-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use k3s with selinux set to enforce #533
Comments
See: "Add support for SELinux" #1372 |
PR: #1411 |
Merged #1448 |
Thanks!
…On Mon, Feb 24, 2020, 6:52 PM Erik Wilson ***@***.***> wrote:
Merged #1448 <#1448>
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub
<#533>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAAMNSZ3EEBXRSYGT5Q2S5TRERMS5ANCNFSM4HYHLKWQ>
.
|
- [ ] remove the "Set SELinux to disabled state" task from the ansible
prereq role:
#1372 (comment)
Is this safe to do yet?
…On Mon, Feb 24, 2020, 7:49 PM Wes Turner ***@***.***> wrote:
Thanks!
On Mon, Feb 24, 2020, 6:52 PM Erik Wilson ***@***.***>
wrote:
> Merged #1448 <#1448>
>
> —
> You are receiving this because you are subscribed to this thread.
> Reply to this email directly, view it on GitHub
> <#533>,
> or unsubscribe
> <https://github.com/notifications/unsubscribe-auth/AAAMNSZ3EEBXRSYGT5Q2S5TRERMS5ANCNFSM4HYHLKWQ>
> .
>
|
Merged
See #1666 |
Verified the issue is resolved. k3s/agent/etc/containerd/config.toml has selinux enabled by default and correct labels are applied.
Redhat 7.8
|
3 tasks
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Describe the bug
We would like to set SELinux to enforce with k3s but are unable to get this working.
To Reproduce
I created a config.toml.tmpl to include the Boolean to enable it in containerd.
My nginx deployment has an seLinuxOptions.
grep -A5 securityContext nginx-deployment.yaml
But when the pods run, they wind up using the spc_t (super privileged container SELinux type). All pods seem to run with spc_t unfortunately.
worker# ps -efZ | grep nginx
kubectl exec nginx-5499b86ff-r7pvv -- runcon
Host where the pod is running is setup with SELinux.
Expected behavior
I would have expected the container_t type for running pods. If I switch to use Docker, pods have problems launching. They complain about CNI and net namespace. If I change SELinux to be permissive, then pods launch using Docker and show up with the expected container_t type.
The text was updated successfully, but these errors were encountered: