You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
On Linux with Security-Enhanced Linux (SELinux) enabled, it's traditionally
13
13
the container runtime that applies SELinux labels to a Pod and all its volumes.
@@ -30,7 +30,7 @@ escapes the container boundary cannot access data of any other container on the
30
30
host. The container runtime still recursively relabels all pod volumes with this
31
31
random SELinux label.
32
32
33
-
# Improvement using mount options
33
+
##Improvement using mount options
34
34
35
35
If a Pod and its volume meet **all** of the following conditions, Kubernetes will
36
36
_mount_ the volume directly with the right SELinux label. Such mount will happen
@@ -50,7 +50,9 @@ relabel any files on it.
50
50
applied by the container runtime by a recursive walk through the volume
51
51
(or its subPaths).
52
52
53
-
1. The Pod must have at least `seLinuxOptions.level` assigned in its [Pod Security Context](/docs/reference/kubernetes-api/workload-resources/pod-v1/#security-context) or all Pod containers must have it set in their [Security Contexts](/docs/reference/kubernetes-api/workload-resources/pod-v1/#security-context-1).
53
+
1. The Pod must have at least `seLinuxOptions.level` assigned in its
by Daniel J Walsh. Note that the guide is older than Kubernetes, it describes
@@ -114,6 +117,7 @@ however, a similar concept is used for containers.
114
117
115
118
See a series of blog posts for details how exactly SELinux is applied to
116
119
containers by container runtimes:
120
+
117
121
*[How SELinux separates containers using Multi-Level Security](https://www.redhat.com/en/blog/how-selinux-separates-containers-using-multi-level-security)
118
122
*[Why you should be using Multi-Category Security for your Linux containers](https://www.redhat.com/en/blog/why-you-should-be-using-multi-category-security-your-linux-containers)
0 commit comments