You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is your feature request related to a problem? Please describe.
Many clients require that the security settings for Kubernetes deployments are very strict. One example is setting the Pod Security Admission to restricted:
Running the default deployment with those settings will result in an error message and prevent the deployment from starting:
W0527 15:11:19.454889 105539 warnings.go:70] would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "srs-service" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "srs-service" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "srs-service" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "srs-service" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost")
Describe the solution you'd like
For all deployments (pega tiers, srs, pega-hazelcast/clustering-service, Constellation appstatic and messaging, etc.) it should be possible to specify a securityContext for the pod (this is already in place for many deployments) and for the container!
Describe alternatives you've considered
The only alternative that I can think of is downloading the helm charts and modifying the deployment templates.
The text was updated successfully, but these errors were encountered:
Hi @kishorv10 , #750 only provides the possibility to set the securityContext at the pod level, but not at the container level. Certain security restrictions (e.g. capabilities.drop "ALL") must be set at the container level. Hence the option to set the securityContext for containers is required.
…rvice and SRS (#806)
* ISSUE-761: Add containerSecurityPolicy to clustering-service deployment
(#761)
* ISSUE-761: Add securityPolicy and containerSecurityPolicy to SRS deployment
(#761)
* ISSUE-761: Improved comments in values.yaml files to give a more detailed example.
* ISSUE-761: Improved comments in values.yaml files to give a more detailed example.
Is your feature request related to a problem? Please describe.
Many clients require that the security settings for Kubernetes deployments are very strict. One example is setting the Pod Security Admission to restricted:
Running the default deployment with those settings will result in an error message and prevent the deployment from starting:
Describe the solution you'd like
For all deployments (pega tiers, srs, pega-hazelcast/clustering-service, Constellation appstatic and messaging, etc.) it should be possible to specify a securityContext for the pod (this is already in place for many deployments) and for the container!
Example:
Describe alternatives you've considered
The only alternative that I can think of is downloading the helm charts and modifying the deployment templates.
The text was updated successfully, but these errors were encountered: