Skip to content

Conversation

@ngopalak-redhat
Copy link
Contributor

In environments like OpenShift, its required to configure SELinux in security context. Hence added a small readme update.

Signed-off-by: Neeraj Krishna Gopalakrishna <[email protected]>
Copy link
Member

@klihub klihub left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you ! LGTM.

@klihub klihub requested a review from chrishenzie August 29, 2025 06:21
Copy link
Member

@mikebrow mikebrow left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

suggest adding a couple sentences that describes the expected error that will get generated and what the problem is... volume mounting a host level socket between the pod and the container runtime..

This way seems like a big hammer.. is there any other way to make it work? selinux mount label maybe?

and [best practices](https://kubernetes.io/docs/setup/best-practices/enforcing-pod-security-standards/)
about Kubernetes security.

To use the plugins in SELinux-enabled environments, either create a new policy
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
To use the plugins in SELinux-enabled environments, either create a new policy
One expected path for running NRI plugins is to run them as a pod/container in a daemonset on each of the nodes of a cluster.
### SELinux enabled environments
NOTE: To run the plugins, as a pod, in `SELinux-enabled` environments the kubernetes security level assigned to the pod MUST

pod security policies have been deprecated .. they've become levels assigned or via controller.. it's confusing :-)

about Kubernetes security.

To use the plugins in SELinux-enabled environments, either create a new policy
or set the SELinux type to spc_t (Super Privileged Container) in the pod's security
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
or set the SELinux type to spc_t (Super Privileged Container) in the pod's security
set the SELinux type label to spc_t (Super Privileged Container) in the pod's security

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants