Skip to content

Conversation

@YuryHrytsuk
Copy link
Collaborator

@YuryHrytsuk YuryHrytsuk commented Jul 21, 2025

What do these changes do?

Ensure baseline policy and warn on restricted policy violations. The k8s way to add pod security standard, is to add labels to the namespace. The adding labels to namespace is achieved via helmfile hooks. This policy forces pod to define some security settings (e.g. privileged: false). Read more https://kubernetes.io/docs/concepts/security/pod-security-standards/

WARNING: if deployed pod does not conform with baseline policy, it SILENTLY won't be scheduled. To see warnings / errors execute `kubectl -n simcore events'

Add helpful defaults for pod & container security context to ensure minimal privileges.

FYI: @pcrespov

Related issue/s

Related PR/s

Checklist

  • I tested and it works

Ensure baseline policy and warn on restricted policy violations. The k8s
way to add pod security standard, is to add labels to the namespace. The
adding labels to namespace is achieved via helmfile hooks.

Add helpful defaults for pod & container security context to ensure
minimal privileges.

WARNING: if deployed pod does not conform with baseline policy, it
SILENTLY won't be scheduled. To see warnings / errors execute `kubectl
-n simcore events'

* ITISFoundation#1137
@YuryHrytsuk YuryHrytsuk added this to the Engage milestone Jul 21, 2025
@YuryHrytsuk YuryHrytsuk self-assigned this Jul 21, 2025
@YuryHrytsuk YuryHrytsuk requested a review from mrnicegyu11 as a code owner July 21, 2025 07:00
Copy link
Contributor

@matusdrobuliak66 matusdrobuliak66 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👍

Copy link
Member

@mrnicegyu11 mrnicegyu11 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

very cool, excited to see this! 🌋

@YuryHrytsuk YuryHrytsuk merged commit 7a720da into ITISFoundation:main Jul 21, 2025
3 checks passed
@YuryHrytsuk YuryHrytsuk deleted the kubernetes-simcore-charts-default-pod-security-context branch July 21, 2025 08:19
YuryHrytsuk added a commit to YuryHrytsuk/osparc-ops-environments that referenced this pull request Jul 21, 2025
In ITISFoundation#1139
resource usage tracker (RUT)  chart dependencies were updated but no
Chart.lock was not. This PRs updates Chart.lock (via helm dependency
update).

Bonus:
* Automate this with pre-commit hook

* fixes bug from ITISFoundation#1139
YuryHrytsuk added a commit that referenced this pull request Jul 21, 2025
* Kubernetes: update Chart.lock of RUT

In #1139
resource usage tracker (RUT)  chart dependencies were updated but no
Chart.lock was not. This PRs updates Chart.lock (via helm dependency
update).

Bonus:
* Automate this with pre-commit hook

* fixes bug from #1139

* Remove readme (it is automated now)

* Improve pre-commit hook
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants