-
Notifications
You must be signed in to change notification settings - Fork 146
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Assigning RuntimeDefault
AppArmor profile to pods/containers when strict security is enabled breaks on hosts w/o AppArmor
#1120
Labels
bug
Something isn't working
waiting for release
The change was merged to upstream, but wasn't released yet.
Comments
jfroy
changed the title
Assigning non-unconfined AppArmor profile to pods/containers when strict security is enabled breaks on hosts w/o AppArmor
Assigning RuntimeDefault AppArmor profile to pods/containers when strict security is enabled breaks on hosts w/o AppArmor
Sep 30, 2024
jfroy
changed the title
Assigning RuntimeDefault AppArmor profile to pods/containers when strict security is enabled breaks on hosts w/o AppArmor
Assigning Sep 30, 2024
RuntimeDefault
AppArmor profile to pods/containers when strict security is enabled breaks on hosts w/o AppArmor
Maybe, it's better to remove default AppArmor value. Main motivation for it adding it was default security rules for cloud providers. |
f41gh7
added a commit
that referenced
this issue
Oct 15, 2024
It allow to use strictSecurity with hosts without AppArmor and Seccomp (windows nodes for instance). This change doesn't affect security, neither adds breaking changes, since AppArmor and Seccomp are rarely used. And set by default to the same values, as operator added. Related issue #1120 Signed-off-by: f41gh7 <nik@victoriametrics.com>
f41gh7
added a commit
that referenced
this issue
Oct 15, 2024
…lts (#1129) It allow to use strictSecurity with hosts without AppArmor and Seccomp (windows nodes for instance). This change doesn't affect security, neither adds breaking changes, since AppArmor and Seccomp are rarely used. And set by default to the same values, as operator added. Related issue #1120 Signed-off-by: f41gh7 <nik@victoriametrics.com>
f41gh7
added
the
waiting for release
The change was merged to upstream, but wasn't released yet.
label
Oct 15, 2024
Issue must be fixed at v0.48.4 release |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
bug
Something isn't working
waiting for release
The change was merged to upstream, but wasn't released yet.
The operator assigns the special
RuntimeDefault
AppArmor profile on pods and containers when strict security is enabled. On any hosts where AppArmor is not enabled, the pod will be rejected by kubelet's AppArmor admission handler, with the error "Cannot enforce AppArmor: AppArmor is not enabled on the host". This needs to be made configurable, as not all clusters will have AppArmor enabled on all hosts.The text was updated successfully, but these errors were encountered: