Tim created FLINK-28554: --------------------------- Summary: Kubernetes-Operator allow readOnlyRootFilesystem securityContext Key: FLINK-28554 URL: https://issues.apache.org/jira/browse/FLINK-28554 Project: Flink Issue Type: Improvement Components: Kubernetes Operator Affects Versions: kubernetes-operator-1.0.1 Reporter: Tim
It would be nice if the operator would support using the "readOnlyRootFilesystem" setting via the operatorSecurityContext. When using the default operator template the operator won't be able to start when using this setting because the config files mounted in `/opt/flink/conf` are now (of course) also read-only. It would be nice if the default template would be written in such a way that it allows adding emptyDir volumes to /opt/flink/conf via the values.yaml. Which is not possible right now. Then the config files can remain editable by the operator while keeping the root filesystem read-only. I have successfully tried that in my branch (see: [https://github.com/apache/flink-kubernetes-operator/commit/98c30d22ed998c7eccb66875de8884a701079412|https://github.com/apache/flink-kubernetes-operator/commit/98c30d22ed998c7eccb66875de8884a701079412)]) which prepares the operator template. After this small change to the template it is possible add emptyDir volumes for the conf and tmp dirs and in the second step to enable the readOnlyRootFilesystem setting via the values.yaml values.yaml {code:java} [...] operatorVolumeMounts: create: true data: - name: flink-conf mountPath: /opt/flink/conf subPath: conf - name: flink-tmp mountPath: /tmp operatorVolumes: create: true data: - name: flink-conf emptyDir: {} - name: flink-tmp emptyDir: {} operatorSecurityContext: readOnlyRootFilesystem: true [...]{code} I think this could be a viable way to allow this security setting and I could turn this into a pull request if desired. What do you think about it? Or is there even a better way to achive this I didn't thought about yet? -- This message was sent by Atlassian Jira (v8.20.10#820010)