add missing Linux CAP when running in VNM mode#86
Conversation
|
Looks ok, but EKS has been documented as a limitation for VNM in certain configurations. Not sure if we would have the same approach for the helm chart. We've observed thatin EKS is that even after "including CAP_NET_ADMIN in the container’s SecurityContext" it does not resolve the issue. Also occurs in GCP autopilot clusters. (GKE) @marysdm to clarify? |
|
Re: limitation @coolguy-5 mentioned. This is an issue with all hardened K8s environments (EKS, GKE, AKS, etc.) The respective provider should be consulted by customers for options to allow For Docker containers, adding the Github Actions with containerized running, I set privileged as follows: Github Actions with Ubuntu runner worked without issue. |
Description of changes
addresses #80. put the added Linux capability behind a toggle so the default is a less-privileged container.
Validation steps
pre-commit install-develversion after merge)