitycenterbuiltin",
                "azure-policy-definition-id": "/providers/Microsoft.Authorization/policyDefinitions/9f061a12-e40d-4183-a00e-171812443373",
                "azure-policy-definition-reference-id": "KubernetesClustersShouldNotUseTheDefaultNamespaceMonitoringEffect",
                "azure-policy-definition-version": "4.2.0",
                "azure-policy-set-definition-id": "/providers/Microsoft.Authorization/policySetDefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8",
                "azure-policy-set-definition-version": "57.49.0",
                "constraint-installed-by": "azure-policy-addon"
              },
              "creationTimestamp": "2025-02-04T19:23:55Z",
              "generation": 1,
              "labels": {
                "managed-by": "azure-policy-addon"
              },
              "name": "azurepolicy-k8sazurev1blockdefault-154760fb0fc19d848eee",
              "resourceVersion": "20030153",
              "uid": "6bf71805-d353-43d0-9076-88c019f37789"
            },
            "spec": {
              "enforcementAction": "dryrun",
              "match": {
                "excludedNamespaces": [
                  "kube-system",
                  "gatekeeper-system",
                  "azure-arc",
                  "azure-extensions-usage-system"
                ],
                "kinds": [
                  {
                    "apiGroups": [
                      ""
                    ],
                    "kinds": [
                      "Pod",
                      "Service",
                      "ServiceAccount"
                    ]
                  }
                ],
                "namespaces": [
                  "default"
                ],
                "source": "Original"
              }
            },
            "status": {
              "auditTimestamp": "2025-04-14T13:53:39Z",
              "byPod": [
                {
                  "constraintUID": "6bf71805-d353-43d0-9076-88c019f37789",
                  "enforced": true,
                  "id": "gatekeeper-audit-77858c8f69-ft76n",
                  "observedGeneration": 1,
                  "operations": [
                    "audit",
                    "generate",
                    "mutation-status",
                    "status"
                  ]
                },
                {
                  "constraintUID": "6bf71805-d353-43d0-9076-88c019f37789",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-5tggw",
                  "observedGeneration": 1,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                },
                {
                  "constraintUID": "6bf71805-d353-43d0-9076-88c019f37789",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-t4rtc",
                  "observedGeneration": 1,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                }
              ],
              "totalViolations": 0
            }
          },
          {
            "apiVersion": "constraints.gatekeeper.sh/v1beta1",
            "kind": "K8sAzureV1IngressHttpsOnly",
            "metadata": {
              "annotations": {
                "azure-policy-assignment-id": "/subscriptions/ee360ac1-ac8d-45c9-9bcf-76d19ae08a33/providers/Microsoft.Authorization/policyAssignments/securitycenterbuiltin",
                "azure-policy-definition-id": "/providers/Microsoft.Authorization/policyDefinitions/1a5b4dca-0b6f-4cf5-907c-56316bc1bf3d",
                "azure-policy-definition-reference-id": "kubernetesClustersShouldBeAccessibleOnlyOverHTTPSMonitoringEffect",
                "azure-policy-definition-version": "8.2.0",
                "azure-policy-set-definition-id": "/providers/Microsoft.Authorization/policySetDefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8",
                "azure-policy-set-definition-version": "57.49.0",
                "constraint-installed-by": "azure-policy-addon"
              },
              "creationTimestamp": "2025-02-04T19:23:55Z",
              "generation": 1,
              "labels": {
                "managed-by": "azure-policy-addon"
              },
              "name": "azurepolicy-k8sazurev1ingresshttpsonly-be199c622b35c9637110",
              "resourceVersion": "20030159",
              "uid": "a0a922d4-6643-4981-a697-b0e32bbb005d"
            },
            "spec": {
              "enforcementAction": "dryrun",
              "match": {
                "excludedNamespaces": [
                  "kube-system",
                  "gatekeeper-system",
                  "azure-arc",
                  "azure-extensions-usage-system"
                ],
                "kinds": [
                  {
                    "apiGroups": [
                      "extensions",
                      "networking.k8s.io"
                    ],
                    "kinds": [
                      "Ingress"
                    ]
                  }
                ],
                "source": "Original"
              }
            },
            "status": {
              "auditTimestamp": "2025-04-14T13:53:39Z",
              "byPod": [
                {
                  "constraintUID": "a0a922d4-6643-4981-a697-b0e32bbb005d",
                  "enforced": true,
                  "id": "gatekeeper-audit-77858c8f69-ft76n",
                  "observedGeneration": 1,
                  "operations": [
                    "audit",
                    "generate",
                    "mutation-status",
                    "status"
                  ]
                },
                {
                  "constraintUID": "a0a922d4-6643-4981-a697-b0e32bbb005d",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-5tggw",
                  "observedGeneration": 1,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                },
                {
                  "constraintUID": "a0a922d4-6643-4981-a697-b0e32bbb005d",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-t4rtc",
                  "observedGeneration": 1,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                }
              ],
              "totalViolations": 0
            }
          },
          {
            "apiVersion": "constraints.gatekeeper.sh/v1beta1",
            "kind": "K8sAzureV1ServiceAllowedPorts",
            "metadata": {
              "annotations": {
                "azure-policy-assignment-id": "/subscriptions/ee360ac1-ac8d-45c9-9bcf-76d19ae08a33/providers/Microsoft.Authorization/policyAssignments/securitycenterbuiltin",
                "azure-policy-definition-id": "/providers/Microsoft.Authorization/policyDefinitions/233a2a17-77ca-4fb1-9b6b-69223d272a44",
                "azure-policy-definition-reference-id": "allowedServicePortsInKubernetesCluster",
                "azure-policy-definition-version": "8.2.0",
                "azure-policy-set-definition-id": "/providers/Microsoft.Authorization/policySetDefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8",
                "azure-policy-set-definition-version": "57.49.0",
                "constraint-installed-by": "azure-policy-addon"
              },
              "creationTimestamp": "2025-02-04T19:23:56Z",
              "generation": 1,
              "labels": {
                "managed-by": "azure-policy-addon"
              },
              "name": "azurepolicy-k8sazurev1serviceallowedports-9ed9c489d85822b72098",
              "resourceVersion": "20030158",
              "uid": "a8f051d8-de99-478a-90a5-c32c2518707e"
            },
            "spec": {
              "enforcementAction": "dryrun",
              "match": {
                "excludedNamespaces": [
                  "kube-system",
                  "gatekeeper-system",
                  "azure-arc",
                  "azure-extensions-usage-system"
                ],
                "kinds": [
                  {
                    "apiGroups": [
                      ""
                    ],
                    "kinds": [
                      "Service"
                    ]
                  }
                ],
                "source": "Original"
              },
              "parameters": {
                "allowedPorts": [
                  "-1"
                ]
              }
            },
            "status": {
              "auditTimestamp": "2025-04-14T13:53:39Z",
              "byPod": [
                {
                  "constraintUID": "a8f051d8-de99-478a-90a5-c32c2518707e",
                  "enforced": true,
                  "id": "gatekeeper-audit-77858c8f69-ft76n",
                  "observedGeneration": 1,
                  "operations": [
                    "audit",
                    "generate",
                    "mutation-status",
                    "status"
                  ]
                },
                {
                  "constraintUID": "a8f051d8-de99-478a-90a5-c32c2518707e",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-5tggw",
                  "observedGeneration": 1,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                },
                {
                  "constraintUID": "a8f051d8-de99-478a-90a5-c32c2518707e",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-t4rtc",
                  "observedGeneration": 1,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                }
              ],
              "totalViolations": 39,
              "violations": [
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 8080 for service simple-service has not been allowed.",
                  "name": "simple-service",
                  "namespace": "test",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 80 for service simple-service has not been allowed.",
                  "name": "simple-service",
                  "namespace": "sealed-secrets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 80 for service simple-service has not been allowed.",
                  "name": "simple-service",
                  "namespace": "prometheus",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 80 for service store-front has not been allowed.",
                  "name": "store-front",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 5672 for service rabbitmq has not been allowed.",
                  "name": "rabbitmq",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 15672 for service rabbitmq has not been allowed.",
                  "name": "rabbitmq",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 3002 for service product-service has not been allowed.",
                  "name": "product-service",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 3000 for service order-service has not been allowed.",
                  "name": "order-service",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 80 for service simple-service has not been allowed.",
                  "name": "simple-service",
                  "namespace": "nginx",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 80 for service simple-service has not been allowed.",
                  "name": "simple-service",
                  "namespace": "linkerd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 80 for service simple-service has not been allowed.",
                  "name": "simple-service",
                  "namespace": "kubeview",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 9090 for service kiali has not been allowed.",
                  "name": "kiali",
                  "namespace": "kiali-operator",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 20001 for service kiali has not been allowed.",
                  "name": "kiali",
                  "namespace": "kiali-operator",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 80 for service simple-service has not been allowed.",
                  "name": "simple-service",
                  "namespace": "grafana",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 80 for service simple-service has not been allowed.",
                  "name": "simple-service",
                  "namespace": "cert-manager",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 8083 for service argocd-server-metrics has not been allowed.",
                  "name": "argocd-server-metrics",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 80 for service argocd-server has not been allowed.",
                  "name": "argocd-server",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 443 for service argocd-server has not been allowed.",
                  "name": "argocd-server",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 8084 for service argocd-repo-server has not been allowed.",
                  "name": "argocd-repo-server",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 8081 for service argocd-repo-server has not been allowed.",
                  "name": "argocd-repo-server",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 9101 for service argocd-redis-ha-haproxy has not been allowed.",
                  "name": "argocd-redis-ha-haproxy",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 6379 for service argocd-redis-ha-haproxy has not been allowed.",
                  "name": "argocd-redis-ha-haproxy",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 6379 for service argocd-redis-ha-announce-2 has not been allowed.",
                  "name": "argocd-redis-ha-announce-2",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 26379 for service argocd-redis-ha-announce-2 has not been allowed.",
                  "name": "argocd-redis-ha-announce-2",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 6379 for service argocd-redis-ha-announce-1 has not been allowed.",
                  "name": "argocd-redis-ha-announce-1",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 26379 for service argocd-redis-ha-announce-1 has not been allowed.",
                  "name": "argocd-redis-ha-announce-1",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 6379 for service argocd-redis-ha-announce-0 has not been allowed.",
                  "name": "argocd-redis-ha-announce-0",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 26379 for service argocd-redis-ha-announce-0 has not been allowed.",
                  "name": "argocd-redis-ha-announce-0",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 6379 for service argocd-redis-ha has not been allowed.",
                  "name": "argocd-redis-ha",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 26379 for service argocd-redis-ha has not been allowed.",
                  "name": "argocd-redis-ha",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 9001 for service argocd-notifications-controller-metrics has not been allowed.",
                  "name": "argocd-notifications-controller-metrics",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 8082 for service argocd-metrics has not been allowed.",
                  "name": "argocd-metrics",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 5558 for service argocd-dex-server has not been allowed.",
                  "name": "argocd-dex-server",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 5557 for service argocd-dex-server has not been allowed.",
                  "name": "argocd-dex-server",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 5556 for service argocd-dex-server has not been allowed.",
                  "name": "argocd-dex-server",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 8080 for service argocd-applicationset-controller has not been allowed.",
                  "name": "argocd-applicationset-controller",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 7000 for service argocd-applicationset-controller has not been allowed.",
                  "name": "argocd-applicationset-controller",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 80 for service simple-service has not been allowed.",
                  "name": "simple-service",
                  "namespace": "argo-workflows",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Service",
                  "message": "Port 80 for service simple-service has not been allowed.",
                  "name": "simple-service",
                  "namespace": "argo-rollouts",
                  "version": "v1"
                }
              ]
            }
          },
          {
            "apiVersion": "constraints.gatekeeper.sh/v1beta1",
            "kind": "K8sAzureV2BlockAutomountToken",
            "metadata": {
              "annotations": {
                "azure-policy-assignment-id": "/subscriptions/ee360ac1-ac8d-45c9-9bcf-76d19ae08a33/providers/Microsoft.Authorization/policyAssignments/securitycenterbuiltin",
                "azure-policy-definition-id": "/providers/Microsoft.Authorization/policyDefinitions/423dd1ba-798e-40e4-9c4d-b6902674b423",
                "azure-policy-definition-reference-id": "KubernetesClustersShouldDisableAutomountingAPICredentialsMonitoringEffect",
                "azure-policy-definition-version": "4.2.0",
                "azure-policy-set-definition-id": "/providers/Microsoft.Authorization/policySetDefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8",
                "azure-policy-set-definition-version": "57.49.0",
                "constraint-installed-by": "azure-policy-addon"
              },
              "creationTimestamp": "2025-02-04T19:23:55Z",
              "generation": 1,
              "labels": {
                "managed-by": "azure-policy-addon"
              },
              "name": "azurepolicy-k8sazurev2blockautomounttoken-ff33418731bab1b5bddb",
              "resourceVersion": "20030155",
              "uid": "7fb8b0d0-9409-445c-9ab6-5d3a3ebd91c7"
            },
            "spec": {
              "enforcementAction": "dryrun",
              "match": {
                "excludedNamespaces": [
                  "kube-system",
                  "gatekeeper-system",
                  "azure-arc",
                  "azuredefender",
                  "mdc",
                  "azure-extensions-usage-system"
                ],
                "kinds": [
                  {
                    "apiGroups": [
                      ""
                    ],
                    "kinds": [
                      "Pod"
                    ]
                  }
                ],
                "source": "Original"
              },
              "parameters": {
                "excludedImages": []
              }
            },
            "status": {
              "auditTimestamp": "2025-04-14T13:53:39Z",
              "byPod": [
                {
                  "constraintUID": "7fb8b0d0-9409-445c-9ab6-5d3a3ebd91c7",
                  "enforced": true,
                  "id": "gatekeeper-audit-77858c8f69-ft76n",
                  "observedGeneration": 1,
                  "operations": [
                    "audit",
                    "generate",
                    "mutation-status",
                    "status"
                  ]
                },
                {
                  "constraintUID": "7fb8b0d0-9409-445c-9ab6-5d3a3ebd91c7",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-5tggw",
                  "observedGeneration": 1,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                },
                {
                  "constraintUID": "7fb8b0d0-9409-445c-9ab6-5d3a3ebd91c7",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-t4rtc",
                  "observedGeneration": 1,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                }
              ],
              "totalViolations": 25,
              "violations": [
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Automounting service account token is disallowed, pod: simple-deployment-74fd649f8d-lgft6",
                  "name": "simple-deployment-74fd649f8d-lgft6",
                  "namespace": "test",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Automounting service account token is disallowed, pod: simple-deployment-74fd649f8d-66bwl",
                  "name": "simple-deployment-74fd649f8d-66bwl",
                  "namespace": "sealed-secrets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Automounting service account token is disallowed, pod: simple-deployment-74fd649f8d-6r55l",
                  "name": "simple-deployment-74fd649f8d-6r55l",
                  "namespace": "prometheus",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Automounting service account token is disallowed, pod: store-front-658994fd95-8b7jr",
                  "name": "store-front-658994fd95-8b7jr",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Automounting service account token is disallowed, pod: rabbitmq-0",
                  "name": "rabbitmq-0",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Automounting service account token is disallowed, pod: product-service-5dd87dfb8-h4495",
                  "name": "product-service-5dd87dfb8-h4495",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Automounting service account token is disallowed, pod: order-service-6c5bfb6946-9jjrw",
                  "name": "order-service-6c5bfb6946-9jjrw",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Automounting service account token is disallowed, pod: simple-deployment-74fd649f8d-hf4dd",
                  "name": "simple-deployment-74fd649f8d-hf4dd",
                  "namespace": "nginx",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Automounting service account token is disallowed, pod: simple-deployment-74fd649f8d-5bztq",
                  "name": "simple-deployment-74fd649f8d-5bztq",
                  "namespace": "linkerd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Automounting service account token is disallowed, pod: simple-deployment-74fd649f8d-9d5gt",
                  "name": "simple-deployment-74fd649f8d-9d5gt",
                  "namespace": "kubeview",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Automounting service account token is disallowed, pod: kiali-operator-696bd54db-cv6fc",
                  "name": "kiali-operator-696bd54db-cv6fc",
                  "namespace": "kiali-operator",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Automounting service account token is disallowed, pod: kiali-5b88cfb6f8-9wxkc",
                  "name": "kiali-5b88cfb6f8-9wxkc",
                  "namespace": "kiali-operator",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Automounting service account token is disallowed, pod: simple-deployment-74fd649f8d-f52jv",
                  "name": "simple-deployment-74fd649f8d-f52jv",
                  "namespace": "grafana",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Automounting service account token is disallowed, pod: simple-deployment-74fd649f8d-ps8ll",
                  "name": "simple-deployment-74fd649f8d-ps8ll",
                  "namespace": "cert-manager",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Automounting service account token is disallowed, pod: argocd-server-5df7b9f58d-rrxzz",
                  "name": "argocd-server-5df7b9f58d-rrxzz",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Automounting service account token is disallowed, pod: argocd-server-5df7b9f58d-7s5qh",
                  "name": "argocd-server-5df7b9f58d-7s5qh",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Automounting service account token is disallowed, pod: argocd-redis-ha-haproxy-fb657456c-wl84v",
                  "name": "argocd-redis-ha-haproxy-fb657456c-wl84v",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Automounting service account token is disallowed, pod: argocd-redis-ha-haproxy-fb657456c-shwm7",
                  "name": "argocd-redis-ha-haproxy-fb657456c-shwm7",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Automounting service account token is disallowed, pod: argocd-redis-ha-haproxy-fb657456c-kj4kv",
                  "name": "argocd-redis-ha-haproxy-fb657456c-kj4kv",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Automounting service account token is disallowed, pod: argocd-notifications-controller-6ff6bf8dd6-2jmv8",
                  "name": "argocd-notifications-controller-6ff6bf8dd6-2jmv8",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Automounting service account token is disallowed, pod: argocd-dex-server-556c76889-kspcg",
                  "name": "argocd-dex-server-556c76889-kspcg",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Automounting service account token is disallowed, pod: argocd-applicationset-controller-6fdf84dbb6-dxmmk",
                  "name": "argocd-applicationset-controller-6fdf84dbb6-dxmmk",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Automounting service account token is disallowed, pod: argocd-application-controller-0",
                  "name": "argocd-application-controller-0",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Automounting service account token is disallowed, pod: simple-deployment-74fd649f8d-xh6fc",
                  "name": "simple-deployment-74fd649f8d-xh6fc",
                  "namespace": "argo-workflows",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Automounting service account token is disallowed, pod: simple-deployment-74fd649f8d-6nsqn",
                  "name": "simple-deployment-74fd649f8d-6nsqn",
                  "namespace": "argo-rollouts",
                  "version": "v1"
                }
              ]
            }
          },
          {
            "apiVersion": "constraints.gatekeeper.sh/v1beta1",
            "kind": "K8sAzureV2BlockHostNamespace",
            "metadata": {
              "annotations": {
                "azure-policy-assignment-id": "/subscriptions/ee360ac1-ac8d-45c9-9bcf-76d19ae08a33/providers/Microsoft.Authorization/policyAssignments/securitycenterbuiltin",
                "azure-policy-definition-id": "/providers/Microsoft.Authorization/policyDefinitions/47a1ee2f-2a2a-4576-bf2a-e0e36709c2b8",
                "azure-policy-definition-reference-id": "NoSharingSensitiveHostNamespacesInKubernetes",
                "azure-policy-definition-version": "5.2.0",
                "azure-policy-set-definition-id": "/providers/Microsoft.Authorization/policySetDefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8",
                "azure-policy-set-definition-version": "57.49.0",
                "constraint-installed-by": "azure-policy-addon"
              },
              "creationTimestamp": "2025-02-04T19:23:54Z",
              "generation": 1,
              "labels": {
                "managed-by": "azure-policy-addon"
              },
              "name": "azurepolicy-k8sazurev2blockhostnamespace-0e3a9611637f9c6c45ff",
              "resourceVersion": "20030169",
              "uid": "63113f34-c3ce-4a3a-9adf-837e88a86952"
            },
            "spec": {
              "enforcementAction": "dryrun",
              "match": {
                "excludedNamespaces": [
                  "kube-system",
                  "gatekeeper-system",
                  "azure-arc",
                  "azure-extensions-usage-system"
                ],
                "kinds": [
                  {
                    "apiGroups": [
                      ""
                    ],
                    "kinds": [
                      "Pod"
                    ]
                  }
                ],
                "source": "Original"
              },
              "parameters": {
                "excludedImages": []
              }
            },
            "status": {
              "auditTimestamp": "2025-04-14T13:53:39Z",
              "byPod": [
                {
                  "constraintUID": "63113f34-c3ce-4a3a-9adf-837e88a86952",
                  "enforced": true,
                  "id": "gatekeeper-audit-77858c8f69-ft76n",
                  "observedGeneration": 1,
                  "operations": [
                    "audit",
                    "generate",
                    "mutation-status",
                    "status"
                  ]
                },
                {
                  "constraintUID": "63113f34-c3ce-4a3a-9adf-837e88a86952",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-5tggw",
                  "observedGeneration": 1,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                },
                {
                  "constraintUID": "63113f34-c3ce-4a3a-9adf-837e88a86952",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-t4rtc",
                  "observedGeneration": 1,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                }
              ],
              "totalViolations": 0
            }
          },
          {
            "apiVersion": "constraints.gatekeeper.sh/v1beta1",
            "kind": "K8sAzureV2BlockHostNamespace",
            "metadata": {
              "annotations": {
                "azure-policy-assignment-id": "/subscriptions/ee360ac1-ac8d-45c9-9bcf-76d19ae08a33/resourcegroups/rg-aks-0402-dev-uks/providers/Microsoft.Authorization/policyAssignments/aks-Baseline-0402-dev-uks",
                "azure-policy-definition-id": "/providers/Microsoft.Authorization/policyDefinitions/47a1ee2f-2a2a-4576-bf2a-e0e36709c2b8",
                "azure-policy-definition-reference-id": "BlockUsingHostProcessIDAndIPC",
                "azure-policy-definition-version": "5.2.0",
                "azure-policy-set-definition-id": "/providers/Microsoft.Authorization/policySetDefinitions/a8640138-9b0a-4a28-b8cb-1666c838647d",
                "azure-policy-set-definition-version": "1.4.0",
                "constraint-installed-by": "azure-policy-addon"
              },
              "creationTimestamp": "2025-02-04T19:38:55Z",
              "generation": 5,
              "labels": {
                "managed-by": "azure-policy-addon"
              },
              "name": "azurepolicy-k8sazurev2blockhostnamespace-9c5fd489a7d626489fac",
              "resourceVersion": "20030170",
              "uid": "2c5c5ba1-3551-4095-a135-9b03647e5d60"
            },
            "spec": {
              "enforcementAction": "dryrun",
              "match": {
                "excludedNamespaces": [
                  "kube-system",
                  "gatekeeper-system",
                  "azure-arc"
                ],
                "kinds": [
                  {
                    "apiGroups": [
                      ""
                    ],
                    "kinds": [
                      "Pod"
                    ]
                  }
                ],
                "source": "Original"
              },
              "parameters": {
                "excludedImages": []
              }
            },
            "status": {
              "auditTimestamp": "2025-04-14T13:53:39Z",
              "byPod": [
                {
                  "constraintUID": "2c5c5ba1-3551-4095-a135-9b03647e5d60",
                  "enforced": true,
                  "id": "gatekeeper-audit-77858c8f69-ft76n",
                  "observedGeneration": 5,
                  "operations": [
                    "audit",
                    "generate",
                    "mutation-status",
                    "status"
                  ]
                },
                {
                  "constraintUID": "2c5c5ba1-3551-4095-a135-9b03647e5d60",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-5tggw",
                  "observedGeneration": 5,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                },
                {
                  "constraintUID": "2c5c5ba1-3551-4095-a135-9b03647e5d60",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-t4rtc",
                  "observedGeneration": 5,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                }
              ],
              "totalViolations": 0
            }
          },
          {
            "apiVersion": "constraints.gatekeeper.sh/v1beta1",
            "kind": "K8sAzureV2ContainerAllowedImages",
            "metadata": {
              "annotations": {
                "azure-policy-assignment-id": "/subscriptions/ee360ac1-ac8d-45c9-9bcf-76d19ae08a33/providers/Microsoft.Authorization/policyAssignments/securitycenterbuiltin",
                "azure-policy-definition-id": "/providers/Microsoft.Authorization/policyDefinitions/febd0533-8e55-448f-b837-bd0e06f16469",
                "azure-policy-definition-reference-id": "ensureAllowedContainerImagesInKubernetesCluster",
                "azure-policy-definition-version": "9.3.0",
                "azure-policy-set-definition-id": "/providers/Microsoft.Authorization/policySetDefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8",
                "azure-policy-set-definition-version": "57.49.0",
                "constraint-installed-by": "azure-policy-addon"
              },
              "creationTimestamp": "2025-02-04T19:23:55Z",
              "generation": 2,
              "labels": {
                "managed-by": "azure-policy-addon"
              },
              "name": "azurepolicy-k8sazurev2containerallowedimag-7c18ca50a667ab7d9aec",
              "resourceVersion": "20030166",
              "uid": "1988df34-80cb-436b-9ed3-b25f5b14234b"
            },
            "spec": {
              "enforcementAction": "dryrun",
              "match": {
                "excludedNamespaces": [
                  "kube-system",
                  "gatekeeper-system",
                  "azure-arc",
                  "azuredefender",
                  "mdc",
                  "azure-extensions-usage-system"
                ],
                "kinds": [
                  {
                    "apiGroups": [
                      ""
                    ],
                    "kinds": [
                      "Pod"
                    ]
                  }
                ],
                "source": "Original"
              },
              "parameters": {
                "excludedContainers": [],
                "imageRegex": "^acr0402devuks\\.azurecr\\.io.*$|^acr2905devuks\\.azurecr\\.io.*$|^acr270125devuks\\.azurecr\\.io.*$|^acr270125testuks\\.azurecr\\.io.*$|^acr210125testuks\\.azurecr\\.io.*$|^acr111224testuks\\.azurecr\\.io.*$|^acr1112testuks\\.azurecr\\.io.*$|^acr2811fixtestuks\\.azurecr\\.io.*$|^acr2811maintestuks\\.azurecr\\.io.*$|^acr2811demotestuks\\.azurecr\\.io.*$|^acr2811demodevuks\\.azurecr\\.io.*$|^acr2811devuks\\.azurecr\\.io.*$|^acr2811testuks\\.azurecr\\.io.*$|^acr2611testeus\\.azurecr\\.io.*$|^acr2610testeus\\.azurecr\\.io.*$|^acr2510testeus\\.azurecr\\.io.*$|^acr1610testuks\\.azurecr\\.io.*$|^acr1909testuks\\.azurecr\\.io.*$|^acr1709testuks\\.azurecr\\.io.*$|^acrpe3testuks\\.azurecr\\.io.*$|^acraro4testuks\\.azurecr\\.io.*$|^registry\\.k8s\\.io/.*$|^ghcr\\.io/kedacore.*$|^mcr\\.microsoft\\.com/azure-cli.*$|^debian:buster.*$|^quay\\.io/oauth2-proxy.*$"
              }
            },
            "status": {
              "auditTimestamp": "2025-04-14T13:53:39Z",
              "byPod": [
                {
                  "constraintUID": "1988df34-80cb-436b-9ed3-b25f5b14234b",
                  "enforced": true,
                  "id": "gatekeeper-audit-77858c8f69-ft76n",
                  "observedGeneration": 2,
                  "operations": [
                    "audit",
                    "generate",
                    "mutation-status",
                    "status"
                  ]
                },
                {
                  "constraintUID": "1988df34-80cb-436b-9ed3-b25f5b14234b",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-5tggw",
                  "observedGeneration": 2,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                },
                {
                  "constraintUID": "1988df34-80cb-436b-9ed3-b25f5b14234b",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-t4rtc",
                  "observedGeneration": 2,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                }
              ],
              "totalViolations": 57,
              "violations": [
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image docker.io/kostiscodefresh/gitops-simple-app:v1.0 for container webserver-simple has not been allowed.",
                  "name": "simple-deployment-74fd649f8d-lgft6",
                  "namespace": "test",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image docker.io/kostiscodefresh/gitops-simple-app:v1.0 for container webserver-simple has not been allowed.",
                  "name": "simple-deployment-74fd649f8d-66bwl",
                  "namespace": "sealed-secrets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image docker.io/kostiscodefresh/gitops-simple-app:v1.0 for container webserver-simple has not been allowed.",
                  "name": "simple-deployment-74fd649f8d-6r55l",
                  "namespace": "prometheus",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless for container istio-proxy has not been allowed.",
                  "name": "store-front-658994fd95-8b7jr",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless for container istio-init has not been allowed.",
                  "name": "store-front-658994fd95-8b7jr",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image ghcr.io/azure-samples/aks-store-demo/store-front:latest for container store-front has not been allowed.",
                  "name": "store-front-658994fd95-8b7jr",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless for container istio-proxy has not been allowed.",
                  "name": "rabbitmq-0",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless for container istio-init has not been allowed.",
                  "name": "rabbitmq-0",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/mirror/docker/library/rabbitmq:3.10-management-alpine for container rabbitmq has not been allowed.",
                  "name": "rabbitmq-0",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless for container istio-proxy has not been allowed.",
                  "name": "product-service-5dd87dfb8-h4495",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless for container istio-init has not been allowed.",
                  "name": "product-service-5dd87dfb8-h4495",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image ghcr.io/azure-samples/aks-store-demo/product-service:latest for container product-service has not been allowed.",
                  "name": "product-service-5dd87dfb8-h4495",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless for container istio-proxy has not been allowed.",
                  "name": "order-service-6c5bfb6946-9jjrw",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless for container istio-init has not been allowed.",
                  "name": "order-service-6c5bfb6946-9jjrw",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image ghcr.io/azure-samples/aks-store-demo/order-service:latest for container order-service has not been allowed.",
                  "name": "order-service-6c5bfb6946-9jjrw",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image busybox for container wait-for-rabbitmq has not been allowed.",
                  "name": "order-service-6c5bfb6946-9jjrw",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image docker.io/kostiscodefresh/gitops-simple-app:v1.0 for container webserver-simple has not been allowed.",
                  "name": "simple-deployment-74fd649f8d-hf4dd",
                  "namespace": "nginx",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image docker.io/kostiscodefresh/gitops-simple-app:v1.0 for container webserver-simple has not been allowed.",
                  "name": "simple-deployment-74fd649f8d-5bztq",
                  "namespace": "linkerd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image docker.io/kostiscodefresh/gitops-simple-app:v1.0 for container webserver-simple has not been allowed.",
                  "name": "simple-deployment-74fd649f8d-9d5gt",
                  "namespace": "kubeview",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image quay.io/kiali/kiali-operator:v2.7.1 for container operator has not been allowed.",
                  "name": "kiali-operator-696bd54db-cv6fc",
                  "namespace": "kiali-operator",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image quay.io/kiali/kiali:v2.7.1 for container kiali has not been allowed.",
                  "name": "kiali-5b88cfb6f8-9wxkc",
                  "namespace": "kiali-operator",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image docker.io/kostiscodefresh/gitops-simple-app:v1.0 for container webserver-simple has not been allowed.",
                  "name": "simple-deployment-74fd649f8d-f52jv",
                  "namespace": "grafana",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image docker.io/kostiscodefresh/gitops-simple-app:v1.0 for container webserver-simple has not been allowed.",
                  "name": "simple-deployment-74fd649f8d-ps8ll",
                  "namespace": "cert-manager",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 for container argocd-server has not been allowed.",
                  "name": "argocd-server-5df7b9f58d-rrxzz",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 for container argocd-server has not been allowed.",
                  "name": "argocd-server-5df7b9f58d-7s5qh",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 for container copyutil has not been allowed.",
                  "name": "argocd-repo-server-8568fc89b5-q2tbb",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 for container argocd-repo-server has not been allowed.",
                  "name": "argocd-repo-server-8568fc89b5-q2tbb",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 for container copyutil has not been allowed.",
                  "name": "argocd-repo-server-8568fc89b5-8r5mv",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 for container argocd-repo-server has not been allowed.",
                  "name": "argocd-repo-server-8568fc89b5-8r5mv",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 for container split-brain-fix has not been allowed.",
                  "name": "argocd-redis-ha-server-2",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 for container sentinel has not been allowed.",
                  "name": "argocd-redis-ha-server-2",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 for container redis has not been allowed.",
                  "name": "argocd-redis-ha-server-2",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 for container config-init has not been allowed.",
                  "name": "argocd-redis-ha-server-2",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 for container split-brain-fix has not been allowed.",
                  "name": "argocd-redis-ha-server-1",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 for container sentinel has not been allowed.",
                  "name": "argocd-redis-ha-server-1",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 for container redis has not been allowed.",
                  "name": "argocd-redis-ha-server-1",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 for container config-init has not been allowed.",
                  "name": "argocd-redis-ha-server-1",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 for container split-brain-fix has not been allowed.",
                  "name": "argocd-redis-ha-server-0",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 for container sentinel has not been allowed.",
                  "name": "argocd-redis-ha-server-0",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 for container redis has not been allowed.",
                  "name": "argocd-redis-ha-server-0",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 for container config-init has not been allowed.",
                  "name": "argocd-redis-ha-server-0",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/haproxy/haproxy:v2.9.11 for container haproxy has not been allowed.",
                  "name": "argocd-redis-ha-haproxy-fb657456c-wl84v",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/haproxy/haproxy:v2.9.11 for container config-init has not been allowed.",
                  "name": "argocd-redis-ha-haproxy-fb657456c-wl84v",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 for container secret-init has not been allowed.",
                  "name": "argocd-redis-ha-haproxy-fb657456c-wl84v",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/haproxy/haproxy:v2.9.11 for container haproxy has not been allowed.",
                  "name": "argocd-redis-ha-haproxy-fb657456c-shwm7",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/haproxy/haproxy:v2.9.11 for container config-init has not been allowed.",
                  "name": "argocd-redis-ha-haproxy-fb657456c-shwm7",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 for container secret-init has not been allowed.",
                  "name": "argocd-redis-ha-haproxy-fb657456c-shwm7",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/haproxy/haproxy:v2.9.11 for container haproxy has not been allowed.",
                  "name": "argocd-redis-ha-haproxy-fb657456c-kj4kv",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/haproxy/haproxy:v2.9.11 for container config-init has not been allowed.",
                  "name": "argocd-redis-ha-haproxy-fb657456c-kj4kv",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 for container secret-init has not been allowed.",
                  "name": "argocd-redis-ha-haproxy-fb657456c-kj4kv",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 for container argocd-notifications-controller has not been allowed.",
                  "name": "argocd-notifications-controller-6ff6bf8dd6-2jmv8",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/dexidp/dex:v2.41.1 for container dex has not been allowed.",
                  "name": "argocd-dex-server-556c76889-kspcg",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 for container copyutil has not been allowed.",
                  "name": "argocd-dex-server-556c76889-kspcg",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 for container argocd-applicationset-controller has not been allowed.",
                  "name": "argocd-applicationset-controller-6fdf84dbb6-dxmmk",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 for container argocd-application-controller has not been allowed.",
                  "name": "argocd-application-controller-0",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image docker.io/kostiscodefresh/gitops-simple-app:v1.0 for container webserver-simple has not been allowed.",
                  "name": "simple-deployment-74fd649f8d-xh6fc",
                  "namespace": "argo-workflows",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image docker.io/kostiscodefresh/gitops-simple-app:v1.0 for container webserver-simple has not been allowed.",
                  "name": "simple-deployment-74fd649f8d-6nsqn",
                  "namespace": "argo-rollouts",
                  "version": "v1"
                }
              ]
            }
          },
          {
            "apiVersion": "constraints.gatekeeper.sh/v1beta1",
            "kind": "K8sAzureV2ContainerAllowedImages",
            "metadata": {
              "annotations": {
                "azure-policy-assignment-id": "/subscriptions/ee360ac1-ac8d-45c9-9bcf-76d19ae08a33/providers/Microsoft.Authorization/policyAssignments/aks-trusted-registry-asc-tr2-test-uks",
                "azure-policy-definition-id": "/providers/Microsoft.Authorization/policyDefinitions/febd0533-8e55-448f-b837-bd0e06f16469",
                "azure-policy-definition-reference-id": "",
                "azure-policy-definition-version": "9.3.0",
                "azure-policy-set-definition-id": "",
                "azure-policy-set-definition-version": "",
                "constraint-installed-by": "azure-policy-addon"
              },
              "creationTimestamp": "2025-02-04T19:23:55Z",
              "generation": 1,
              "labels": {
                "managed-by": "azure-policy-addon"
              },
              "name": "azurepolicy-k8sazurev2containerallowedimag-81d727851e6a9391ccb7",
              "resourceVersion": "20030167",
              "uid": "7e95781b-b1c6-4e79-a986-87b06672143d"
            },
            "spec": {
              "enforcementAction": "dryrun",
              "match": {
                "excludedNamespaces": [
                  "kube-system",
                  "gatekeeper-system",
                  "azure-arc",
                  "azuredefender",
                  "mdc",
                  "azure-extensions-usage-system"
                ],
                "kinds": [
                  {
                    "apiGroups": [
                      ""
                    ],
                    "kinds": [
                      "Pod"
                    ]
                  }
                ],
                "source": "Original"
              },
              "parameters": {
                "excludedContainers": [],
                "imageRegex": "^acrasctr2testuks.azurecr.io.*$|^registry.k8s.io/.*$|^ghcr.io/kedacore.*$|^mcr.microsoft.com/azure-cli.*$|^debian:buster.*$|^quay.io/oauth2-proxy.*$"
              }
            },
            "status": {
              "auditTimestamp": "2025-04-14T13:53:39Z",
              "byPod": [
                {
                  "constraintUID": "7e95781b-b1c6-4e79-a986-87b06672143d",
                  "enforced": true,
                  "id": "gatekeeper-audit-77858c8f69-ft76n",
                  "observedGeneration": 1,
                  "operations": [
                    "audit",
                    "generate",
                    "mutation-status",
                    "status"
                  ]
                },
                {
                  "constraintUID": "7e95781b-b1c6-4e79-a986-87b06672143d",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-5tggw",
                  "observedGeneration": 1,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                },
                {
                  "constraintUID": "7e95781b-b1c6-4e79-a986-87b06672143d",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-t4rtc",
                  "observedGeneration": 1,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                }
              ],
              "totalViolations": 57,
              "violations": [
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image docker.io/kostiscodefresh/gitops-simple-app:v1.0 for container webserver-simple has not been allowed.",
                  "name": "simple-deployment-74fd649f8d-lgft6",
                  "namespace": "test",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image docker.io/kostiscodefresh/gitops-simple-app:v1.0 for container webserver-simple has not been allowed.",
                  "name": "simple-deployment-74fd649f8d-66bwl",
                  "namespace": "sealed-secrets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image docker.io/kostiscodefresh/gitops-simple-app:v1.0 for container webserver-simple has not been allowed.",
                  "name": "simple-deployment-74fd649f8d-6r55l",
                  "namespace": "prometheus",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless for container istio-proxy has not been allowed.",
                  "name": "store-front-658994fd95-8b7jr",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless for container istio-init has not been allowed.",
                  "name": "store-front-658994fd95-8b7jr",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image ghcr.io/azure-samples/aks-store-demo/store-front:latest for container store-front has not been allowed.",
                  "name": "store-front-658994fd95-8b7jr",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless for container istio-proxy has not been allowed.",
                  "name": "rabbitmq-0",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless for container istio-init has not been allowed.",
                  "name": "rabbitmq-0",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/mirror/docker/library/rabbitmq:3.10-management-alpine for container rabbitmq has not been allowed.",
                  "name": "rabbitmq-0",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless for container istio-proxy has not been allowed.",
                  "name": "product-service-5dd87dfb8-h4495",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless for container istio-init has not been allowed.",
                  "name": "product-service-5dd87dfb8-h4495",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image ghcr.io/azure-samples/aks-store-demo/product-service:latest for container product-service has not been allowed.",
                  "name": "product-service-5dd87dfb8-h4495",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless for container istio-proxy has not been allowed.",
                  "name": "order-service-6c5bfb6946-9jjrw",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless for container istio-init has not been allowed.",
                  "name": "order-service-6c5bfb6946-9jjrw",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image ghcr.io/azure-samples/aks-store-demo/order-service:latest for container order-service has not been allowed.",
                  "name": "order-service-6c5bfb6946-9jjrw",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image busybox for container wait-for-rabbitmq has not been allowed.",
                  "name": "order-service-6c5bfb6946-9jjrw",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image docker.io/kostiscodefresh/gitops-simple-app:v1.0 for container webserver-simple has not been allowed.",
                  "name": "simple-deployment-74fd649f8d-hf4dd",
                  "namespace": "nginx",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image docker.io/kostiscodefresh/gitops-simple-app:v1.0 for container webserver-simple has not been allowed.",
                  "name": "simple-deployment-74fd649f8d-5bztq",
                  "namespace": "linkerd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image docker.io/kostiscodefresh/gitops-simple-app:v1.0 for container webserver-simple has not been allowed.",
                  "name": "simple-deployment-74fd649f8d-9d5gt",
                  "namespace": "kubeview",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image quay.io/kiali/kiali-operator:v2.7.1 for container operator has not been allowed.",
                  "name": "kiali-operator-696bd54db-cv6fc",
                  "namespace": "kiali-operator",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image quay.io/kiali/kiali:v2.7.1 for container kiali has not been allowed.",
                  "name": "kiali-5b88cfb6f8-9wxkc",
                  "namespace": "kiali-operator",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image docker.io/kostiscodefresh/gitops-simple-app:v1.0 for container webserver-simple has not been allowed.",
                  "name": "simple-deployment-74fd649f8d-f52jv",
                  "namespace": "grafana",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image docker.io/kostiscodefresh/gitops-simple-app:v1.0 for container webserver-simple has not been allowed.",
                  "name": "simple-deployment-74fd649f8d-ps8ll",
                  "namespace": "cert-manager",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 for container argocd-server has not been allowed.",
                  "name": "argocd-server-5df7b9f58d-rrxzz",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 for container argocd-server has not been allowed.",
                  "name": "argocd-server-5df7b9f58d-7s5qh",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 for container copyutil has not been allowed.",
                  "name": "argocd-repo-server-8568fc89b5-q2tbb",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 for container argocd-repo-server has not been allowed.",
                  "name": "argocd-repo-server-8568fc89b5-q2tbb",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 for container copyutil has not been allowed.",
                  "name": "argocd-repo-server-8568fc89b5-8r5mv",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 for container argocd-repo-server has not been allowed.",
                  "name": "argocd-repo-server-8568fc89b5-8r5mv",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 for container split-brain-fix has not been allowed.",
                  "name": "argocd-redis-ha-server-2",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 for container sentinel has not been allowed.",
                  "name": "argocd-redis-ha-server-2",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 for container redis has not been allowed.",
                  "name": "argocd-redis-ha-server-2",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 for container config-init has not been allowed.",
                  "name": "argocd-redis-ha-server-2",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 for container split-brain-fix has not been allowed.",
                  "name": "argocd-redis-ha-server-1",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 for container sentinel has not been allowed.",
                  "name": "argocd-redis-ha-server-1",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 for container redis has not been allowed.",
                  "name": "argocd-redis-ha-server-1",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 for container config-init has not been allowed.",
                  "name": "argocd-redis-ha-server-1",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 for container split-brain-fix has not been allowed.",
                  "name": "argocd-redis-ha-server-0",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 for container sentinel has not been allowed.",
                  "name": "argocd-redis-ha-server-0",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 for container redis has not been allowed.",
                  "name": "argocd-redis-ha-server-0",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 for container config-init has not been allowed.",
                  "name": "argocd-redis-ha-server-0",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/haproxy/haproxy:v2.9.11 for container haproxy has not been allowed.",
                  "name": "argocd-redis-ha-haproxy-fb657456c-wl84v",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/haproxy/haproxy:v2.9.11 for container config-init has not been allowed.",
                  "name": "argocd-redis-ha-haproxy-fb657456c-wl84v",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 for container secret-init has not been allowed.",
                  "name": "argocd-redis-ha-haproxy-fb657456c-wl84v",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/haproxy/haproxy:v2.9.11 for container haproxy has not been allowed.",
                  "name": "argocd-redis-ha-haproxy-fb657456c-shwm7",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/haproxy/haproxy:v2.9.11 for container config-init has not been allowed.",
                  "name": "argocd-redis-ha-haproxy-fb657456c-shwm7",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 for container secret-init has not been allowed.",
                  "name": "argocd-redis-ha-haproxy-fb657456c-shwm7",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/haproxy/haproxy:v2.9.11 for container haproxy has not been allowed.",
                  "name": "argocd-redis-ha-haproxy-fb657456c-kj4kv",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/haproxy/haproxy:v2.9.11 for container config-init has not been allowed.",
                  "name": "argocd-redis-ha-haproxy-fb657456c-kj4kv",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 for container secret-init has not been allowed.",
                  "name": "argocd-redis-ha-haproxy-fb657456c-kj4kv",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 for container argocd-notifications-controller has not been allowed.",
                  "name": "argocd-notifications-controller-6ff6bf8dd6-2jmv8",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/dexidp/dex:v2.41.1 for container dex has not been allowed.",
                  "name": "argocd-dex-server-556c76889-kspcg",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 for container copyutil has not been allowed.",
                  "name": "argocd-dex-server-556c76889-kspcg",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 for container argocd-applicationset-controller has not been allowed.",
                  "name": "argocd-applicationset-controller-6fdf84dbb6-dxmmk",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 for container argocd-application-controller has not been allowed.",
                  "name": "argocd-application-controller-0",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image docker.io/kostiscodefresh/gitops-simple-app:v1.0 for container webserver-simple has not been allowed.",
                  "name": "simple-deployment-74fd649f8d-xh6fc",
                  "namespace": "argo-workflows",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container image docker.io/kostiscodefresh/gitops-simple-app:v1.0 for container webserver-simple has not been allowed.",
                  "name": "simple-deployment-74fd649f8d-6nsqn",
                  "namespace": "argo-rollouts",
                  "version": "v1"
                }
              ]
            }
          },
          {
            "apiVersion": "constraints.gatekeeper.sh/v1beta1",
            "kind": "K8sAzureV2NoPrivilege",
            "metadata": {
              "annotations": {
                "azure-policy-assignment-id": "/subscriptions/ee360ac1-ac8d-45c9-9bcf-76d19ae08a33/resourcegroups/rg-aks-0402-dev-uks/providers/Microsoft.Authorization/policyAssignments/aks-Baseline-0402-dev-uks",
                "azure-policy-definition-id": "/providers/Microsoft.Authorization/policyDefinitions/95edb821-ddaf-4404-9732-666045e056b4",
                "azure-policy-definition-reference-id": "NoPrivilegedContainers",
                "azure-policy-definition-version": "9.2.0",
                "azure-policy-set-definition-id": "/providers/Microsoft.Authorization/policySetDefinitions/a8640138-9b0a-4a28-b8cb-1666c838647d",
                "azure-policy-set-definition-version": "1.4.0",
                "constraint-installed-by": "azure-policy-addon"
              },
              "creationTimestamp": "2025-02-04T19:38:55Z",
              "generation": 5,
              "labels": {
                "managed-by": "azure-policy-addon"
              },
              "name": "azurepolicy-k8sazurev2noprivilege-8debdaaf494f5858ba0a",
              "resourceVersion": "20030151",
              "uid": "846dd1a7-9734-4d97-a55d-5add1c0a9700"
            },
            "spec": {
              "enforcementAction": "dryrun",
              "match": {
                "excludedNamespaces": [
                  "kube-system",
                  "gatekeeper-system",
                  "azure-arc"
                ],
                "kinds": [
                  {
                    "apiGroups": [
                      ""
                    ],
                    "kinds": [
                      "Pod"
                    ]
                  }
                ],
                "source": "Original"
              },
              "parameters": {
                "excludedContainers": [],
                "excludedImages": []
              }
            },
            "status": {
              "auditTimestamp": "2025-04-14T13:53:39Z",
              "byPod": [
                {
                  "constraintUID": "846dd1a7-9734-4d97-a55d-5add1c0a9700",
                  "enforced": true,
                  "id": "gatekeeper-audit-77858c8f69-ft76n",
                  "observedGeneration": 5,
                  "operations": [
                    "audit",
                    "generate",
                    "mutation-status",
                    "status"
                  ]
                },
                {
                  "constraintUID": "846dd1a7-9734-4d97-a55d-5add1c0a9700",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-5tggw",
                  "observedGeneration": 5,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                },
                {
                  "constraintUID": "846dd1a7-9734-4d97-a55d-5add1c0a9700",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-t4rtc",
                  "observedGeneration": 5,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                }
              ],
              "totalViolations": 0
            }
          },
          {
            "apiVersion": "constraints.gatekeeper.sh/v1beta1",
            "kind": "K8sAzureV2NoPrivilege",
            "metadata": {
              "annotations": {
                "azure-policy-assignment-id": "/subscriptions/ee360ac1-ac8d-45c9-9bcf-76d19ae08a33/providers/Microsoft.Authorization/policyAssignments/securitycenterbuiltin",
                "azure-policy-definition-id": "/providers/Microsoft.Authorization/policyDefinitions/95edb821-ddaf-4404-9732-666045e056b4",
                "azure-policy-definition-reference-id": "privilegedContainersShouldBeAvoided",
                "azure-policy-definition-version": "9.2.0",
                "azure-policy-set-definition-id": "/providers/Microsoft.Authorization/policySetDefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8",
                "azure-policy-set-definition-version": "57.49.0",
                "constraint-installed-by": "azure-policy-addon"
              },
              "creationTimestamp": "2025-02-04T19:23:55Z",
              "generation": 1,
              "labels": {
                "managed-by": "azure-policy-addon"
              },
              "name": "azurepolicy-k8sazurev2noprivilege-c026b8dcf46113a1d587",
              "resourceVersion": "20030173",
              "uid": "6be38cf2-7650-4933-87aa-4c48a42e248e"
            },
            "spec": {
              "enforcementAction": "dryrun",
              "match": {
                "excludedNamespaces": [
                  "kube-system",
                  "gatekeeper-system",
                  "azure-arc",
                  "azuredefender",
                  "mdc",
                  "azure-extensions-usage-system"
                ],
                "kinds": [
                  {
                    "apiGroups": [
                      ""
                    ],
                    "kinds": [
                      "Pod"
                    ]
                  }
                ],
                "source": "Original"
              },
              "parameters": {
                "excludedContainers": [],
                "excludedImages": []
              }
            },
            "status": {
              "auditTimestamp": "2025-04-14T13:53:39Z",
              "byPod": [
                {
                  "constraintUID": "6be38cf2-7650-4933-87aa-4c48a42e248e",
                  "enforced": true,
                  "id": "gatekeeper-audit-77858c8f69-ft76n",
                  "observedGeneration": 1,
                  "operations": [
                    "audit",
                    "generate",
                    "mutation-status",
                    "status"
                  ]
                },
                {
                  "constraintUID": "6be38cf2-7650-4933-87aa-4c48a42e248e",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-5tggw",
                  "observedGeneration": 1,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                },
                {
                  "constraintUID": "6be38cf2-7650-4933-87aa-4c48a42e248e",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-t4rtc",
                  "observedGeneration": 1,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                }
              ],
              "totalViolations": 0
            }
          },
          {
            "apiVersion": "constraints.gatekeeper.sh/v1beta1",
            "kind": "K8sAzureV3AllowedCapabilities",
            "metadata": {
              "annotations": {
                "azure-policy-assignment-id": "/subscriptions/ee360ac1-ac8d-45c9-9bcf-76d19ae08a33/resourcegroups/rg-aks-0402-dev-uks/providers/Microsoft.Authorization/policyAssignments/aks-Baseline-0402-dev-uks",
                "azure-policy-definition-id": "/providers/Microsoft.Authorization/policyDefinitions/c26596ff-4d70-4e6a-9a30-c2506bd2f80c",
                "azure-policy-definition-reference-id": "ContainerCapabilities",
                "azure-policy-definition-version": "6.2.0",
                "azure-policy-set-definition-id": "/providers/Microsoft.Authorization/policySetDefinitions/a8640138-9b0a-4a28-b8cb-1666c838647d",
                "azure-policy-set-definition-version": "1.4.0",
                "constraint-installed-by": "azure-policy-addon"
              },
              "creationTimestamp": "2025-02-04T19:38:55Z",
              "generation": 5,
              "labels": {
                "managed-by": "azure-policy-addon"
              },
              "name": "azurepolicy-k8sazurev3allowedcapabilities-01525b03dc4912849505",
              "resourceVersion": "20030157",
              "uid": "cae55d0b-88ba-4f4f-91e9-168c1d7c053b"
            },
            "spec": {
              "enforcementAction": "dryrun",
              "match": {
                "excludedNamespaces": [
                  "kube-system",
                  "gatekeeper-system",
                  "azure-arc"
                ],
                "kinds": [
                  {
                    "apiGroups": [
                      ""
                    ],
                    "kinds": [
                      "Pod"
                    ]
                  }
                ],
                "source": "Original"
              },
              "parameters": {
                "allowedCapabilities": [
                  "CHOWN",
                  "DAC_OVERRIDE",
                  "FSETID",
                  "FOWNER",
                  "MKNOD",
                  "NET_RAW",
                  "SETGID",
                  "SETUID",
                  "SETFCAP",
                  "SETPCAP",
                  "NET_BIND_SERVICE",
                  "SYS_CHROOT",
                  "KILL",
                  "AUDIT_WRITE"
                ],
                "excludedContainers": [],
                "excludedImages": [],
                "requiredDropCapabilities": []
              }
            },
            "status": {
              "auditTimestamp": "2025-04-14T13:53:39Z",
              "byPod": [
                {
                  "constraintUID": "cae55d0b-88ba-4f4f-91e9-168c1d7c053b",
                  "enforced": true,
                  "id": "gatekeeper-audit-77858c8f69-ft76n",
                  "observedGeneration": 5,
                  "operations": [
                    "audit",
                    "generate",
                    "mutation-status",
                    "status"
                  ]
                },
                {
                  "constraintUID": "cae55d0b-88ba-4f4f-91e9-168c1d7c053b",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-5tggw",
                  "observedGeneration": 5,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                },
                {
                  "constraintUID": "cae55d0b-88ba-4f4f-91e9-168c1d7c053b",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-t4rtc",
                  "observedGeneration": 5,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                }
              ],
              "totalViolations": 4,
              "violations": [
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <istio-init> has a disallowed capability. Allowed capabilities are [\"CHOWN\", \"DAC_OVERRIDE\", \"FSETID\", \"FOWNER\", \"MKNOD\", \"NET_RAW\", \"SETGID\", \"SETUID\", \"SETFCAP\", \"SETPCAP\", \"NET_BIND_SERVICE\", \"SYS_CHROOT\", \"KILL\", \"AUDIT_WRITE\"]",
                  "name": "store-front-658994fd95-8b7jr",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <istio-init> has a disallowed capability. Allowed capabilities are [\"CHOWN\", \"DAC_OVERRIDE\", \"FSETID\", \"FOWNER\", \"MKNOD\", \"NET_RAW\", \"SETGID\", \"SETUID\", \"SETFCAP\", \"SETPCAP\", \"NET_BIND_SERVICE\", \"SYS_CHROOT\", \"KILL\", \"AUDIT_WRITE\"]",
                  "name": "rabbitmq-0",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <istio-init> has a disallowed capability. Allowed capabilities are [\"CHOWN\", \"DAC_OVERRIDE\", \"FSETID\", \"FOWNER\", \"MKNOD\", \"NET_RAW\", \"SETGID\", \"SETUID\", \"SETFCAP\", \"SETPCAP\", \"NET_BIND_SERVICE\", \"SYS_CHROOT\", \"KILL\", \"AUDIT_WRITE\"]",
                  "name": "product-service-5dd87dfb8-h4495",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <istio-init> has a disallowed capability. Allowed capabilities are [\"CHOWN\", \"DAC_OVERRIDE\", \"FSETID\", \"FOWNER\", \"MKNOD\", \"NET_RAW\", \"SETGID\", \"SETUID\", \"SETFCAP\", \"SETPCAP\", \"NET_BIND_SERVICE\", \"SYS_CHROOT\", \"KILL\", \"AUDIT_WRITE\"]",
                  "name": "order-service-6c5bfb6946-9jjrw",
                  "namespace": "pets",
                  "version": "v1"
                }
              ]
            }
          },
          {
            "apiVersion": "constraints.gatekeeper.sh/v1beta1",
            "kind": "K8sAzureV3AllowedCapabilities",
            "metadata": {
              "annotations": {
                "azure-policy-assignment-id": "/subscriptions/ee360ac1-ac8d-45c9-9bcf-76d19ae08a33/providers/Microsoft.Authorization/policyAssignments/securitycenterbuiltin",
                "azure-policy-definition-id": "/providers/Microsoft.Authorization/policyDefinitions/c26596ff-4d70-4e6a-9a30-c2506bd2f80c",
                "azure-policy-definition-reference-id": "AllowedCapabilitiesInKubernetesCluster",
                "azure-policy-definition-version": "6.2.0",
                "azure-policy-set-definition-id": "/providers/Microsoft.Authorization/policySetDefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8",
                "azure-policy-set-definition-version": "57.49.0",
                "constraint-installed-by": "azure-policy-addon"
              },
              "creationTimestamp": "2025-02-04T19:23:54Z",
              "generation": 1,
              "labels": {
                "managed-by": "azure-policy-addon"
              },
              "name": "azurepolicy-k8sazurev3allowedcapabilities-b51327eb590c724ae88a",
              "resourceVersion": "20030174",
              "uid": "33c490e8-e473-4604-9126-9015eaddebb6"
            },
            "spec": {
              "enforcementAction": "dryrun",
              "match": {
                "excludedNamespaces": [
                  "kube-system",
                  "gatekeeper-system",
                  "azure-arc",
                  "azuredefender",
                  "mdc",
                  "azure-extensions-usage-system"
                ],
                "kinds": [
                  {
                    "apiGroups": [
                      ""
                    ],
                    "kinds": [
                      "Pod"
                    ]
                  }
                ],
                "source": "Original"
              },
              "parameters": {
                "allowedCapabilities": [],
                "excludedContainers": [],
                "excludedImages": [],
                "requiredDropCapabilities": []
              }
            },
            "status": {
              "auditTimestamp": "2025-04-14T13:53:39Z",
              "byPod": [
                {
                  "constraintUID": "33c490e8-e473-4604-9126-9015eaddebb6",
                  "enforced": true,
                  "id": "gatekeeper-audit-77858c8f69-ft76n",
                  "observedGeneration": 1,
                  "operations": [
                    "audit",
                    "generate",
                    "mutation-status",
                    "status"
                  ]
                },
                {
                  "constraintUID": "33c490e8-e473-4604-9126-9015eaddebb6",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-5tggw",
                  "observedGeneration": 1,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                },
                {
                  "constraintUID": "33c490e8-e473-4604-9126-9015eaddebb6",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-t4rtc",
                  "observedGeneration": 1,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                }
              ],
              "totalViolations": 4,
              "violations": [
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <istio-init> has a disallowed capability. Allowed capabilities are []",
                  "name": "store-front-658994fd95-8b7jr",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <istio-init> has a disallowed capability. Allowed capabilities are []",
                  "name": "rabbitmq-0",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <istio-init> has a disallowed capability. Allowed capabilities are []",
                  "name": "product-service-5dd87dfb8-h4495",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <istio-init> has a disallowed capability. Allowed capabilities are []",
                  "name": "order-service-6c5bfb6946-9jjrw",
                  "namespace": "pets",
                  "version": "v1"
                }
              ]
            }
          },
          {
            "apiVersion": "constraints.gatekeeper.sh/v1beta1",
            "kind": "K8sAzureV3AllowedUsersGroups",
            "metadata": {
              "annotations": {
                "azure-policy-assignment-id": "/subscriptions/ee360ac1-ac8d-45c9-9bcf-76d19ae08a33/providers/Microsoft.Authorization/policyAssignments/securitycenterbuiltin",
                "azure-policy-definition-id": "/providers/Microsoft.Authorization/policyDefinitions/f06ddb64-5fa3-4b77-b166-acb36f7f6042",
                "azure-policy-definition-reference-id": "MustRunAsNonRoot",
                "azure-policy-definition-version": "6.2.0",
                "azure-policy-set-definition-id": "/providers/Microsoft.Authorization/policySetDefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8",
                "azure-policy-set-definition-version": "57.49.0",
                "constraint-installed-by": "azure-policy-addon"
              },
              "creationTimestamp": "2025-02-04T19:23:55Z",
              "generation": 1,
              "labels": {
                "managed-by": "azure-policy-addon"
              },
              "name": "azurepolicy-k8sazurev3allowedusersgroups-2cb3ccbb789ebdd1869a",
              "resourceVersion": "20030152",
              "uid": "5dafbb4a-aabd-4229-abbd-75a12da7a572"
            },
            "spec": {
              "enforcementAction": "dryrun",
              "match": {
                "excludedNamespaces": [
                  "kube-system",
                  "gatekeeper-system",
                  "azure-arc",
                  "azuredefender",
                  "mdc",
                  "azure-extensions-usage-system"
                ],
                "kinds": [
                  {
                    "apiGroups": [
                      ""
                    ],
                    "kinds": [
                      "Pod"
                    ]
                  }
                ],
                "source": "Original"
              },
              "parameters": {
                "excludedContainers": [],
                "excludedImages": [],
                "fsGroup": {
                  "ranges": [
                    {
                      "max": -1,
                      "min": 1
                    }
                  ],
                  "rule": "MayRunAs"
                },
                "runAsGroup": {
                  "ranges": [
                    {
                      "max": -1,
                      "min": 1
                    }
                  ],
                  "rule": "MustRunAs"
                },
                "runAsUser": {
                  "ranges": [],
                  "rule": "MustRunAsNonRoot"
                },
                "supplementalGroups": {
                  "ranges": [
                    {
                      "max": -1,
                      "min": 1
                    }
                  ],
                  "rule": "MayRunAs"
                }
              }
            },
            "status": {
              "auditTimestamp": "2025-04-14T13:53:39Z",
              "byPod": [
                {
                  "constraintUID": "5dafbb4a-aabd-4229-abbd-75a12da7a572",
                  "enforced": true,
                  "id": "gatekeeper-audit-77858c8f69-ft76n",
                  "observedGeneration": 1,
                  "operations": [
                    "audit",
                    "generate",
                    "mutation-status",
                    "status"
                  ]
                },
                {
                  "constraintUID": "5dafbb4a-aabd-4229-abbd-75a12da7a572",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-5tggw",
                  "observedGeneration": 1,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                },
                {
                  "constraintUID": "5dafbb4a-aabd-4229-abbd-75a12da7a572",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-t4rtc",
                  "observedGeneration": 1,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                }
              ],
              "totalViolations": 72,
              "violations": [
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container webserver-simple is attempting to run without a required securityContext/runAsNonRoot or securityContext/runAsUser != 0",
                  "name": "simple-deployment-74fd649f8d-lgft6",
                  "namespace": "test",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container webserver-simple is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "simple-deployment-74fd649f8d-lgft6",
                  "namespace": "test",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container webserver-simple is attempting to run without a required securityContext/runAsNonRoot or securityContext/runAsUser != 0",
                  "name": "simple-deployment-74fd649f8d-66bwl",
                  "namespace": "sealed-secrets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container webserver-simple is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "simple-deployment-74fd649f8d-66bwl",
                  "namespace": "sealed-secrets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container webserver-simple is attempting to run without a required securityContext/runAsNonRoot or securityContext/runAsUser != 0",
                  "name": "simple-deployment-74fd649f8d-6r55l",
                  "namespace": "prometheus",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container webserver-simple is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "simple-deployment-74fd649f8d-6r55l",
                  "namespace": "prometheus",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container store-front is attempting to run without a required securityContext/runAsNonRoot or securityContext/runAsUser != 0",
                  "name": "store-front-658994fd95-8b7jr",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container store-front is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "store-front-658994fd95-8b7jr",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container istio-init is attempting to run as disallowed user 0. Allowed runAsUser: {\"ranges\": [], \"rule\": \"MustRunAsNonRoot\"}",
                  "name": "store-front-658994fd95-8b7jr",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container istio-init is attempting to run as disallowed group 0. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "store-front-658994fd95-8b7jr",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container rabbitmq is attempting to run without a required securityContext/runAsNonRoot or securityContext/runAsUser != 0",
                  "name": "rabbitmq-0",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container rabbitmq is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "rabbitmq-0",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container istio-init is attempting to run as disallowed user 0. Allowed runAsUser: {\"ranges\": [], \"rule\": \"MustRunAsNonRoot\"}",
                  "name": "rabbitmq-0",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container istio-init is attempting to run as disallowed group 0. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "rabbitmq-0",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container product-service is attempting to run without a required securityContext/runAsNonRoot or securityContext/runAsUser != 0",
                  "name": "product-service-5dd87dfb8-h4495",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container product-service is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "product-service-5dd87dfb8-h4495",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container istio-init is attempting to run as disallowed user 0. Allowed runAsUser: {\"ranges\": [], \"rule\": \"MustRunAsNonRoot\"}",
                  "name": "product-service-5dd87dfb8-h4495",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container istio-init is attempting to run as disallowed group 0. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "product-service-5dd87dfb8-h4495",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container wait-for-rabbitmq is attempting to run without a required securityContext/runAsNonRoot or securityContext/runAsUser != 0",
                  "name": "order-service-6c5bfb6946-9jjrw",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container wait-for-rabbitmq is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "order-service-6c5bfb6946-9jjrw",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container order-service is attempting to run without a required securityContext/runAsNonRoot or securityContext/runAsUser != 0",
                  "name": "order-service-6c5bfb6946-9jjrw",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container order-service is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "order-service-6c5bfb6946-9jjrw",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container istio-init is attempting to run as disallowed user 0. Allowed runAsUser: {\"ranges\": [], \"rule\": \"MustRunAsNonRoot\"}",
                  "name": "order-service-6c5bfb6946-9jjrw",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container istio-init is attempting to run as disallowed group 0. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "order-service-6c5bfb6946-9jjrw",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container webserver-simple is attempting to run without a required securityContext/runAsNonRoot or securityContext/runAsUser != 0",
                  "name": "simple-deployment-74fd649f8d-hf4dd",
                  "namespace": "nginx",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container webserver-simple is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "simple-deployment-74fd649f8d-hf4dd",
                  "namespace": "nginx",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container webserver-simple is attempting to run without a required securityContext/runAsNonRoot or securityContext/runAsUser != 0",
                  "name": "simple-deployment-74fd649f8d-5bztq",
                  "namespace": "linkerd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container webserver-simple is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "simple-deployment-74fd649f8d-5bztq",
                  "namespace": "linkerd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container webserver-simple is attempting to run without a required securityContext/runAsNonRoot or securityContext/runAsUser != 0",
                  "name": "simple-deployment-74fd649f8d-9d5gt",
                  "namespace": "kubeview",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container webserver-simple is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "simple-deployment-74fd649f8d-9d5gt",
                  "namespace": "kubeview",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container operator is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "kiali-operator-696bd54db-cv6fc",
                  "namespace": "kiali-operator",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container kiali is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "kiali-5b88cfb6f8-9wxkc",
                  "namespace": "kiali-operator",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container webserver-simple is attempting to run without a required securityContext/runAsNonRoot or securityContext/runAsUser != 0",
                  "name": "simple-deployment-74fd649f8d-f52jv",
                  "namespace": "grafana",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container webserver-simple is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "simple-deployment-74fd649f8d-f52jv",
                  "namespace": "grafana",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container webserver-simple is attempting to run without a required securityContext/runAsNonRoot or securityContext/runAsUser != 0",
                  "name": "simple-deployment-74fd649f8d-ps8ll",
                  "namespace": "cert-manager",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container webserver-simple is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "simple-deployment-74fd649f8d-ps8ll",
                  "namespace": "cert-manager",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container argocd-server is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "argocd-server-5df7b9f58d-rrxzz",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container argocd-server is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "argocd-server-5df7b9f58d-7s5qh",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container copyutil is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "argocd-repo-server-8568fc89b5-q2tbb",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container argocd-repo-server is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "argocd-repo-server-8568fc89b5-q2tbb",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container copyutil is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "argocd-repo-server-8568fc89b5-8r5mv",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container argocd-repo-server is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "argocd-repo-server-8568fc89b5-8r5mv",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container split-brain-fix is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "argocd-redis-ha-server-2",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container sentinel is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "argocd-redis-ha-server-2",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container redis is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "argocd-redis-ha-server-2",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container config-init is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "argocd-redis-ha-server-2",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container split-brain-fix is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "argocd-redis-ha-server-1",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container sentinel is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "argocd-redis-ha-server-1",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container redis is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "argocd-redis-ha-server-1",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container config-init is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "argocd-redis-ha-server-1",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container split-brain-fix is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "argocd-redis-ha-server-0",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container sentinel is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "argocd-redis-ha-server-0",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container redis is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "argocd-redis-ha-server-0",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container config-init is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "argocd-redis-ha-server-0",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container secret-init is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "argocd-redis-ha-haproxy-fb657456c-wl84v",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container haproxy is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "argocd-redis-ha-haproxy-fb657456c-wl84v",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container config-init is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "argocd-redis-ha-haproxy-fb657456c-wl84v",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container secret-init is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "argocd-redis-ha-haproxy-fb657456c-shwm7",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container haproxy is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "argocd-redis-ha-haproxy-fb657456c-shwm7",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container config-init is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "argocd-redis-ha-haproxy-fb657456c-shwm7",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container secret-init is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "argocd-redis-ha-haproxy-fb657456c-kj4kv",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container haproxy is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "argocd-redis-ha-haproxy-fb657456c-kj4kv",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container config-init is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "argocd-redis-ha-haproxy-fb657456c-kj4kv",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container argocd-notifications-controller is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "argocd-notifications-controller-6ff6bf8dd6-2jmv8",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container dex is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "argocd-dex-server-556c76889-kspcg",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container copyutil is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "argocd-dex-server-556c76889-kspcg",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container argocd-applicationset-controller is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "argocd-applicationset-controller-6fdf84dbb6-dxmmk",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container argocd-application-controller is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "argocd-application-controller-0",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container webserver-simple is attempting to run without a required securityContext/runAsNonRoot or securityContext/runAsUser != 0",
                  "name": "simple-deployment-74fd649f8d-xh6fc",
                  "namespace": "argo-workflows",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container webserver-simple is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "simple-deployment-74fd649f8d-xh6fc",
                  "namespace": "argo-workflows",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container webserver-simple is attempting to run without a required securityContext/runAsNonRoot or securityContext/runAsUser != 0",
                  "name": "simple-deployment-74fd649f8d-6nsqn",
                  "namespace": "argo-rollouts",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Container webserver-simple is attempting to run without a required securityContext/runAsGroup. Allowed runAsGroup: {\"ranges\": [{\"max\": -1, \"min\": 1}], \"rule\": \"MustRunAs\"}",
                  "name": "simple-deployment-74fd649f8d-6nsqn",
                  "namespace": "argo-rollouts",
                  "version": "v1"
                }
              ]
            }
          },
          {
            "apiVersion": "constraints.gatekeeper.sh/v1beta1",
            "kind": "K8sAzureV3ContainerLimits",
            "metadata": {
              "annotations": {
                "azure-policy-assignment-id": "/subscriptions/ee360ac1-ac8d-45c9-9bcf-76d19ae08a33/providers/Microsoft.Authorization/policyAssignments/securitycenterbuiltin",
                "azure-policy-definition-id": "/providers/Microsoft.Authorization/policyDefinitions/e345eecc-fa47-480f-9e88-67dcc122b164",
                "azure-policy-definition-reference-id": "memoryAndCPULimitsInKubernetesCluster",
                "azure-policy-definition-version": "9.3.0",
                "azure-policy-set-definition-id": "/providers/Microsoft.Authorization/policySetDefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8",
                "azure-policy-set-definition-version": "57.49.0",
                "constraint-installed-by": "azure-policy-addon"
              },
              "creationTimestamp": "2025-02-04T19:23:54Z",
              "generation": 1,
              "labels": {
                "managed-by": "azure-policy-addon"
              },
              "name": "azurepolicy-k8sazurev3containerlimits-53d4a426a9d80480a2de",
              "resourceVersion": "20030156",
              "uid": "ac3fcb02-2e1f-4477-aa2f-d5d9df6aad9b"
            },
            "spec": {
              "enforcementAction": "dryrun",
              "match": {
                "excludedNamespaces": [
                  "kube-system",
                  "gatekeeper-system",
                  "azure-arc",
                  "azuredefender",
                  "mdc",
                  "azure-extensions-usage-system"
                ],
                "kinds": [
                  {
                    "apiGroups": [
                      ""
                    ],
                    "kinds": [
                      "Pod"
                    ]
                  }
                ],
                "source": "Original"
              },
              "parameters": {
                "cpuLimit": "32",
                "excludedContainers": [],
                "excludedImages": [],
                "memoryLimit": "64Gi"
              }
            },
            "status": {
              "auditTimestamp": "2025-04-14T13:53:39Z",
              "byPod": [
                {
                  "constraintUID": "ac3fcb02-2e1f-4477-aa2f-d5d9df6aad9b",
                  "enforced": true,
                  "id": "gatekeeper-audit-77858c8f69-ft76n",
                  "observedGeneration": 1,
                  "operations": [
                    "audit",
                    "generate",
                    "mutation-status",
                    "status"
                  ]
                },
                {
                  "constraintUID": "ac3fcb02-2e1f-4477-aa2f-d5d9df6aad9b",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-5tggw",
                  "observedGeneration": 1,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                },
                {
                  "constraintUID": "ac3fcb02-2e1f-4477-aa2f-d5d9df6aad9b",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-t4rtc",
                  "observedGeneration": 1,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                }
              ],
              "totalViolations": 44,
              "violations": [
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <webserver-simple> has no resource limits",
                  "name": "simple-deployment-74fd649f8d-lgft6",
                  "namespace": "test",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <webserver-simple> has no resource limits",
                  "name": "simple-deployment-74fd649f8d-66bwl",
                  "namespace": "sealed-secrets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <webserver-simple> has no resource limits",
                  "name": "simple-deployment-74fd649f8d-6r55l",
                  "namespace": "prometheus",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <webserver-simple> has no resource limits",
                  "name": "simple-deployment-74fd649f8d-hf4dd",
                  "namespace": "nginx",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <webserver-simple> has no resource limits",
                  "name": "simple-deployment-74fd649f8d-5bztq",
                  "namespace": "linkerd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <webserver-simple> has no resource limits",
                  "name": "simple-deployment-74fd649f8d-9d5gt",
                  "namespace": "kubeview",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <operator> has no resource limits",
                  "name": "kiali-operator-696bd54db-cv6fc",
                  "namespace": "kiali-operator",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <kiali> has no cpu limit",
                  "name": "kiali-5b88cfb6f8-9wxkc",
                  "namespace": "kiali-operator",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <webserver-simple> has no resource limits",
                  "name": "simple-deployment-74fd649f8d-f52jv",
                  "namespace": "grafana",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <webserver-simple> has no resource limits",
                  "name": "simple-deployment-74fd649f8d-ps8ll",
                  "namespace": "cert-manager",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <argocd-server> has no resource limits",
                  "name": "argocd-server-5df7b9f58d-rrxzz",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <argocd-server> has no resource limits",
                  "name": "argocd-server-5df7b9f58d-7s5qh",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <copyutil> has no resource limits",
                  "name": "argocd-repo-server-8568fc89b5-q2tbb",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <argocd-repo-server> has no resource limits",
                  "name": "argocd-repo-server-8568fc89b5-q2tbb",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <copyutil> has no resource limits",
                  "name": "argocd-repo-server-8568fc89b5-8r5mv",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <argocd-repo-server> has no resource limits",
                  "name": "argocd-repo-server-8568fc89b5-8r5mv",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <split-brain-fix> has no resource limits",
                  "name": "argocd-redis-ha-server-2",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <sentinel> has no resource limits",
                  "name": "argocd-redis-ha-server-2",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <redis> has no resource limits",
                  "name": "argocd-redis-ha-server-2",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <config-init> has no resource limits",
                  "name": "argocd-redis-ha-server-2",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <split-brain-fix> has no resource limits",
                  "name": "argocd-redis-ha-server-1",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <sentinel> has no resource limits",
                  "name": "argocd-redis-ha-server-1",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <redis> has no resource limits",
                  "name": "argocd-redis-ha-server-1",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <config-init> has no resource limits",
                  "name": "argocd-redis-ha-server-1",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <split-brain-fix> has no resource limits",
                  "name": "argocd-redis-ha-server-0",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <sentinel> has no resource limits",
                  "name": "argocd-redis-ha-server-0",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <redis> has no resource limits",
                  "name": "argocd-redis-ha-server-0",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <config-init> has no resource limits",
                  "name": "argocd-redis-ha-server-0",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <secret-init> has no resource limits",
                  "name": "argocd-redis-ha-haproxy-fb657456c-wl84v",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <haproxy> has no resource limits",
                  "name": "argocd-redis-ha-haproxy-fb657456c-wl84v",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <config-init> has no resource limits",
                  "name": "argocd-redis-ha-haproxy-fb657456c-wl84v",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <secret-init> has no resource limits",
                  "name": "argocd-redis-ha-haproxy-fb657456c-shwm7",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <haproxy> has no resource limits",
                  "name": "argocd-redis-ha-haproxy-fb657456c-shwm7",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <config-init> has no resource limits",
                  "name": "argocd-redis-ha-haproxy-fb657456c-shwm7",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <secret-init> has no resource limits",
                  "name": "argocd-redis-ha-haproxy-fb657456c-kj4kv",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <haproxy> has no resource limits",
                  "name": "argocd-redis-ha-haproxy-fb657456c-kj4kv",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <config-init> has no resource limits",
                  "name": "argocd-redis-ha-haproxy-fb657456c-kj4kv",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <argocd-notifications-controller> has no resource limits",
                  "name": "argocd-notifications-controller-6ff6bf8dd6-2jmv8",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <dex> has no resource limits",
                  "name": "argocd-dex-server-556c76889-kspcg",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <copyutil> has no resource limits",
                  "name": "argocd-dex-server-556c76889-kspcg",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <argocd-applicationset-controller> has no resource limits",
                  "name": "argocd-applicationset-controller-6fdf84dbb6-dxmmk",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <argocd-application-controller> has no resource limits",
                  "name": "argocd-application-controller-0",
                  "namespace": "argocd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <webserver-simple> has no resource limits",
                  "name": "simple-deployment-74fd649f8d-xh6fc",
                  "namespace": "argo-workflows",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "container <webserver-simple> has no resource limits",
                  "name": "simple-deployment-74fd649f8d-6nsqn",
                  "namespace": "argo-rollouts",
                  "version": "v1"
                }
              ]
            }
          },
          {
            "apiVersion": "constraints.gatekeeper.sh/v1beta1",
            "kind": "K8sAzureV3DisallowedCapabilities",
            "metadata": {
              "annotations": {
                "azure-policy-assignment-id": "/subscriptions/ee360ac1-ac8d-45c9-9bcf-76d19ae08a33/providers/Microsoft.Authorization/policyAssignments/securitycenterbuiltin",
                "azure-policy-definition-id": "/providers/Microsoft.Authorization/policyDefinitions/d2e7ea85-6b44-4317-a0be-1b951587f626",
                "azure-policy-definition-reference-id": "KubernetesClustersShouldNotGrantCAPSYSADMINSecurityCapabilitiesMonitoringEffect",
                "azure-policy-definition-version": "5.1.0",
                "azure-policy-set-definition-id": "/providers/Microsoft.Authorization/policySetDefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8",
                "azure-policy-set-definition-version": "57.49.0",
                "constraint-installed-by": "azure-policy-addon"
              },
              "creationTimestamp": "2025-02-04T19:23:54Z",
              "generation": 1,
              "labels": {
                "managed-by": "azure-policy-addon"
              },
              "name": "azurepolicy-k8sazurev3disallowedcapabiliti-40f26632f25a27c26f16",
              "resourceVersion": "20030175",
              "uid": "cb229608-9506-4c1c-b90b-0ea285039082"
            },
            "spec": {
              "enforcementAction": "dryrun",
              "match": {
                "excludedNamespaces": [
                  "kube-system",
                  "gatekeeper-system",
                  "azure-arc",
                  "azuredefender",
                  "mdc",
                  "azure-extensions-usage-system"
                ],
                "kinds": [
                  {
                    "apiGroups": [
                      ""
                    ],
                    "kinds": [
                      "Pod"
                    ]
                  }
                ],
                "source": "Original"
              },
              "parameters": {
                "disallowedCapabilities": [
                  "SYS_ADMIN"
                ],
                "excludedContainers": [],
                "excludedImages": []
              }
            },
            "status": {
              "auditTimestamp": "2025-04-14T13:53:39Z",
              "byPod": [
                {
                  "constraintUID": "cb229608-9506-4c1c-b90b-0ea285039082",
                  "enforced": true,
                  "id": "gatekeeper-audit-77858c8f69-ft76n",
                  "observedGeneration": 1,
                  "operations": [
                    "audit",
                    "generate",
                    "mutation-status",
                    "status"
                  ]
                },
                {
                  "constraintUID": "cb229608-9506-4c1c-b90b-0ea285039082",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-5tggw",
                  "observedGeneration": 1,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                },
                {
                  "constraintUID": "cb229608-9506-4c1c-b90b-0ea285039082",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-t4rtc",
                  "observedGeneration": 1,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                }
              ],
              "totalViolations": 0
            }
          },
          {
            "apiVersion": "constraints.gatekeeper.sh/v1beta1",
            "kind": "K8sAzureV3EnforceAppArmor",
            "metadata": {
              "annotations": {
                "azure-policy-assignment-id": "/subscriptions/ee360ac1-ac8d-45c9-9bcf-76d19ae08a33/providers/Microsoft.Authorization/policyAssignments/securitycenterbuiltin",
                "azure-policy-definition-id": "/providers/Microsoft.Authorization/policyDefinitions/511f5417-5d12-434d-ab2e-816901e72a5e",
                "azure-policy-definition-reference-id": "AllowedAppArmorProfilesInKubernetesCluster",
                "azure-policy-definition-version": "6.2.0",
                "azure-policy-set-definition-id": "/providers/Microsoft.Authorization/policySetDefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8",
                "azure-policy-set-definition-version": "57.49.0",
                "constraint-installed-by": "azure-policy-addon"
              },
              "creationTimestamp": "2025-02-04T19:23:54Z",
              "generation": 1,
              "labels": {
                "managed-by": "azure-policy-addon"
              },
              "name": "azurepolicy-k8sazurev3enforceapparmor-7679c589518d93b5c7e7",
              "resourceVersion": "20030154",
              "uid": "79d5763a-be12-442e-b6cb-ea7b15582af3"
            },
            "spec": {
              "enforcementAction": "dryrun",
              "match": {
                "excludedNamespaces": [
                  "kube-system",
                  "gatekeeper-system",
                  "azure-arc",
                  "azuredefender",
                  "mdc",
                  "azure-extensions-usage-system"
                ],
                "kinds": [
                  {
                    "apiGroups": [
                      ""
                    ],
                    "kinds": [
                      "Pod"
                    ]
                  }
                ],
                "source": "Original"
              },
              "parameters": {
                "allowedProfiles": [
                  "runtime/default"
                ],
                "excludedContainers": [],
                "excludedImages": []
              }
            },
            "status": {
              "auditTimestamp": "2025-04-14T13:53:39Z",
              "byPod": [
                {
                  "constraintUID": "79d5763a-be12-442e-b6cb-ea7b15582af3",
                  "enforced": true,
                  "id": "gatekeeper-audit-77858c8f69-ft76n",
                  "observedGeneration": 1,
                  "operations": [
                    "audit",
                    "generate",
                    "mutation-status",
                    "status"
                  ]
                },
                {
                  "constraintUID": "79d5763a-be12-442e-b6cb-ea7b15582af3",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-5tggw",
                  "observedGeneration": 1,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                },
                {
                  "constraintUID": "79d5763a-be12-442e-b6cb-ea7b15582af3",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-t4rtc",
                  "observedGeneration": 1,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                }
              ],
              "totalViolations": 0
            }
          },
          {
            "apiVersion": "constraints.gatekeeper.sh/v1beta1",
            "kind": "K8sAzureV3HostFilesystem",
            "metadata": {
              "annotations": {
                "azure-policy-assignment-id": "/subscriptions/ee360ac1-ac8d-45c9-9bcf-76d19ae08a33/providers/Microsoft.Authorization/policyAssignments/securitycenterbuiltin",
                "azure-policy-definition-id": "/providers/Microsoft.Authorization/policyDefinitions/098fc59e-46c7-4d99-9b16-64990e543d75",
                "azure-policy-definition-reference-id": "AllowedHostPathVolumesInKubernetesCluster",
                "azure-policy-definition-version": "6.2.0",
                "azure-policy-set-definition-id": "/providers/Microsoft.Authorization/policySetDefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8",
                "azure-policy-set-definition-version": "57.49.0",
                "constraint-installed-by": "azure-policy-addon"
              },
              "creationTimestamp": "2025-02-04T19:23:55Z",
              "generation": 1,
              "labels": {
                "managed-by": "azure-policy-addon"
              },
              "name": "azurepolicy-k8sazurev3hostfilesystem-8305600d080e9ad2c327",
              "resourceVersion": "20030160",
              "uid": "0655a874-11b8-4822-85ef-935a11c3f897"
            },
            "spec": {
              "enforcementAction": "dryrun",
              "match": {
                "excludedNamespaces": [
                  "kube-system",
                  "gatekeeper-system",
                  "azure-arc",
                  "azuredefender",
                  "mdc",
                  "azure-extensions-usage-system"
                ],
                "kinds": [
                  {
                    "apiGroups": [
                      ""
                    ],
                    "kinds": [
                      "Pod"
                    ]
                  }
                ],
                "source": "Original"
              },
              "parameters": {
                "allowedHostPaths": [],
                "excludedContainers": [],
                "excludedImages": []
              }
            },
            "status": {
              "auditTimestamp": "2025-04-14T13:53:39Z",
              "byPod": [
                {
                  "constraintUID": "0655a874-11b8-4822-85ef-935a11c3f897",
                  "enforced": true,
                  "id": "gatekeeper-audit-77858c8f69-ft76n",
                  "observedGeneration": 1,
                  "operations": [
                    "audit",
                    "generate",
                    "mutation-status",
                    "status"
                  ]
                },
                {
                  "constraintUID": "0655a874-11b8-4822-85ef-935a11c3f897",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-5tggw",
                  "observedGeneration": 1,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                },
                {
                  "constraintUID": "0655a874-11b8-4822-85ef-935a11c3f897",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-t4rtc",
                  "observedGeneration": 1,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                }
              ],
              "totalViolations": 0
            }
          },
          {
            "apiVersion": "constraints.gatekeeper.sh/v1beta1",
            "kind": "K8sAzureV3HostFilesystem",
            "metadata": {
              "annotations": {
                "azure-policy-assignment-id": "/subscriptions/ee360ac1-ac8d-45c9-9bcf-76d19ae08a33/resourcegroups/rg-aks-0402-dev-uks/providers/Microsoft.Authorization/policyAssignments/aks-Baseline-0402-dev-uks",
                "azure-policy-definition-id": "/providers/Microsoft.Authorization/policyDefinitions/098fc59e-46c7-4d99-9b16-64990e543d75",
                "azure-policy-definition-reference-id": "NoHostPathVolume",
                "azure-policy-definition-version": "6.2.0",
                "azure-policy-set-definition-id": "/providers/Microsoft.Authorization/policySetDefinitions/a8640138-9b0a-4a28-b8cb-1666c838647d",
                "azure-policy-set-definition-version": "1.4.0",
                "constraint-installed-by": "azure-policy-addon"
              },
              "creationTimestamp": "2025-02-04T19:38:55Z",
              "generation": 5,
              "labels": {
                "managed-by": "azure-policy-addon"
              },
              "name": "azurepolicy-k8sazurev3hostfilesystem-c69805faac2a58931904",
              "resourceVersion": "20030162",
              "uid": "4109e574-88ce-4641-ab47-f488c8d90c65"
            },
            "spec": {
              "enforcementAction": "dryrun",
              "match": {
                "excludedNamespaces": [
                  "kube-system",
                  "gatekeeper-system",
                  "azure-arc"
                ],
                "kinds": [
                  {
                    "apiGroups": [
                      ""
                    ],
                    "kinds": [
                      "Pod"
                    ]
                  }
                ],
                "source": "Original"
              },
              "parameters": {
                "allowedHostPaths": [],
                "excludedContainers": [],
                "excludedImages": []
              }
            },
            "status": {
              "auditTimestamp": "2025-04-14T13:53:39Z",
              "byPod": [
                {
                  "constraintUID": "4109e574-88ce-4641-ab47-f488c8d90c65",
                  "enforced": true,
                  "id": "gatekeeper-audit-77858c8f69-ft76n",
                  "observedGeneration": 5,
                  "operations": [
                    "audit",
                    "generate",
                    "mutation-status",
                    "status"
                  ]
                },
                {
                  "constraintUID": "4109e574-88ce-4641-ab47-f488c8d90c65",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-5tggw",
                  "observedGeneration": 5,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                },
                {
                  "constraintUID": "4109e574-88ce-4641-ab47-f488c8d90c65",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-t4rtc",
                  "observedGeneration": 5,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                }
              ],
              "totalViolations": 0
            }
          },
          {
            "apiVersion": "constraints.gatekeeper.sh/v1beta1",
            "kind": "K8sAzureV3HostNetworkingPorts",
            "metadata": {
              "annotations": {
                "azure-policy-assignment-id": "/subscriptions/ee360ac1-ac8d-45c9-9bcf-76d19ae08a33/resourcegroups/rg-aks-0402-dev-uks/providers/Microsoft.Authorization/policyAssignments/aks-Baseline-0402-dev-uks",
                "azure-policy-definition-id": "/providers/Microsoft.Authorization/policyDefinitions/82985f06-dc18-4a48-bc1c-b9f4f0098cfe",
                "azure-policy-definition-reference-id": "BlockUsingHostNetwork",
                "azure-policy-definition-version": "6.2.0",
                "azure-policy-set-definition-id": "/providers/Microsoft.Authorization/policySetDefinitions/a8640138-9b0a-4a28-b8cb-1666c838647d",
                "azure-policy-set-definition-version": "1.4.0",
                "constraint-installed-by": "azure-policy-addon"
              },
              "creationTimestamp": "2025-02-04T19:38:55Z",
              "generation": 5,
              "labels": {
                "managed-by": "azure-policy-addon"
              },
              "name": "azurepolicy-k8sazurev3hostnetworkingports-57394a5938175881fac7",
              "resourceVersion": "20030172",
              "uid": "f49febe9-24e1-4673-bf31-b2ea20e91907"
            },
            "spec": {
              "enforcementAction": "dryrun",
              "match": {
                "excludedNamespaces": [
                  "kube-system",
                  "gatekeeper-system",
                  "azure-arc"
                ],
                "kinds": [
                  {
                    "apiGroups": [
                      ""
                    ],
                    "kinds": [
                      "Pod"
                    ]
                  }
                ],
                "source": "Original"
              },
              "parameters": {
                "allowHostNetwork": false,
                "excludedContainers": [],
                "excludedImages": [],
                "maxPort": 0,
                "minPort": 0
              }
            },
            "status": {
              "auditTimestamp": "2025-04-14T13:53:39Z",
              "byPod": [
                {
                  "constraintUID": "f49febe9-24e1-4673-bf31-b2ea20e91907",
                  "enforced": true,
                  "id": "gatekeeper-audit-77858c8f69-ft76n",
                  "observedGeneration": 5,
                  "operations": [
                    "audit",
                    "generate",
                    "mutation-status",
                    "status"
                  ]
                },
                {
                  "constraintUID": "f49febe9-24e1-4673-bf31-b2ea20e91907",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-5tggw",
                  "observedGeneration": 5,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                },
                {
                  "constraintUID": "f49febe9-24e1-4673-bf31-b2ea20e91907",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-t4rtc",
                  "observedGeneration": 5,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                }
              ],
              "totalViolations": 0
            }
          },
          {
            "apiVersion": "constraints.gatekeeper.sh/v1beta1",
            "kind": "K8sAzureV3HostNetworkingPorts",
            "metadata": {
              "annotations": {
                "azure-policy-assignment-id": "/subscriptions/ee360ac1-ac8d-45c9-9bcf-76d19ae08a33/providers/Microsoft.Authorization/policyAssignments/securitycenterbuiltin",
                "azure-policy-definition-id": "/providers/Microsoft.Authorization/policyDefinitions/82985f06-dc18-4a48-bc1c-b9f4f0098cfe",
                "azure-policy-definition-reference-id": "AllowedHostNetworkingAndPortsInKubernetesCluster",
                "azure-policy-definition-version": "6.2.0",
                "azure-policy-set-definition-id": "/providers/Microsoft.Authorization/policySetDefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8",
                "azure-policy-set-definition-version": "57.49.0",
                "constraint-installed-by": "azure-policy-addon"
              },
              "creationTimestamp": "2025-02-04T19:23:55Z",
              "generation": 1,
              "labels": {
                "managed-by": "azure-policy-addon"
              },
              "name": "azurepolicy-k8sazurev3hostnetworkingports-c25fdf2df8bc425a78f8",
              "resourceVersion": "20030150",
              "uid": "0c1c8d6c-ac7e-4629-81ba-bf6e9cae6c51"
            },
            "spec": {
              "enforcementAction": "dryrun",
              "match": {
                "excludedNamespaces": [
                  "kube-system",
                  "gatekeeper-system",
                  "azure-arc",
                  "azure-extensions-usage-system"
                ],
                "kinds": [
                  {
                    "apiGroups": [
                      ""
                    ],
                    "kinds": [
                      "Pod"
                    ]
                  }
                ],
                "source": "Original"
              },
              "parameters": {
                "allowHostNetwork": false,
                "excludedContainers": [],
                "excludedImages": [],
                "maxPort": 0,
                "minPort": 0
              }
            },
            "status": {
              "auditTimestamp": "2025-04-14T13:53:39Z",
              "byPod": [
                {
                  "constraintUID": "0c1c8d6c-ac7e-4629-81ba-bf6e9cae6c51",
                  "enforced": true,
                  "id": "gatekeeper-audit-77858c8f69-ft76n",
                  "observedGeneration": 1,
                  "operations": [
                    "audit",
                    "generate",
                    "mutation-status",
                    "status"
                  ]
                },
                {
                  "constraintUID": "0c1c8d6c-ac7e-4629-81ba-bf6e9cae6c51",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-5tggw",
                  "observedGeneration": 1,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                },
                {
                  "constraintUID": "0c1c8d6c-ac7e-4629-81ba-bf6e9cae6c51",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-t4rtc",
                  "observedGeneration": 1,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                }
              ],
              "totalViolations": 0
            }
          },
          {
            "apiVersion": "constraints.gatekeeper.sh/v1beta1",
            "kind": "K8sAzureV3NoPrivilegeEscalation",
            "metadata": {
              "annotations": {
                "azure-policy-assignment-id": "/subscriptions/ee360ac1-ac8d-45c9-9bcf-76d19ae08a33/providers/Microsoft.Authorization/policyAssignments/securitycenterbuiltin",
                "azure-policy-definition-id": "/providers/Microsoft.Authorization/policyDefinitions/1c6e92c9-99f0-4e55-9cf2-0c234dc48f99",
                "azure-policy-definition-reference-id": "NoPrivilegeEscalationInKubernetesCluster",
                "azure-policy-definition-version": "7.2.0",
                "azure-policy-set-definition-id": "/providers/Microsoft.Authorization/policySetDefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8",
                "azure-policy-set-definition-version": "57.49.0",
                "constraint-installed-by": "azure-policy-addon"
              },
              "creationTimestamp": "2025-02-04T19:23:55Z",
              "generation": 1,
              "labels": {
                "managed-by": "azure-policy-addon"
              },
              "name": "azurepolicy-k8sazurev3noprivilegeescalatio-95e6de6242430760e899",
              "resourceVersion": "20030164",
              "uid": "93a09a86-526d-41b1-9682-29c00c9df7ee"
            },
            "spec": {
              "enforcementAction": "dryrun",
              "match": {
                "excludedNamespaces": [
                  "kube-system",
                  "gatekeeper-system",
                  "azure-arc",
                  "azure-extensions-usage-system"
                ],
                "kinds": [
                  {
                    "apiGroups": [
                      ""
                    ],
                    "kinds": [
                      "Pod"
                    ]
                  }
                ],
                "source": "Original"
              },
              "parameters": {
                "excludedContainers": [],
                "excludedImages": []
              }
            },
            "status": {
              "auditTimestamp": "2025-04-14T13:53:39Z",
              "byPod": [
                {
                  "constraintUID": "93a09a86-526d-41b1-9682-29c00c9df7ee",
                  "enforced": true,
                  "id": "gatekeeper-audit-77858c8f69-ft76n",
                  "observedGeneration": 1,
                  "operations": [
                    "audit",
                    "generate",
                    "mutation-status",
                    "status"
                  ]
                },
                {
                  "constraintUID": "93a09a86-526d-41b1-9682-29c00c9df7ee",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-5tggw",
                  "observedGeneration": 1,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                },
                {
                  "constraintUID": "93a09a86-526d-41b1-9682-29c00c9df7ee",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-t4rtc",
                  "observedGeneration": 1,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                }
              ],
              "totalViolations": 0
            }
          },
          {
            "apiVersion": "constraints.gatekeeper.sh/v1beta1",
            "kind": "K8sAzureV3ReadOnlyRootFilesystem",
            "metadata": {
              "annotations": {
                "azure-policy-assignment-id": "/subscriptions/ee360ac1-ac8d-45c9-9bcf-76d19ae08a33/providers/Microsoft.Authorization/policyAssignments/securitycenterbuiltin",
                "azure-policy-definition-id": "/providers/Microsoft.Authorization/policyDefinitions/df49d893-a74c-421d-bc95-c663042e5b80",
                "azure-policy-definition-reference-id": "ReadOnlyRootFileSystemInKubernetesCluster",
                "azure-policy-definition-version": "6.3.0",
                "azure-policy-set-definition-id": "/providers/Microsoft.Authorization/policySetDefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8",
                "azure-policy-set-definition-version": "57.49.0",
                "constraint-installed-by": "azure-policy-addon"
              },
              "creationTimestamp": "2025-02-04T19:23:54Z",
              "generation": 1,
              "labels": {
                "managed-by": "azure-policy-addon"
              },
              "name": "azurepolicy-k8sazurev3readonlyrootfilesyst-9d4e42e87722f6a7f5d3",
              "resourceVersion": "20030168",
              "uid": "a1855773-5e5d-4905-bb9b-10f51b398343"
            },
            "spec": {
              "enforcementAction": "dryrun",
              "match": {
                "excludedNamespaces": [
                  "kube-system",
                  "gatekeeper-system",
                  "azure-arc",
                  "azuredefender",
                  "mdc",
                  "azure-extensions-usage-system"
                ],
                "kinds": [
                  {
                    "apiGroups": [
                      ""
                    ],
                    "kinds": [
                      "Pod"
                    ]
                  }
                ],
                "source": "Original"
              },
              "parameters": {
                "excludedContainers": [],
                "excludedImages": []
              }
            },
            "status": {
              "auditTimestamp": "2025-04-14T13:53:39Z",
              "byPod": [
                {
                  "constraintUID": "a1855773-5e5d-4905-bb9b-10f51b398343",
                  "enforced": true,
                  "id": "gatekeeper-audit-77858c8f69-ft76n",
                  "observedGeneration": 1,
                  "operations": [
                    "audit",
                    "generate",
                    "mutation-status",
                    "status"
                  ]
                },
                {
                  "constraintUID": "a1855773-5e5d-4905-bb9b-10f51b398343",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-5tggw",
                  "observedGeneration": 1,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                },
                {
                  "constraintUID": "a1855773-5e5d-4905-bb9b-10f51b398343",
                  "enforced": true,
                  "id": "gatekeeper-controller-6f97954b4b-t4rtc",
                  "observedGeneration": 1,
                  "operations": [
                    "mutation-webhook",
                    "webhook"
                  ]
                }
              ],
              "totalViolations": 19,
              "violations": [
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Readonly root filesystem is required for container. pod:'simple-deployment-74fd649f8d-lgft6', container:'webserver-simple'",
                  "name": "simple-deployment-74fd649f8d-lgft6",
                  "namespace": "test",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Readonly root filesystem is required for container. pod:'simple-deployment-74fd649f8d-66bwl', container:'webserver-simple'",
                  "name": "simple-deployment-74fd649f8d-66bwl",
                  "namespace": "sealed-secrets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Readonly root filesystem is required for container. pod:'simple-deployment-74fd649f8d-6r55l', container:'webserver-simple'",
                  "name": "simple-deployment-74fd649f8d-6r55l",
                  "namespace": "prometheus",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Readonly root filesystem is required for container. pod:'store-front-658994fd95-8b7jr', container:'store-front'",
                  "name": "store-front-658994fd95-8b7jr",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Readonly root filesystem is required for container. pod:'store-front-658994fd95-8b7jr', container:'istio-init'",
                  "name": "store-front-658994fd95-8b7jr",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Readonly root filesystem is required for container. pod:'rabbitmq-0', container:'rabbitmq'",
                  "name": "rabbitmq-0",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Readonly root filesystem is required for container. pod:'rabbitmq-0', container:'istio-init'",
                  "name": "rabbitmq-0",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Readonly root filesystem is required for container. pod:'product-service-5dd87dfb8-h4495', container:'product-service'",
                  "name": "product-service-5dd87dfb8-h4495",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Readonly root filesystem is required for container. pod:'product-service-5dd87dfb8-h4495', container:'istio-init'",
                  "name": "product-service-5dd87dfb8-h4495",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Readonly root filesystem is required for container. pod:'order-service-6c5bfb6946-9jjrw', container:'wait-for-rabbitmq'",
                  "name": "order-service-6c5bfb6946-9jjrw",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Readonly root filesystem is required for container. pod:'order-service-6c5bfb6946-9jjrw', container:'order-service'",
                  "name": "order-service-6c5bfb6946-9jjrw",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Readonly root filesystem is required for container. pod:'order-service-6c5bfb6946-9jjrw', container:'istio-init'",
                  "name": "order-service-6c5bfb6946-9jjrw",
                  "namespace": "pets",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Readonly root filesystem is required for container. pod:'simple-deployment-74fd649f8d-hf4dd', container:'webserver-simple'",
                  "name": "simple-deployment-74fd649f8d-hf4dd",
                  "namespace": "nginx",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Readonly root filesystem is required for container. pod:'simple-deployment-74fd649f8d-5bztq', container:'webserver-simple'",
                  "name": "simple-deployment-74fd649f8d-5bztq",
                  "namespace": "linkerd",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Readonly root filesystem is required for container. pod:'simple-deployment-74fd649f8d-9d5gt', container:'webserver-simple'",
                  "name": "simple-deployment-74fd649f8d-9d5gt",
                  "namespace": "kubeview",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Readonly root filesystem is required for container. pod:'simple-deployment-74fd649f8d-f52jv', container:'webserver-simple'",
                  "name": "simple-deployment-74fd649f8d-f52jv",
                  "namespace": "grafana",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Readonly root filesystem is required for container. pod:'simple-deployment-74fd649f8d-ps8ll', container:'webserver-simple'",
                  "name": "simple-deployment-74fd649f8d-ps8ll",
                  "namespace": "cert-manager",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Readonly root filesystem is required for container. pod:'simple-deployment-74fd649f8d-xh6fc', container:'webserver-simple'",
                  "name": "simple-deployment-74fd649f8d-xh6fc",
                  "namespace": "argo-workflows",
                  "version": "v1"
                },
                {
                  "enforcementAction": "dryrun",
                  "group": "",
                  "kind": "Pod",
                  "message": "Readonly root filesystem is required for container. pod:'simple-deployment-74fd649f8d-6nsqn', container:'webserver-simple'",
                  "name": "simple-deployment-74fd649f8d-6nsqn",
                  "namespace": "argo-rollouts",
                  "version": "v1"
                }
              ]
            }
          }
        ]
      }
    },
    "clusterName": "aks-0402-dev-uks",
    "score": 54.6
  }
}