-
Notifications
You must be signed in to change notification settings - Fork 430
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add pod security admission labels to CAPZ provider namespace #2800
Comments
For propably more context: https://kubernetes.slack.com/archives/CEX9HENG7/p1667559556085549 |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
This was implemented in: Thus closing. Worth a note is that CAPZ can be improved from security perspective after: was implemented, by using the policy /close |
@chrischdi: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/kind feature
Describe the solution you'd like
[A clear and concise description of what you want to happen.]
As an operator I would like to set the baseline to enforce at the pod security admission configuration on my management cluster for operating a secure management cluster.
Currently when using CAPI with CAPZ, all capi namespaces except capz-system are compliant to the baseline pod security admission profile.
Anything else you would like to add:
[Miscellaneous information that will assist in solving the issue.]
As long as the DaemonSet
capz-nmi
is part of the capz provisioning, the namespacecapz-system
will require theprivileged
profile, because it makes use of hostPath volumes and runs as root user.It is possible to set the cluster-wide enforce policy to
baseline
when provisioning CAPD using one of the following approaches:capz-system
namespace to enforce, audit and warn onprivileged
.capz-system
namespace to the namespace excemptions in the pod security admission configuration.I would propose to go with solution 1 (as also done for CAPD kubernetes-sigs/cluster-api#7446) and add the following labels to the
capz-system
namespace at the namespace.yaml resource file:enforce: baseline
for the whole management cluster to test compatibility of CAPZ to the baseline profile (The config will need to exceptkube-system
becausekube-system
will almost always require the privileged profile for CNI related daemonsets).Additional information:
Environment:
kubectl version
):/etc/os-release
):The text was updated successfully, but these errors were encountered: