You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Docker has a list of syscalls that are banned with this https://docs.docker.com/engine/security/seccomp/
The corresponding capability is listed. Note that one of them are "NET_BIND_SERVICE" which is the only one that really appears needed for nginx.
We have currently set this under our deployment. If you use a managed Kubernetes cluster (AWS, Azure, Google or something else), it may be difficult or undesired to create custom more elaborate profiles.
Is your feature request related to a problem? Please describe.
I think it'd be nice to have this a default under
securityContext
for the nginx Deployment resource.https://kubernetes.io/docs/tutorials/security/seccomp/#enable-the-use-of-runtimedefault-as-the-default-seccomp-profile-for-all-workloads
Docker has a list of syscalls that are banned with this https://docs.docker.com/engine/security/seccomp/
The corresponding capability is listed. Note that one of them are "NET_BIND_SERVICE" which is the only one that really appears needed for nginx.
We have currently set this under our deployment. If you use a managed Kubernetes cluster (AWS, Azure, Google or something else), it may be difficult or undesired to create custom more elaborate profiles.
There is a bit more motivation here.
https://www.stigviewer.com/stig/mirantis_kubernetes_engine/2024-06-17/finding/V-260937
https://www.aquasec.com/products/trivy/ This tool will report this as a shortcoming. There is a free/open version of the tool that can be used.
The text was updated successfully, but these errors were encountered: