You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<td></td><tdstyle="line-height: 130%; word-wrap: break-word;">Timeout of all runtime requests except long running request - `pull`, `logs`, `exec` and `attach`. When timeout exceeded, kubelet will cancel the request, throw out an error and retry later. (DEPRECATED: This parameter should be set via the config file specified by the Kubelet's `--config` flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.)</td>
<td></td><tdstyle="line-height: 130%; word-wrap: break-word;"><Warning: Alpha feature> Enable the use of RuntimeDefault as the default seccomp profile for all workloads. The SeccompDefault feature gate must be enabled to allow this flag, which is disabled per default.</td>
[feature gate](/docs/reference/command-line-tools-reference/feature-gates) as
57
+
well as corresponding `--seccomp-default`
58
+
[command line flag](/docs/reference/command-line-tools-reference/kubelet).
59
+
Both have to be enabled simultaneously to use the feature.
60
+
61
+
If enabled, the kubelet will use the `RuntimeDefault` seccomp profile by default, which is
62
+
defined by the container runtime, instead of using the `Unconfined` (seccomp disabled) mode.
63
+
The default profiles aim to provide a strong set
64
+
of security defaults while preserving the functionality of the workload. It is
65
+
possible that the default profiles differ between container runtimes and their
66
+
release versions, for example when comparing those from CRI-O and containerd.
67
+
68
+
Some workloads may require a lower amount of syscall restrictions than others.
69
+
This means that they can fail during runtime even with the `RuntimeDefault`
70
+
profile. To mitigate such a failure, you can:
71
+
72
+
- Run the workload explicitly as `Unconfined`.
73
+
- Disable the `SeccompDefault` feature for the nodes. Also making sure that
74
+
workloads get scheduled on nodes where the feature is disabled.
75
+
- Create a custom seccomp profile for the workload.
76
+
77
+
If you were introducing this feature into production-like cluster, the Kubernetes project
78
+
recommends that you enable this feature gate on a subset of your nodes and then
79
+
test workload execution before rolling the change out cluster-wide.
80
+
81
+
More detailed information about a possible upgrade and downgrade strategy can be
82
+
found in the [related Kubernetes Enhancement Proposal (KEP)](https://github.com/kubernetes/enhancements/tree/a70cc18/keps/sig-node/2413-seccomp-by-default#upgrade--downgrade-strategy).
83
+
84
+
Since the feature is in alpha state it is disabled per default. To enable it,
85
+
pass the flags `--feature-gates=SeccompDefault=true --seccomp-default` to the
86
+
`kubelet` CLI or enable it via the [kubelet configuration
87
+
file](/docs/tasks/administer-cluster/kubelet-config-file/). To enable the
88
+
feature gate in [kind](https://kind.sigs.k8s.io), ensure that `kind` provides
89
+
the minimum required Kubernetes version and enables the `SeccompDefault` feature
90
+
[in the kind configuration](https://kind.sigs.k8s.io/docs/user/quick-start/#enable-feature-gates-in-your-cluster):
91
+
92
+
```yaml
93
+
kind: Cluster
94
+
apiVersion: kind.x-k8s.io/v1alpha4
95
+
featureGates:
96
+
SeccompDefault: true
97
+
```
98
+
48
99
## Create Seccomp Profiles
49
100
50
101
The contents of these profiles will be explored later on, but for now go ahead
@@ -108,7 +159,7 @@ docker exec -it 6a96207fed4b ls /var/lib/kubelet/seccomp/profiles
108
159
audit.json fine-grained.json violation.json
109
160
```
110
161
111
-
## Create a Pod with a Seccomp profile for syscall auditing
162
+
## Create a Pod with a seccomp profile for syscall auditing
112
163
113
164
To start off, apply the `audit.json` profile, which will log all syscalls of the
114
165
process, to a new Pod.
@@ -208,7 +259,7 @@ kubectl delete pod/audit-pod
208
259
kubectl delete svc/audit-pod
209
260
```
210
261
211
-
## Create Pod with Seccomp Profile that Causes Violation
262
+
## Create Pod with seccomp Profile that Causes Violation
212
263
213
264
For demonstration, apply a profile to the Pod that does not allow for any
0 commit comments