You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
To use seccomp profile defaulting, you must run the kubelet with the
162
-
`--seccomp-default`
163
-
[command line flag](/docs/reference/command-line-tools-reference/kubelet)
164
-
enabled for each node where you want to use it.
165
-
166
-
If enabled, the kubelet will use the `RuntimeDefault` seccomp profile by default, which is
167
-
defined by the container runtime, instead of using the `Unconfined` (seccomp disabled) mode.
168
-
The default profiles aim to provide a strong set
169
-
of security defaults while preserving the functionality of the workload. It is
170
-
possible that the default profiles differ between container runtimes and their
171
-
release versions, for example when comparing those from CRI-O and containerd.
172
-
173
-
{{< note >}}
174
-
Enabling the feature will neither change the Kubernetes
175
-
`securityContext.seccompProfile` API field nor add the deprecated annotations of
176
-
the workload. This provides users the possibility to rollback anytime without
177
-
actually changing the workload configuration. Tools like
178
-
[`crictl inspect`](https://github.com/kubernetes-sigs/cri-tools) can be used to
179
-
verify which seccomp profile is being used by a container.
180
-
{{< /note >}}
181
-
182
-
Some workloads may require a lower amount of syscall restrictions than others.
183
-
This means that they can fail during runtime even with the `RuntimeDefault`
184
-
profile. To mitigate such a failure, you can:
185
-
186
-
- Run the workload explicitly as `Unconfined`.
187
-
- Disable the `SeccompDefault` feature for the nodes. Also making sure that
188
-
workloads get scheduled on nodes where the feature is disabled.
189
-
- Create a custom seccomp profile for the workload.
190
-
191
-
If you were introducing this feature into production-like cluster, the Kubernetes project
192
-
recommends that you enable this feature gate on a subset of your nodes and then
193
-
test workload execution before rolling the change out cluster-wide.
194
-
195
-
You can find more detailed information about a possible upgrade and downgrade strategy
196
-
in the related Kubernetes Enhancement Proposal (KEP):
197
-
[Enable seccomp by default](https://github.com/kubernetes/enhancements/tree/9a124fd29d1f9ddf2ff455c49a630e3181992c25/keps/sig-node/2413-seccomp-by-default#upgrade--downgrade-strategy).
198
-
199
-
Kubernetes {{< skew currentVersion >}} lets you configure the seccomp profile
200
-
that applies when the spec for a Pod doesn't define a specific seccomp profile.
201
-
However, you still need to enable this defaulting for each node where you would
202
-
like to use it.
203
-
204
-
If you are running a Kubernetes {{< skew currentVersion >}} cluster and want to
205
-
enable the feature, either run the kubelet with the `--seccomp-default` command
206
-
line flag, or enable it through the [kubelet configuration
207
-
file](/docs/tasks/administer-cluster/kubelet-config-file/). To enable the
208
-
feature gate in [kind](https://kind.sigs.k8s.io), ensure that `kind` provides
209
-
the minimum required Kubernetes version and enables the `SeccompDefault` feature
210
-
[in the kind configuration](https://kind.sigs.k8s.io/docs/user/quick-start/#enable-feature-gates-in-your-cluster):
To use seccomp profile defaulting, you must run the kubelet with the
430
+
`--seccomp-default`
431
+
[command line flag](/docs/reference/command-line-tools-reference/kubelet)
432
+
enabled for each node where you want to use it.
433
+
434
+
If enabled, the kubelet will use the `RuntimeDefault` seccomp profile by default, which is
435
+
defined by the container runtime, instead of using the `Unconfined` (seccomp disabled) mode.
436
+
The default profiles aim to provide a strong set
437
+
of security defaults while preserving the functionality of the workload. It is
438
+
possible that the default profiles differ between container runtimes and their
439
+
release versions, for example when comparing those from CRI-O and containerd.
440
+
441
+
{{< note >}}
442
+
Enabling the feature will neither change the Kubernetes
443
+
`securityContext.seccompProfile` API field nor add the deprecated annotations of
444
+
the workload. This provides users the possibility to rollback anytime without
445
+
actually changing the workload configuration. Tools like
446
+
[`crictl inspect`](https://github.com/kubernetes-sigs/cri-tools) can be used to
447
+
verify which seccomp profile is being used by a container.
448
+
{{< /note >}}
449
+
450
+
Some workloads may require a lower amount of syscall restrictions than others.
451
+
This means that they can fail during runtime even with the `RuntimeDefault`
452
+
profile. To mitigate such a failure, you can:
453
+
454
+
- Run the workload explicitly as `Unconfined`.
455
+
- Disable the `SeccompDefault` feature for the nodes. Also making sure that
456
+
workloads get scheduled on nodes where the feature is disabled.
457
+
- Create a custom seccomp profile for the workload.
458
+
459
+
If you were introducing this feature into production-like cluster, the Kubernetes project
460
+
recommends that you enable this feature gate on a subset of your nodes and then
461
+
test workload execution before rolling the change out cluster-wide.
462
+
463
+
You can find more detailed information about a possible upgrade and downgrade strategy
464
+
in the related Kubernetes Enhancement Proposal (KEP):
465
+
[Enable seccomp by default](https://github.com/kubernetes/enhancements/tree/9a124fd29d1f9ddf2ff455c49a630e3181992c25/keps/sig-node/2413-seccomp-by-default#upgrade--downgrade-strategy).
466
+
467
+
Kubernetes {{< skew currentVersion >}} lets you configure the seccomp profile
468
+
that applies when the spec for a Pod doesn't define a specific seccomp profile.
469
+
However, you still need to enable this defaulting for each node where you would
470
+
like to use it.
471
+
472
+
If you are running a Kubernetes {{< skew currentVersion >}} cluster and want to
473
+
enable the feature, either run the kubelet with the `--seccomp-default` command
474
+
line flag, or enable it through the [kubelet configuration
475
+
file](/docs/tasks/administer-cluster/kubelet-config-file/). To enable the
476
+
feature gate in [kind](https://kind.sigs.k8s.io), ensure that `kind` provides
477
+
the minimum required Kubernetes version and enables the `SeccompDefault` feature
478
+
[in the kind configuration](https://kind.sigs.k8s.io/docs/user/quick-start/#enable-feature-gates-in-your-cluster):
0 commit comments