Merge "Added Note for Kata Containers Support"

This commit is contained in:
Zuul 2022-12-14 20:59:17 +00:00 committed by Gerrit Code Review
commit 1b20a17942
5 changed files with 28 additions and 11 deletions

View File

@ -5,7 +5,7 @@ Container Security Planning
=========================== ===========================
The following container security best practices are recommended as part of your The following container security best practices are recommended as part of your
network security planning. network security planning.
Restrict Direct (SSH) Access to Kubernetes Nodes Restrict Direct (SSH) Access to Kubernetes Nodes
------------------------------------------------ ------------------------------------------------
@ -18,7 +18,7 @@ Use Role-based Access Control (RBAC)
------------------------------------ ------------------------------------
Define RBAC policies to exercise strict control over permissions granted to Define RBAC policies to exercise strict control over permissions granted to
non-admin users. Restrict non-admin users to the minimum level of privileges. non-admin users. Restrict non-admin users to the minimum level of privileges.
Use Namespaces Use Namespaces
-------------- --------------
@ -51,7 +51,7 @@ Specify Minimal-Required Security Context for Pods
-------------------------------------------------- --------------------------------------------------
Explicitly specify the minimal-required security context for pods, containers Explicitly specify the minimal-required security context for pods, containers
and volumes through pod security policies, for example: and volumes through pod security policies, for example:
- runAsNonRoot - runAsNonRoot
@ -63,11 +63,15 @@ and volumes through pod security policies, for example:
Kata Containers Kata Containers
--------------- ---------------
.. note::
Kata Containers will not be supported in |prod-long| |prod-ver|.
Kata containers are an optional capability on |prod| that provide a secure Kata containers are an optional capability on |prod| that provide a secure
container runtime with lightweight virtual machines that feel and perform like container runtime with lightweight virtual machines that feel and perform like
containers, but provide stronger workload isolation. For improved performance containers, but provide stronger workload isolation. For improved performance
with relation to isolation, Kata containers leverages hardware-enforced isolation with relation to isolation, Kata containers leverages hardware-enforced isolation
with virtualization VT extensions. with virtualization VT extensions.
For more information, see :ref:`starlingx-kubernetes-user-tutorials-overview`. For more information, see :ref:`starlingx-kubernetes-user-tutorials-overview`.
@ -80,14 +84,14 @@ of security-sensitive aspects of Pod security. PodSecurityPolicies (PSP) define
different levels of access to security-sensitive aspects of the pod. RBAC different levels of access to security-sensitive aspects of the pod. RBAC
[Cluster]Roles can then be created for these PSPs, with RBAC [Cluster]Roles can then be created for these PSPs, with RBAC
[Cluster]RoleBindings of these roles to a subject (i.e. users, groups, [Cluster]RoleBindings of these roles to a subject (i.e. users, groups,
serviceaccounts, etc.). serviceaccounts, etc.).
The following considerations apply to PodSecurityPolicies (PSPs): The following considerations apply to PodSecurityPolicies (PSPs):
- includes enabling or disabling options such as running as root, access to - includes enabling or disabling options such as running as root, access to
host filesystem, access to host networking, etc. host filesystem, access to host networking, etc.
- are disabled by default - are disabled by default
- can be enable by the System Administrator via **system service-parameter-add - can be enable by the System Administrator via **system service-parameter-add
kubernetes kube_apiserver admission_plugins=PodSecurityPolicy** kubernetes kube_apiserver admission_plugins=PodSecurityPolicy**
@ -105,8 +109,8 @@ usage:
- authenticated users can only perform a restricted set of - authenticated users can only perform a restricted set of
security-sensitive options on Pods and only in namespaces the user security-sensitive options on Pods and only in namespaces the user
is allowed to access is allowed to access
Administrator can then: Administrator can then:
- create other custom PodSecurityPolicies and associated RBAC Roles - create other custom PodSecurityPolicies and associated RBAC Roles
@ -114,7 +118,7 @@ Administrator can then:
------------------------------------ ------------------------------------
Container Image Signature Validation Container Image Signature Validation
------------------------------------ ------------------------------------
The Portieris admission controller allows you to enforce image security polices The Portieris admission controller allows you to enforce image security polices

View File

@ -24,6 +24,7 @@
.. |eBPF| replace:: :abbr:`eBPF (Extended Berkeley Packet Filter)` .. |eBPF| replace:: :abbr:`eBPF (Extended Berkeley Packet Filter)`
.. |CA| replace:: :abbr:`CA (Certificate Authority)` .. |CA| replace:: :abbr:`CA (Certificate Authority)`
.. |CAs| replace:: :abbr:`CAs (Certificate Authorities)` .. |CAs| replace:: :abbr:`CAs (Certificate Authorities)`
.. |CDI| replace:: :abbr:`CDI (Containerized Data Importer)`
.. |CLI| replace:: :abbr:`CLI (Command Line Interface)` .. |CLI| replace:: :abbr:`CLI (Command Line Interface)`
.. |CLIs| replace:: :abbr:`CLIs (Command Line Interfaces)` .. |CLIs| replace:: :abbr:`CLIs (Command Line Interfaces)`
.. |CNI| replace:: :abbr:`CNI (Container Networking Interface)` .. |CNI| replace:: :abbr:`CNI (Container Networking Interface)`
@ -67,6 +68,7 @@
.. |IPMI| replace:: :abbr:`IPMI (Intelligent Platform Management Interface)` .. |IPMI| replace:: :abbr:`IPMI (Intelligent Platform Management Interface)`
.. |IOPS| replace:: :abbr:`IOPS (I/O operations per second)` .. |IOPS| replace:: :abbr:`IOPS (I/O operations per second)`
.. |IRQ| replace:: :abbr:`IRQ (Interrupt Request)` .. |IRQ| replace:: :abbr:`IRQ (Interrupt Request)`
.. |ISA| replace:: :abbr:`ISA (Instruction Set Architecture)`
.. |KVM| replace:: :abbr:`KVM (Kernel-based Virtual Machine)` .. |KVM| replace:: :abbr:`KVM (Kernel-based Virtual Machine)`
.. |LACP| replace:: :abbr:`LACP (Link Aggregation Control Protocol)` .. |LACP| replace:: :abbr:`LACP (Link Aggregation Control Protocol)`
.. |LAG| replace:: :abbr:`LAG (Link Aggregation)` .. |LAG| replace:: :abbr:`LAG (Link Aggregation)`
@ -141,6 +143,7 @@
.. |SRIOVs| replace:: :abbr:`SR-IOVs (Single Root I/O Virtualizations)` .. |SRIOVs| replace:: :abbr:`SR-IOVs (Single Root I/O Virtualizations)`
.. |SSD| replace:: :abbr:`SSD (Solid State Drive)` .. |SSD| replace:: :abbr:`SSD (Solid State Drive)`
.. |SSDs| replace:: :abbr:`SSDs (Solid State Drives)` .. |SSDs| replace:: :abbr:`SSDs (Solid State Drives)`
.. |SSSD| replace:: :abbr:`SSSD (System Security Services Daemon)`
.. |SSH| replace:: :abbr:`SSH (Secure Shell)` .. |SSH| replace:: :abbr:`SSH (Secure Shell)`
.. |SSL| replace:: :abbr:`SSL (Secure Socket Layer)` .. |SSL| replace:: :abbr:`SSL (Secure Socket Layer)`
.. |STP| replace:: :abbr:`STP (Spanning Tree Protocol)` .. |STP| replace:: :abbr:`STP (Spanning Tree Protocol)`

View File

@ -6,7 +6,9 @@
Kata Containers Overview Kata Containers Overview
======================== ========================
|prod| supports Kata Containers. .. note::
Kata Containers will not be supported in |prod-long| |prod-ver|.
|prod| uses a **containerd** :abbr:`CRI (Container Runtime Interface)` that supports |prod| uses a **containerd** :abbr:`CRI (Container Runtime Interface)` that supports
both runc and Kata Container runtimes. The default runtime is runc. If you want both runc and Kata Container runtimes. The default runtime is runc. If you want

View File

@ -6,6 +6,10 @@
Known Kata Container Limitations Known Kata Container Limitations
================================ ================================
.. note::
Kata Containers will not be supported in |prod-long| |prod-ver|.
This section describes the known limitations when using Kata containers. This section describes the known limitations when using Kata containers.
.. _known-limitations-section-tsh-tl1-zlb: .. _known-limitations-section-tsh-tl1-zlb:

View File

@ -6,6 +6,10 @@
Specify Kata Container Runtime in Pod Spec Specify Kata Container Runtime in Pod Spec
========================================== ==========================================
.. note::
Kata Containers will not be supported in |prod-long| |prod-ver|.
You can specify the use of Kata Container runtime in your pod specification by You can specify the use of Kata Container runtime in your pod specification by
runtime class or by annotation. runtime class or by annotation.