Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
54 changes: 54 additions & 0 deletions dist/chart/templates/scc/clickhouse-scc.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,54 @@
{{- if .Values.openshift.scc.enabled }}
apiVersion: security.openshift.io/v1
kind: SecurityContextConstraints
metadata:
annotations:
kubernetes.io/description: SCC denies access to all host features and
requires pods to be run with a UID, and SELinux context. Allows capabilities needed by ClickHouse Keeper.
name: clickhouse-scc
priority: null
readOnlyRootFilesystem: false
defaultAddCapabilities: null
fsGroup:
ranges:
- max: 65534
min: 100
type: MustRunAs
groups: []
requiredDropCapabilities:
- ALL
runAsUser:
type: MustRunAsRange
uidRangeMin: 100
uidRangeMax: 65534
seLinuxContext:
type: MustRunAs
seccompProfiles:
- runtime/default
supplementalGroups:
ranges:
- max: 65534
min: 100
type: MustRunAs
volumes:
- configMap
- csi
- downwardAPI
- emptyDir
- ephemeral
- persistentVolumeClaim
- projected
- secret
allowHostDirVolumePlugin: false
allowHostIPC: false
allowHostNetwork: false
allowHostPID: false
allowHostPorts: false
allowPrivilegeEscalation: false
allowPrivilegedContainer: false
allowedCapabilities:
- NET_BIND_SERVICE
- IPC_LOCK
- PERFMON
- SYS_PTRACE
{{- end }}
6 changes: 6 additions & 0 deletions dist/chart/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -164,6 +164,12 @@ prometheus:
# Requires prometheus-operator to be installed in the cluster.
service_monitor: false

## OpenShift specific configurations
##
openshift:
scc:
# Enable creating SecurityContextConstraints for OpenShift
enabled: false

# Extra manifests to deploy as an array
extraManifests: []
Expand Down