You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
To use seccomp profile defaulting, you must run the kubelet with the
162
-
`--seccomp-default`
163
-
[command line flag](/docs/reference/command-line-tools-reference/kubelet)
164
-
enabled for each node where you want to use it.
165
-
166
-
If enabled, the kubelet will use the `RuntimeDefault` seccomp profile by default, which is
167
-
defined by the container runtime, instead of using the `Unconfined` (seccomp disabled) mode.
168
-
The default profiles aim to provide a strong set
169
-
of security defaults while preserving the functionality of the workload. It is
170
-
possible that the default profiles differ between container runtimes and their
171
-
release versions, for example when comparing those from CRI-O and containerd.
172
-
173
-
{{< note >}}
174
-
Enabling the feature will neither change the Kubernetes
175
-
`securityContext.seccompProfile` API field nor add the deprecated annotations of
176
-
the workload. This provides users the possibility to rollback anytime without
177
-
actually changing the workload configuration. Tools like
178
-
[`crictl inspect`](https://github.com/kubernetes-sigs/cri-tools) can be used to
179
-
verify which seccomp profile is being used by a container.
180
-
{{< /note >}}
181
-
182
-
Some workloads may require a lower amount of syscall restrictions than others.
183
-
This means that they can fail during runtime even with the `RuntimeDefault`
184
-
profile. To mitigate such a failure, you can:
185
-
186
-
- Run the workload explicitly as `Unconfined`.
187
-
- Disable the `SeccompDefault` feature for the nodes. Also making sure that
188
-
workloads get scheduled on nodes where the feature is disabled.
189
-
- Create a custom seccomp profile for the workload.
190
-
191
-
If you were introducing this feature into production-like cluster, the Kubernetes project
192
-
recommends that you enable this feature gate on a subset of your nodes and then
193
-
test workload execution before rolling the change out cluster-wide.
194
-
195
-
You can find more detailed information about a possible upgrade and downgrade strategy
196
-
in the related Kubernetes Enhancement Proposal (KEP):
197
-
[Enable seccomp by default](https://github.com/kubernetes/enhancements/tree/9a124fd29d1f9ddf2ff455c49a630e3181992c25/keps/sig-node/2413-seccomp-by-default#upgrade--downgrade-strategy).
198
-
199
-
Kubernetes {{< skew currentVersion >}} lets you configure the seccomp profile
200
-
that applies when the spec for a Pod doesn't define a specific seccomp profile.
201
-
However, you still need to enable this defaulting for each node where you would
202
-
like to use it.
203
-
204
-
If you are running a Kubernetes {{< skew currentVersion >}} cluster and want to
205
-
enable the feature, either run the kubelet with the `--seccomp-default` command
206
-
line flag, or enable it through the [kubelet configuration
207
-
file](/docs/tasks/administer-cluster/kubelet-config-file/). To enable the
208
-
feature gate in [kind](https://kind.sigs.k8s.io), ensure that `kind` provides
209
-
the minimum required Kubernetes version and enables the `SeccompDefault` feature
210
-
[in the kind configuration](https://kind.sigs.k8s.io/docs/user/quick-start/#enable-feature-gates-in-your-cluster):
To use seccomp profile defaulting, you must run the kubelet with the
429
+
`--seccomp-default`
430
+
[command line flag](/docs/reference/command-line-tools-reference/kubelet)
431
+
enabled for each node where you want to use it.
432
+
433
+
If enabled, the kubelet will use the `RuntimeDefault` seccomp profile by default, which is
434
+
defined by the container runtime, instead of using the `Unconfined` (seccomp disabled) mode.
435
+
The default profiles aim to provide a strong set
436
+
of security defaults while preserving the functionality of the workload. It is
437
+
possible that the default profiles differ between container runtimes and their
438
+
release versions, for example when comparing those from CRI-O and containerd.
439
+
440
+
{{< note >}}
441
+
Enabling the feature will neither change the Kubernetes
442
+
`securityContext.seccompProfile` API field nor add the deprecated annotations of
443
+
the workload. This provides users the possibility to rollback anytime without
444
+
actually changing the workload configuration. Tools like
445
+
[`crictl inspect`](https://github.com/kubernetes-sigs/cri-tools) can be used to
446
+
verify which seccomp profile is being used by a container.
447
+
{{< /note >}}
448
+
449
+
Some workloads may require a lower amount of syscall restrictions than others.
450
+
This means that they can fail during runtime even with the `RuntimeDefault`
451
+
profile. To mitigate such a failure, you can:
452
+
453
+
- Run the workload explicitly as `Unconfined`.
454
+
- Disable the `SeccompDefault` feature for the nodes. Also making sure that
455
+
workloads get scheduled on nodes where the feature is disabled.
456
+
- Create a custom seccomp profile for the workload.
457
+
458
+
If you were introducing this feature into production-like cluster, the Kubernetes project
459
+
recommends that you enable this feature gate on a subset of your nodes and then
460
+
test workload execution before rolling the change out cluster-wide.
461
+
462
+
You can find more detailed information about a possible upgrade and downgrade strategy
463
+
in the related Kubernetes Enhancement Proposal (KEP):
464
+
[Enable seccomp by default](https://github.com/kubernetes/enhancements/tree/9a124fd29d1f9ddf2ff455c49a630e3181992c25/keps/sig-node/2413-seccomp-by-default#upgrade--downgrade-strategy).
465
+
466
+
Kubernetes {{< skew currentVersion >}} lets you configure the seccomp profile
467
+
that applies when the spec for a Pod doesn't define a specific seccomp profile.
468
+
However, you still need to enable this defaulting for each node where you would
469
+
like to use it.
470
+
471
+
If you are running a Kubernetes {{< skew currentVersion >}} cluster and want to
472
+
enable the feature, either run the kubelet with the `--seccomp-default` command
473
+
line flag, or enable it through the [kubelet configuration
474
+
file](/docs/tasks/administer-cluster/kubelet-config-file/). To enable the
475
+
feature gate in [kind](https://kind.sigs.k8s.io), ensure that `kind` provides
476
+
the minimum required Kubernetes version and enables the `SeccompDefault` feature
477
+
[in the kind configuration](https://kind.sigs.k8s.io/docs/user/quick-start/#enable-feature-gates-in-your-cluster):
0 commit comments