-
Notifications
You must be signed in to change notification settings - Fork 26
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unable to address the helm chart issues reported by the static code analysis #1031
Comments
We do support Vertica server container securityContext in the spec. Can you try the configurations below?
And also the pod-level security context:
For more details, you can search |
This scan does not take the container(Dockerfile) into account. The base image is gcr.io/distroless/static:nonroot, which does not include a root user. The container will use a default non-root user with UID and GID set to 65532. See docker-operator/Dockerfile |
This is more like a choice to not pull the image each time. |
Yes, it is a good practice to set ephemeral storage for Kubernetes operator pods. We did not because the operator doesn't rely on local disk storage, it only reconciles states. |
We don't necessarily need one because the operator does not need to communicate with other pods and is in an isolated environment. |
Is there any plan to expose the securityContext and podSecurityContext for the operator as well? |
Hi,
Today, I decided to scan the verticadb-operator helm chart for any possible issue with kube-score and kube-linter and got the following issues:
From what I investigated so far, the securityContext (pod + container) is not exposed currently, and I'm unable to configure those via configuration.
Is there any plan to expose the important fields for each resource?
Thank you
The text was updated successfully, but these errors were encountered: