Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
fix: Enable unprivileged ports sysctl in containerd config (#1099)
This enabled pods to run as non-root and bind to privileged ports as long as they have the necessary capability, `CAP_NET_BIND_SERVICE` added. This fixes an issue on AWS when bringing up coredns which binds to port 53 but runs as an unprivileged user. Overall this is a net security improvement for clusters, meaning users can stop giving too many privileged to pods - see kubernetes/kubernetes#102612 for discussion.
- Loading branch information