You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Additional security. It is a best practice in security to run container with a minimum required securityContext. Many kubernetes users, including us, have constraints in cluster prohibiting high privileges.
akorp
changed the title
Set allowPrivilegeEscalation to false on namespace-metadata job container
Set allowPrivilegeEscalation/readOnlyRootFilesystem on namespace-metadata job container
Sep 22, 2022
akorp
changed the title
Set allowPrivilegeEscalation/readOnlyRootFilesystem on namespace-metadata job container
Set securityContext on namespace-metadata job container
Sep 22, 2022
What problem are you trying to solve?
Additional security. It is a best practice in security to run container with a minimum required
securityContext
. Many kubernetes users, including us, have constraints in cluster prohibiting high privileges.How should the problem be solved?
Add
securityContext
for the namespace-metadata job.As described at #6638, image might change in the future, but any image unlikely to require high privileges for its taks described in PR.
Any alternatives you've considered?
Could not find other alternatives for the described solution.
How would users interact with this feature?
No response
Would you like to work on this feature?
No response
The text was updated successfully, but these errors were encountered: