You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
= Setting a custom priority class name for the spod daemon pod
8
+
9
+
The default priority class name of the `spod` daemon pod is set to `system-node-critical`. A custom priority class name can be configured in the `spod` configuration by setting a value in the `priorityClassName` field.
10
+
11
+
.Procedure
12
+
13
+
* Configure the priority class name by running the following command:
14
+
+
15
+
[source,terminal]
16
+
----
17
+
$ oc -n openshift-security-profiles patch spod spod --type=merge -p '{"spec":{"priorityClassName":"my-priority-class"}}'
The controller running inside of `spod` daemon process watches all pods available in the cluster when profile recording is enabled. This can lead to very high memory usage in large clusters, resulting in the `spod` daemon running out of memory or crashing.
10
+
11
+
To prevent crashes, the `spod` daemon can be configured to only load the pods labeled for profile recording into the cache memory.
12
+
+
13
+
[NOTE]
14
+
====
15
+
SPO memory optimization is not enabled by default.
16
+
====
17
+
18
+
.Procedure
19
+
20
+
. Enable memory optimization by running the following command:
21
+
+
22
+
[source,terminal]
23
+
----
24
+
$ oc -n openshift-security-profiles patch spod spod --type=merge -p '{"spec":{"enableMemoryOptimization":true}}'
25
+
----
26
+
27
+
. To record a security profile for a pod, the pod must be labeled with `spo.x-k8s.io/enable-recording: "true"`:
* Security Profiles Operator (SPO) now automatically selects the appropriate `selinuxd` image for RHEL 8- and 9-based RHCOS systems.
26
+
+
27
+
[IMPORTANT]
28
+
====
29
+
Users that mirror images for disconnected environments must mirror both `selinuxd` images provided by the Security Profiles Operator.
30
+
====
31
+
32
+
* You can now enable memory optimization inside of an `spod` daemon. For more information, see xref:../../security/security_profiles_operator/spo-advanced.adoc#spo-memory-optimization_spo-advanced[Enabling memory optimization in the spod daemon].
33
+
+
34
+
[NOTE]
35
+
====
36
+
SPO memory optimization is not enabled by default.
37
+
====
38
+
39
+
* The daemon resource requirements are now configurable. For more information, see xref:../../security/security_profiles_operator/spo-advanced.adoc#spo-daemon-requirements_spo-advanced[Customizing daemon resource requirements].
40
+
41
+
* The priority class name is now configurable in the `spod` configuration. For more information, see xref:../../security/security_profiles_operator/spo-advanced.adoc#spo-custom-priority-class_spo-advanced[Setting a custom priority class name for the spod daemon pod].
42
+
43
+
[id="spo-0-7-1-deprecations"]
44
+
=== Deprecated and removed features
45
+
46
+
* The default `nginx-1.19.1` seccomp profile is now removed from the Security Profiles Operator deployment.
47
+
48
+
[id="spo-0-7-1-bug-fixes"]
49
+
=== Bug fixes
50
+
51
+
* Previously, a Security Profiles Operator (SPO) SELinux policy did not inherit low-level policy definitions from the container template. If you selected another template, such as net_container, the policy would not work because it required low-level policy definitions that only existed in the container template. This issue occurred when the SPO SELinux policy attempted to translate SELinux policies from the SPO custom format to the Common Intermediate Language (CIL) format. With this update, the container template appends to any SELinux policies that require translation from SPO to CIL. Additionally, the SPO SELinux policy can inherit low-level policy definitions from any supported policy template. (link:https://issues.redhat.com/browse/OCPBUGS-12879[*OCPBUGS-12879*])
52
+
53
+
[discrete]
54
+
[id="spo-0-7-1-known-issue"]
55
+
=== Known issue
56
+
57
+
* When uninstalling the Security Profiles Operator, the `MutatingWebhookConfiguration` object is not deleted and must be manually removed. As a workaround, delete the `MutatingWebhookConfiguration` object after uninstalling the Security Profiles Operator. These steps are defined in xref:../security_profiles_operator/spo-uninstalling.adoc#[Uninstalling the Security Profiles Operator]. (link:https://issues.redhat.com/browse/OCPBUGS-4687[*OCPBUGS-4687*])
0 commit comments