Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add SCC for clusterController on OpenShift #3730

Open
wants to merge 6 commits into
base: develop
Choose a base branch
from

Conversation

ivankube
Copy link
Contributor

@ivankube ivankube commented Nov 8, 2024

What does this PR change?

Currently OpenShift users can't add clusterController because of

W1108 14:19:26.493318 42854 warnings.go:70] would violate PodSecurity "restricted:v1.24": hostPort (container "kubecost-cluster-controller" uses hostPort 9731), allowPrivilegeEscalation != false (container "kubecost-cluster-controller" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "kubecost-cluster-controller" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "kubecost-cluster-controller" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "kubecost-cluster-controller" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost")

Does this PR rely on any other PRs?

No

How does this PR impact users? (This is the kind of thing that goes in release notes!)

Add SecurityContext for clusterController when it's enabled on OpenShift

Links to Issues or tickets this PR addresses or fixes

https://kubecost.atlassian.net/browse/SUP-6255

What risks are associated with merging this PR? What is required to fully test this PR?

Minimal risks.

How was this PR tested?

Manually

Have you made an update to documentation? If so, please provide the corresponding PR.

N/A

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant