Conversation
The conclusion here was that the default behavior changed from using It would be interesting to look at using the signal-reboot mode as that seem to remove the need for Kured to run in privileged mode! |
|
Tested out the signal method with the config changes from the latest commit. time="2024-06-05T07:11:07Z" level=info msg="Emit reboot-signal for node: simonl-dev-mc-worker-nova-4018765f-9m8kl"
time="2024-06-05T07:11:07Z" level=fatal msg="Signal of SIGRTMIN+5 failed: permission denied"Thoughts? |
I unfortunately can't say what implications it has to disable apparmor vs running it as privileged, but my initial hunch is that it is more secure to run the container without privileged and apparmor than it is to run it privileged. |
fcaa17e to
25dc614
Compare
|
I moved the signal method out of this branch for now, pending further investigation into the apparmor issue. |
Warning
This is a public repository, ensure not to disclose:
What kind of PR is this?
Required: Mark one of the following that is applicable:
Optional: Mark one or more of the following that are applicable:
Important
Breaking changes should be marked
kind/admin-changeorkind/dev-changedepending on typeCritical security fixes should be marked with
kind/securityWhat does this PR do / why do we need this PR?
Upgraded
kuredto Chart Version5.4.5and App Version1.15.1Information to reviewers
Two security-related default-values were improved:
hostNetworkis set tofalseby default now.readOnlyRootFilesystemis set totrueby default now.Also kured now wants to mount a hostPath for /var/run, for the reboot-sentinel-file, by default. Any opinions on this?
Checklist
NetworkPolicy Dashboard