Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Try out GKE Autopilot #259

Open
sroettger opened this issue Mar 12, 2021 · 19 comments
Open

Try out GKE Autopilot #259

sroettger opened this issue Mar 12, 2021 · 19 comments

Comments

@sroettger
Copy link
Collaborator

https://cloud.google.com/blog/products/containers-kubernetes/introducing-gke-autopilot

@sirdarckcat
Copy link
Member

@sroettger
Copy link
Collaborator Author

sroettger commented Mar 19, 2021 via email

@sirdarckcat
Copy link
Member

it also uses privileged https://github.com/google/kctf/blob/v1.0/kctf-operator/pkg/resources/daemon-gcsfuse.go - can we use fuse without priv?

@sirdarckcat
Copy link
Member

@sirdarckcat
Copy link
Member

docker/for-linux#321

@sirdarckcat
Copy link
Member

to use fuse without priv we would need this: moby/moby#41880

apiVersion: apps/v1
kind: Deployment
metadata:
  name: foo-deployment
  labels:
    app: foo
spec:
  replicas: 1
  selector:
    matchLabels:
      app: foo
  template:
    metadata:
      labels:
        app: foo
      annotations:
        container.apparmor.security.beta.kubernetes.io/foo: unconfined
    spec:
      containers:
      - name: foo
        image: ubuntu:latest
        command: ['/bin/bash']
        args: ["-c", "sleep 1d"]
        securityContext:
          procMount: UnmaskedProcMount
          seccompProfile:
            type: Unconfined
        volumeMounts:
          - name: dev-dir
            mountPath: /dev
      volumes:
        - name: dev-dir
          hostPath:
            path: /dev

I guess we need to choose between autopilot and gcsfuse.

@sroettger
Copy link
Collaborator Author

sroettger commented Mar 19, 2021 via email

@sirdarckcat
Copy link
Member

lets do that, yea. I'll leave this open.

@eljeffeg
Copy link
Contributor

eljeffeg commented Oct 29, 2021

Curious if there were any updates or progress on this? Autopilot looks pretty cool for a Kubernetes newb.

@sirdarckcat
Copy link
Member

sirdarckcat commented Oct 29, 2021 via email

@eljeffeg
Copy link
Contributor

I'm not sure if it's the same issue, but I had done some research a bit ago with regard to ephemeral disks with Heroku. One consideration was something like s3fuse and s3monkey. Expect something similar could be done for Google Cloud.

@sirdarckcat
Copy link
Member

sirdarckcat commented Oct 29, 2021 via email

@eljeffeg
Copy link
Contributor

It was suggested in GoogleCloudPlatform/gcsfuse#497 that csi-gcs could be used.

@sirdarckcat
Copy link
Member

sirdarckcat commented Oct 29, 2021 via email

@eljeffeg
Copy link
Contributor

eljeffeg commented Nov 2, 2021

Holly $h**, KCTF in the Cloud is expensive. I had started the cloud walkthrough a couple weeks ago. Didn't realize that Google Cloud charges you for spinning it up. Got a bill today and it wasn't cheap. There should be a warning on the setup for those Compute Engines. Ouch

@sirdarckcat
Copy link
Member

sirdarckcat commented Nov 2, 2021 via email

@sirdarckcat
Copy link
Member

It appears autopilot doesn't allow pods with SYS_ADMIN capability to be admitted, so we wouldn't be able to isolate tasks.

@sirdarckcat
Copy link
Member

(context: sys_admin is required for using clone(new_user) and the default seccomp profile requires sys_admin to call clone(new_user))

@sirdarckcat
Copy link
Member

Ah we can change the default policy

@sirdarckcat sirdarckcat reopened this Jan 26, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants