janhoy commented on issue #671:
URL: https://github.com/apache/solr-operator/issues/671#issuecomment-2034596523

   My client uses 
[Kyverno](https://kyverno.io/policies/?policytypes=Pod%2520Security%2520Standards%2520%28Baseline%29)
 to warn or enforce various best practices. They recently added rules to warn 
about deployments that will not run in K8S PSA "restricted" mode: 
https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted.
 I managed to apply these for solr containers and custom init containers, but 
not for the operator-managed init containers.
   
   Since Solr runs well with these restrictions, I support making them standard.
   
   On the POD level:
   ```yaml
   podSecurityContext:
     seccompProfile:
       type: RuntimeDefault
   ```
   
   On the container level:
   ```yaml
   securityContext: 
     allowPrivilegeEscalation: false  
     capabilities:
       drop:
       - ALL
   ```
   
   While OpenShift will require even more changes, the PSA "restricted" mode is 
a generic k8s thing that I support aiming for as default.


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscr...@solr.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


---------------------------------------------------------------------
To unsubscribe, e-mail: issues-unsubscr...@solr.apache.org
For additional commands, e-mail: issues-h...@solr.apache.org

Reply via email to