-
Notifications
You must be signed in to change notification settings - Fork 446
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes needed in the gloo-ee / gloo helm charts for 1.25 compatibility with a namespace using restricted Pod Security Standards (PSS) #8864
Comments
Note: |
@ably77 - question on "9 - Several helm-hooks do not set resource request/limits": I don't see anything about resource/request limits in the Pod Security Standards. Is this specifically needed for meeting PSS/deploying with a |
OSS changes have entered PR. In addition to adding support for configuring the individual container
Template specific defaults will be applied to this context. |
Hey @sheidkamp sorry I missed this. I dont think its a hard requirement that is strictly enforced but is generally a recommended best practice for most organizations to be configurable so more of the "generally part of requested helm updates" Generally I think we'll see a tool like OPA, Kyverno, or an admission controller that will block a Pod without defined resources from being deployed |
@sheidkamp : great that this got fixed! Is this also covering extauth (this is not visible in the PR)? See #8455 (comment) |
@ably77 - extauth will be covered in the EE PR that relies on the OSS PR. For resources limits, that's needed at the container level, basically the same scope as the security contexts? |
Resource limits also seem dangerous to enforce given that most of these commands are highly dependant on a customers environment. @ably77 can you move that part to a separate RFE as its not cut and dry as well as potentially being a dangerous update |
I dont think we need to strictly set a request limit by default, but allow it to be configurable for a user that wants to |
We will consider this. Although everything can already technically be overidden by kustomize we can check in to see if there is a cleaner update |
@ably77 - looking for some additional clarifications, I see we set the resources in the Can you give examples (or a full list) of the hooks that need this configuration? |
The container security changes have been merged into EE/ As requested in #8864 (comment), please open another RFE for the resource limits, ideally with clarifications requested in #8864 (comment) |
Gloo Edge Product
Open Source
Gloo Edge Version
latest
Kubernetes Version
1.25
Describe the bug
Summary:
Issues when deploying Gloo Edge on 1.25 with a
restricted
Pod Security Standard (PSS) profileIMHO, a lot of this changes are for "single-shot" pods, adding a default PSC that matches a restricted namespace, the only exception is the _template helper.
Expected Behavior
Gloo Edge OSS and Gloo Edge Enterprise should be able to be deployed in Kubernetes 1.25 with the standards set forth by the restricted PSS profile
Steps to reproduce the bug
deploy latest gloo edge on 1.25 in a cluster set up with
restricted
PSS profileAdditional Environment Detail
No response
Additional Context
Additional Context:
link to PSS doc
Related Issues
┆Issue is synchronized with this Asana task by Unito
The text was updated successfully, but these errors were encountered: