Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Create default k8s security policy for Yeti #117

Open
wajihyassine opened this issue Jan 19, 2024 · 0 comments
Open

Create default k8s security policy for Yeti #117

wajihyassine opened this issue Jan 19, 2024 · 0 comments
Labels
enhancement New feature or request help wanted Extra attention is needed yeti

Comments

@wajihyassine
Copy link
Member

Name and Version

charts/yeti

What is the problem this feature will solve?

Improves the security of the deployment / underlying containers

What is the feature you are proposing to solve the problem?

Configure and test a set of security policies for the Yeti deployment.

This can include:

securityContext:
  readOnlyRootFilesystem: true
  runAsNonRoot: true
  allowPrivilegeEscalation: false
  runAsUser: <USER ID MAPPED IN CONTAINER>

Also by enabling the default seccomp profile: https://kubernetes.io/docs/tutorials/security/seccomp/

More guidance can be found here: https://kubernetes.io/docs/concepts/security/pod-security-standards/

Logging may need to be adjusted to go to the underlying pvc

What alternatives have you considered?

No response

@wajihyassine wajihyassine added enhancement New feature or request help wanted Extra attention is needed yeti labels Jan 19, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request help wanted Extra attention is needed yeti
Projects
None yet
Development

No branches or pull requests

1 participant