podsecurity: enforce privileged for openshift-etcd namespace#681
podsecurity: enforce privileged for openshift-etcd namespace#681openshift-merge-robot merged 1 commit intoopenshift:masterfrom
Conversation
|
/cc @deads2k |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: lilic, s-urbaniak The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
@hasbro17 @hexfusion This lgtm, but please take a look as well. |
|
SGTM |
|
No, I asked the same question and @s-urbaniak said the following:
|
|
/hold cancel |
Starting with OpenShift 4.10 we are introducing PodSecurity admission (https://github.com/kubernetes/enhancements/tree/master/keps/sig-auth/2579-psp-replacement).
Currently, all pods are marked as privileged, however, over time we want to enforce at least baseline, admirably restricted as default. In order not to break control plane workloads this allows workloads in
openshift-etcdnamespace to run privileged pods.See openshift/enhancements#899 for more details (and excuse the eventual consistency of updates).
/cc @stlaz