Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add default seccomp profile for Managed/Core Components #2116

Closed
TheoBrigitte opened this issue Mar 7, 2023 · 3 comments
Closed

Add default seccomp profile for Managed/Core Components #2116

TheoBrigitte opened this issue Mar 7, 2023 · 3 comments

Comments

@TheoBrigitte
Copy link
Member

TheoBrigitte commented Mar 7, 2023

From @Strigix

As part of the roadmap issue #259
Managed applications and core components need to have a default seccomp profile set.

Some repositories have already gotten the required changes. For team Atlas the ones we'd like you ask you to do are:

  • Grafana
  • kube-state-metrics
  • macropower-analytics-panel-server
  • prometheus-meta-operator

Step by step you'll need to at at least:

  1. Set seccompprofile on RuntimeDefault in container and pod security context
  2. Allow the use of said profiles in the PSP
  3. Allow the use of the proper volumes in the PSP (Otherwise pods will have trouble running see: Add Seccomp default profile to managed apps and core components #259 (comment))

Here's an example for step 1 and 2:
giantswarm/node-operator@d0c8f18

Here's an example for step 3:
giantswarm/dns-operator-route53@e751393

NOTE: These are the volumes allowed by the restricted PSP as an example, your applications might not need them all, or needs others. We've seen most issues with the volumes Secrets, Projected, and ConfigMap.

@TheoBrigitte
Copy link
Member Author

How important is this @Strigix ?

@Strigix
Copy link

Strigix commented Mar 9, 2023

It gets more important the closer we are to deprecating PSP.
After we set Kyverno on 'enforce' and move away from PSP these components will be not be able to run in clusters without having at least a DefaultRuntime seccomp profile set.

@QuentinBisson
Copy link

@TheoBrigitte I think we're done as we have no policy violations on 19.1.0 release anymore

@TheoBrigitte TheoBrigitte changed the title Managed/Core Components need default seccomp profile set. Add default seccomp profile for Managed/Core Components Nov 10, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants