Skip to content

Commit a8fa614

Browse files
committed
KEP-3619: addressed review feedbacks
1 parent 14612bb commit a8fa614

File tree

1 file changed

+6
-3
lines changed
  • content/en/blog/_posts/2024-08-22-Fine-grained-SupplementalGroups-control

1 file changed

+6
-3
lines changed

content/en/blog/_posts/2024-08-22-Fine-grained-SupplementalGroups-control/index.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,12 +8,12 @@ author: >
88
99
---
1010

11-
This blog discusses a new feature in Kubernetes 1.31 to improve the handling of supplementary groups in containers in Pods.
11+
This blog discusses a new feature in Kubernetes 1.31 to improve the handling of supplementary groups in containers within Pods.
1212

1313

1414
## Motivation: Implicit group memberships defined in `/etc/group` in the container image
1515

16-
Although this behavior may not be quite popular by many Kubernetes cluster users/admins, kubernetes, by default, _merges_ group information from the Pod with information defined in `/etc/group` in the container image.
16+
Although this behavior may not be popular with many Kubernetes cluster users/admins, kubernetes, by default, _merges_ group information from the Pod with information defined in `/etc/group` in the container image.
1717

1818
Let's see an example, below Pod specifies `runAsUser=1000`, `runAsGroup=3000` and `supplementalGroups=4000` in the Pod's security context.
1919

@@ -90,8 +90,11 @@ uid=1000 gid=3000 groups=3000,4000
9090

9191
You can see `Strict` policy can exclude group `50000` from `groups`!
9292

93-
Thus, enforcing `SupplementalGroupsPolicy=Merge` by some policy engines helps preventing the implicit supplementary groups in a Pod (note: actually, this is not enough because container with strong priviledge/capability can change its process identity. Please see the following section for details).
93+
Thus, enforcing `SupplementalGroupsPolicy=Merge` by some policy engines helps preventing the implicit supplementary groups in a Pod.
9494

95+
{{<note>}}
96+
Actually, this is not enough because container with strong priviledge/capability can change its process identity. Please see the following section for details).
97+
{{</note>}}
9598

9699
## Attached process identity in Pod status
97100

0 commit comments

Comments
 (0)