You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
To improve the security of the SPIFFE pods it would be great if we can adjust the securityContext recommendation to run with a unique UID.
Checking many out of the box installations of other charts they are using runAsUser: 1000, therefore we should pick some UIDs that are not that commonly used to reduce the chance there is potential overlap with other pods in the cluster.
See below my setup to configure the podSecurityContext for each component.
OpenShift allocates unique uids to each namespace out of the box. So we're kind of supporting this model already in some environments. So it should be possible to make it work more widely.
The csi-driver is very special. It needs to interact with kubelet so uid switching is tricky. If wrong it cant write to the host filesystem or kubelet sockets properly.
The spire-agent to some extent is in the same boat.
To improve the security of the SPIFFE pods it would be great if we can adjust the securityContext recommendation to run with a unique UID.
Checking many out of the box installations of other charts they are using
runAsUser: 1000
, therefore we should pick some UIDs that are not that commonly used to reduce the chance there is potential overlap with other pods in the cluster.See below my setup to configure the podSecurityContext for each component.
Note
We should decide on a range of UIDs to use for spire pods, so don't take above example as leading.
I also noticed the spiffe-csi-driver doesn't have a podSecurityContext.
Tried adding that.
this unfortunately breaks the csi driver.
See
Would it be possible to make this work with a podSecurityContext?
The text was updated successfully, but these errors were encountered: