You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Provide realistic values for running fluent-bit as a non-root user:
I am not sure what securityContext Fluent Bit needs to run correctly.
Once this is change is in a think a separate PR could be used to determine
what a default standard policy should look like.
The user and group ids do not exist in the aws-for-fluent-bit image. AFAICT the image is based on amazonlinux/scratch and does not define any non-root users.
All the files in the image are owned by 0:0 (root) so runAsNonRoot probably won't suffice, at least not without some additional capabilities, such as FOWNER
Typical deployments will enable storage.path (e.b., /var/fluent-bit/state/flb-storage/), which appears to need a hostPath
joebowbeer
changed the title
aws-for-fluent-bit: provide realistic runAsNonRoot pod security policy values
aws-for-fluent-bit: provide realistic runAsNonRoot security context values
Mar 28, 2023
W0329 12:40:59.452300 127 warnings.go:70] would violate PodSecurity "restricted:latest": restricted volume types (volumes "varlog", "varlibdockercontainers" use restricted volume type "hostPath"), runAsNonRoot != true (pod or container "aws-for-fluent-bit" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod must not set runAsUser=0)
Provide realistic values for running fluent-bit as a non-root user:
Originally posted by @razorsk8jz in #923 (comment)
The security context comments in values.yaml are not usable:
Issues:
Related:
#719
The text was updated successfully, but these errors were encountered: