-
Notifications
You must be signed in to change notification settings - Fork 1k
Custom Security Context in postgresql #2223
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Postgresql, OperatorConfiguration CRDs provide a rather limited set of SecurityContext configuration properties. I could not find a way how to configure the following properties:
Created the #2244 PR which implements the above features. |
I hate to be that guy but is there a timeline when (and if) this will be merged? It is a critical thing for the decision for our current setup... |
I agree with @mjdazz that this is a significant issue, as it makes deploying Postgres to Autopilot, for example, impossible. |
This MR is very much needed if you are trying to enforce restricted pod policies: https://kubernetes.io/docs/concepts/security/pod-security-standards/ (Yes I know pod policies are deprecated - but you can do the same restricted policy management with Pod Security Admission) |
Is there any timeline on when this will be merged, or anything we can do to help it along? |
+1 on needing this to comply with restricted profiles, as @EmilMunksoe mentioned here There's an open PR here: #2244, just needs a review. |
As Workaround you can use a kyverno ClusterPolicy
|
+1 - Is there anything that I can do to help move this along? I'm using this operator within vClusters, and can't use the Kyverno Policy workaround until vCluster's next major release (https://www.vcluster.com/docs/platform/integrations/host-kyverno). It seems like my only option would be to wait for that release or switch to the CNPG Operator. |
postgres-operator:v1.9.0
Kubernetes and OpenShift
feature request
Hi, i checked postgres operator configuration and postgresql manifest, there is no parameter to custom SecurityContext. Parameter additional_pod_capabilities only supports adding capabilities in container level SecurityContex. Actually, i want to custom pod level and container lever SecurityContext, example:
pod level SecurityContext:
container level SecurityContext:
The text was updated successfully, but these errors were encountered: