I've had success using udica to craft the selinux policy that can then be applied to
the container using the --security-opt flag.
See this blog post:
https://fedoramagazine.org/use-udica-to-build-selinux-policy-for-containers/
The only place I've noticed udica falling short is running a pod of multiple
containers that are all communicating with each other. In this instance I had to start the
pod and monitor audit.log for avc denials and then manually update the udica generated
.cil file.