You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I have a telegraf operator running in my kubernetes cluster, deployed via helm method. The operator is injecting the telegraf sidecar successfully with my application.
But, when I am deploying my application the Kyverno admission controller blocking the pods to run. This is happening due to kyverno policies like drop-all-capabilities, require-run-as-nonroot are getting violated.
I tried adding the securityContext via telegraf operator but looks like it is getting applied only to operator and not on the telegraf sidecar container.
Questions:
Is there any way (like annotations or something) to apply securityContext to telegraf sidecar container?
Can we configure the telegraf operator in such a way that it will know what and all securityContext to apply on injected telegraf container?
Please provide solution asap as this seems as blocker.
The text was updated successfully, but these errors were encountered:
Vineet2530
changed the title
[Blocker] Kyverno admission controller blocking telegraf container restricting the application to comeup.
[Blocker] Kyverno admission controller blocking telegraf container restricting the podsto run.
Aug 26, 2024
Vineet2530
changed the title
[Blocker] Kyverno admission controller blocking telegraf container restricting the podsto run.
[Blocker] Kyverno admission controller blocking telegraf container restricting the pods to run.
Aug 26, 2024
Vineet2530
changed the title
[Blocker] Kyverno admission controller blocking telegraf container restricting the pods to run.
[Blocker] Kyverno admission controller blocking the telegraf container restricting the pods to run due to securityContext.
Aug 26, 2024
Describe the issue here.
Problem :
I have a telegraf operator running in my kubernetes cluster, deployed via helm method. The operator is injecting the telegraf sidecar successfully with my application.
But, when I am deploying my application the Kyverno admission controller blocking the pods to run. This is happening due to kyverno policies like drop-all-capabilities, require-run-as-nonroot are getting violated.
I tried adding the securityContext via telegraf operator but looks like it is getting applied only to operator and not on the telegraf sidecar container.
Questions:
Please provide solution asap as this seems as blocker.
Relevant URLs
What products and version are you using?
telegraf version: 1.22
chart used for deployment: https://github.com/influxdata/helm-charts/blob/master/charts/telegraf-operator/values.yaml
The text was updated successfully, but these errors were encountered: