You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We are trying to follow the security best practices in which a pod/container should not run as root.
Considering this, we are trying to install the trident helm chart on k8s version 1.29 and we don't have the posibility to set the pod/container security policy via the values file.
In order to use the helm chart smoothly and perform upgrades we belive that we should have this option integrated into the values file.
Thanks in advance.
Leonard Poiana
DevOps Engineer
The text was updated successfully, but these errors were encountered:
As a driver (vs. a "normal" app), Trident will need specific privileges for operations such as mounting/unmounting volumes on the nodes. As Pod Security Policies are deprecated/removed since many K8s releases, Trident set the required Pod Security Standard pod-security.kubernetes.io/enforce: privileged label on its namespace. Pods are then defined to follow a least-privilege approach. For example, the security context of the trident-controller pod will drop all privileges, while the trident-node pods will add the required privileges that they specifically need.
Not exactly sure what you are trying to change, that should be surfaced in the Helm chart?
Hello,
We are trying to follow the security best practices in which a pod/container should not run as root.
Considering this, we are trying to install the trident helm chart on k8s version 1.29 and we don't have the posibility to set the pod/container security policy via the values file.
In order to use the helm chart smoothly and perform upgrades we belive that we should have this option integrated into the values file.
Thanks in advance.
Leonard Poiana
DevOps Engineer
The text was updated successfully, but these errors were encountered: