Open LeonardPoiana opened 2 months ago
As a driver (vs. a "normal" app), Trident will need specific privileges for operations such as mounting/unmounting volumes on the nodes. As Pod Security Policies are deprecated/removed since many K8s releases, Trident set the required Pod Security Standard pod-security.kubernetes.io/enforce: privileged
label on its namespace. Pods are then defined to follow a least-privilege approach. For example, the security context of the trident-controller pod will drop all privileges, while the trident-node pods will add the required privileges that they specifically need.
Not exactly sure what you are trying to change, that should be surfaced in the Helm chart?
Hello,
We are trying to follow the security best practices in which a pod/container should not run as root. Considering this, we are trying to install the trident helm chart on k8s version 1.29 and we don't have the posibility to set the pod/container security policy via the values file. In order to use the helm chart smoothly and perform upgrades we belive that we should have this option integrated into the values file.
Thanks in advance.
Leonard Poiana DevOps Engineer