-
Couldn't load subscription status.
- Fork 2k
Description
Is your feature request related to a problem? Please describe.
Users should be able to run nginx Kubernetes ingress controller with minimum permissions in the security context. Current configuration runs with AllowPrivilegeEscalation: true and readOnlyRootFilesystem: false but there should be a way to restrict the permissions to a bare minimum.
Describe the solution you'd like
I was able to remove AllowPrivilegeEscalation: true by changing the hard code privileged ports (80, 443) in code & templates and building a custom docker image out of it. But for the readOnlyRootFilesystem: false workaround I'm trying to change /etc/nginx directory where all configurations are stored/created to one emptyDir volume.
But after these changes, I'm facing sock connection failure and other issues in IC pod.
Eg:
F0616 14:26:09.191702 1 manager.go:284] Could not get newest config version: could not get expected version: 0 after 4s
Is it possible to run IC with readOnlyRootFilesystem: true ? or some specific steps are required to do so ?
Aha! Link: https://nginx.aha.io/features/IC-97