NetApp / trident

Storage orchestrator for containers
Apache License 2.0
762 stars 222 forks source link

Pod Security policy feature for k8s version 1.29 #923

Open LeonardPoiana opened 2 months ago

LeonardPoiana commented 2 months ago

Hello,

We are trying to follow the security best practices in which a pod/container should not run as root. Considering this, we are trying to install the trident helm chart on k8s version 1.29 and we don't have the posibility to set the pod/container security policy via the values file. In order to use the helm chart smoothly and perform upgrades we belive that we should have this option integrated into the values file.

Thanks in advance.

Leonard Poiana DevOps Engineer

wonderland commented 2 months ago

As a driver (vs. a "normal" app), Trident will need specific privileges for operations such as mounting/unmounting volumes on the nodes. As Pod Security Policies are deprecated/removed since many K8s releases, Trident set the required Pod Security Standard pod-security.kubernetes.io/enforce: privileged label on its namespace. Pods are then defined to follow a least-privilege approach. For example, the security context of the trident-controller pod will drop all privileges, while the trident-node pods will add the required privileges that they specifically need.

Not exactly sure what you are trying to change, that should be surfaced in the Helm chart?