New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support container level security context #683
Comments
will make changes and create PR to this issue |
@zamsong123 the containers should inherit the pod level security context, are you setting the field |
@brusdev thanks for your comments, in our case, our EKS supporting team is doing some restriction on this, e.g. if there's no container level "runAsRootUser": true is set, the deployment will be blocked, frankly speaking I am not sure how the inherit works, but I guess they are different configuration for different purpose |
@brusdev yes I tried the spec.deploymentPlan.podSecurityContext, it's not working for our EKS requirement |
@brusdev btw, in Confluent Operator, they are also separate config for different purpose |
@zamsong123 thanks for the clarification, your enhancement makes sense to me |
I will make code change for this issue. |
@Eric84626 cool, contributions are always welcome! |
…ityContext Signed-off-by: Li, Eric <Xiannan.Li@fmr.com>
The new field |
Is your feature request related to a problem? Please describe.
Currently our EKS environment have some pre check on the container level security context, deployment will be blocked if not set
Describe the solution you'd like
Add a field to specify container level security context
The text was updated successfully, but these errors were encountered: