feat: add OpenShift SecurityContextConstraints configuration#180
feat: add OpenShift SecurityContextConstraints configuration#180aleksrosz wants to merge 2 commits intoClickHouse:mainfrom
Conversation
|
Hi @aleksrosz, thank you for the idea, but I think this doesn't really help with the issue. |
|
@GrigoryPervakov This SCC would only be useful when someone actually needs these capabilities. |
These capabilities are inherited from our internal experience and are mostly needed for performance analysis. |
Why
In OpenShift "security context constraints" is used which is similar to Vanilla Kubernetes. With default OpenShift SCC restricted-v2 or restricted-v3 there is no possibility to run Keeper and Database pods. There is a need for custom SCC that allows capabilities:
and running as user 101
https://docs.redhat.com/en/documentation/openshift_container_platform/4.21/html/authentication_and_authorization/managing-pod-security-policies
Maybe it is even worth to create seperate ServiceAccount for ClickHouse and then specify in:
users:
it is something to decide on your side.
What
I created custom SCC and added value in helm values.yam file. I tested this setup with ClickHouse operator v.0.0.4 and OpenShift 4.20.16
Related Issues
No related issues