-
Notifications
You must be signed in to change notification settings - Fork 146
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Set readOnlyRootFilesystem to true for all containers #637
Comments
set vmalert container SecurityContext the value of ReadOnlyRootFilesystem is set to true fix: VictoriaMetrics#637 Signed-off-by: fedstate <[email protected]>
Also it'd be great to add It has really nice feature
It should simplify managing volume permissions. cc @Amper @hagen1778 |
PodSecurityContext already added in #692. Update:
This will slow down pod startup if volume has many files, like vmstorage. And since pod's fsgroup won't be changed every time, we should set
|
Strict SecurityContext will be added by default since v0.36.0 , users can disable it by setting Close this as completed. |
My proposal is to set (hardcode) readOnlyRootFilesystem to true by operator for all containers securityContext. For example prometheus-operator currently deploys the stack with hardcoded readOnlyRootFilesystem in container's securityContext. I. e. it hardcodes this option for all resources deployed withing CRs.
I find this option as a nice security measure and in my experience many companies enforce this setting to be on for all containers.
The text was updated successfully, but these errors were encountered: