Skip to content

Commit d777388

Browse files
authored
Merge pull request #71175 from travier/dont-disable-selinux
Do not emphasize disabling SELinux in examples
2 parents df88770 + fff6f01 commit d777388

File tree

2 files changed

+13
-6
lines changed

2 files changed

+13
-6
lines changed

modules/installation-special-config-kargs.adoc

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,15 +12,16 @@ installation. Here are some reasons you might want
1212
to add kernel arguments during cluster installation so they take effect before
1313
the systems first boot up:
1414

15-
* You want to disable a feature, such as SELinux, so it has no impact on the systems when they first come up.
15+
* You need to do some low-level network configuration before the systems start.
1616

17+
* You want to disable a feature, such as SELinux, so it has no impact on the systems when they first come up.
18+
+
1719
[WARNING]
1820
====
19-
Disabling SELinux on {op-system} is not supported.
21+
Disabling SELinux on {op-system} in production is not supported.
22+
Once SELinux has been disabled on a node, it must be re-provisioned before re-inclusion in a production cluster.
2023
====
2124

22-
* You need to do some low-level network configuration before the systems start.
23-
2425
To add kernel arguments to master or worker nodes, you can create a `MachineConfig` object
2526
and inject that object into the set of manifest files used by Ignition during
2627
cluster setup.

modules/nodes-nodes-kernel-arguments.adoc

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,8 +16,6 @@ Improper use of kernel arguments can result in your systems becoming unbootable.
1616

1717
Examples of kernel arguments you could set include:
1818

19-
* **enforcing=0**: Configures Security Enhanced Linux (SELinux) to run in permissive mode. In permissive mode, the system acts as if SELinux is enforcing the loaded security policy, including labeling objects and emitting access denial entries in the logs, but it does not actually deny any operations. While not supported for production systems, permissive mode can be helpful for debugging.
20-
2119
* **nosmt**: Disables symmetric multithreading (SMT) in the kernel. Multithreading allows multiple logical threads for each CPU. You could consider `nosmt` in multi-tenant environments to reduce risks from potential cross-thread attacks. By disabling SMT, you essentially choose security over performance.
2220
2321
ifndef::openshift-origin[]
@@ -33,6 +31,14 @@ cgroup v2 is enabled by default. To disable cgroup v2, use the `systemd.unified_
3331
====
3432
endif::openshift-origin[]
3533

34+
* **enforcing=0**: Configures Security Enhanced Linux (SELinux) to run in permissive mode. In permissive mode, the system acts as if SELinux is enforcing the loaded security policy, including labeling objects and emitting access denial entries in the logs, but it does not actually deny any operations. While not supported for production systems, permissive mode can be helpful for debugging.
35+
+
36+
[WARNING]
37+
====
38+
Disabling SELinux on {op-system} in production is not supported.
39+
Once SELinux has been disabled on a node, it must be re-provisioned before re-inclusion in a production cluster.
40+
====
41+
3642
See link:https://www.kernel.org/doc/Documentation/admin-guide/kernel-parameters.txt[Kernel.org kernel parameters] for a list and descriptions of kernel arguments.
3743

3844
In the following procedure, you create a `MachineConfig` object that identifies:

0 commit comments

Comments
 (0)