-
Couldn't load subscription status.
- Fork 83
Update readme about nri.sock and SELinux #219
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Update readme about nri.sock and SELinux #219
Conversation
Signed-off-by: Neeraj Krishna Gopalakrishna <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you ! LGTM.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
suggest adding a couple sentences that describes the expected error that will get generated and what the problem is... volume mounting a host level socket between the pod and the container runtime..
This way seems like a big hammer.. is there any other way to make it work? selinux mount label maybe?
| and [best practices](https://kubernetes.io/docs/setup/best-practices/enforcing-pod-security-standards/) | ||
| about Kubernetes security. | ||
|
|
||
| To use the plugins in SELinux-enabled environments, either create a new policy |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| To use the plugins in SELinux-enabled environments, either create a new policy | |
| One expected path for running NRI plugins is to run them as a pod/container in a daemonset on each of the nodes of a cluster. | |
| ### SELinux enabled environments | |
| NOTE: To run the plugins, as a pod, in `SELinux-enabled` environments the kubernetes security level assigned to the pod MUST |
pod security policies have been deprecated .. they've become levels assigned or via controller.. it's confusing :-)
| about Kubernetes security. | ||
|
|
||
| To use the plugins in SELinux-enabled environments, either create a new policy | ||
| or set the SELinux type to spc_t (Super Privileged Container) in the pod's security |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| or set the SELinux type to spc_t (Super Privileged Container) in the pod's security | |
| set the SELinux type label to spc_t (Super Privileged Container) in the pod's security |
In environments like OpenShift, its required to configure SELinux in security context. Hence added a small readme update.