Skip to content

Commit 87083f7

Browse files
committed
Risks and Mitigations - Security risk: Add blog post as documentation
Signed-off-by: Itamar Holder <[email protected]>
1 parent d67c311 commit 87083f7

File tree

1 file changed

+1
-0
lines changed

1 file changed

+1
-0
lines changed

keps/sig-node/2400-node-swap/README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -467,6 +467,7 @@ To avoid exhausting swap on a node, `UnlimitedSwap` was dropped from the API in
467467
#### Security risk
468468

469469
Enabling swap on a system without encryption poses a security risk, as critical information, such as Kubernetes secrets, may be swapped out to the disk. If an unauthorized individual gains access to the disk, they could potentially obtain these secrets. To mitigate this risk, it is recommended to use encrypted swap. However, handling encrypted swap is not within the scope of kubelet; rather, it is a general OS configuration concern and should be addressed at that level. Nevertheless, it is essential to provide documentation that warns users of this potential issue, ensuring they are aware of the potential security implications and can take appropriate steps to safeguard their system.
470+
The documentation updates are required; there is already a [blog article](https://kubernetes.io/blog/2023/08/24/swap-linux-beta/) that mentions the security implications.
470471

471472
To guarantee that system daemons are not swapped, the kubelet must configure the `memory.swap.max` setting to `0` within the system reserved cgroup. Moreover, to make sure that burstable pods are able to utilize swap space, kubelet should verify that the cgroup associated with burstable pods should not be nested under the cgroup designated for system reserved.
472473

0 commit comments

Comments
 (0)