Merge "Added Note for Kata Containers Support"
This commit is contained in:
commit
1b20a17942
@ -5,7 +5,7 @@ Container Security Planning
|
|||||||
===========================
|
===========================
|
||||||
|
|
||||||
The following container security best practices are recommended as part of your
|
The following container security best practices are recommended as part of your
|
||||||
network security planning.
|
network security planning.
|
||||||
|
|
||||||
Restrict Direct (SSH) Access to Kubernetes Nodes
|
Restrict Direct (SSH) Access to Kubernetes Nodes
|
||||||
------------------------------------------------
|
------------------------------------------------
|
||||||
@ -18,7 +18,7 @@ Use Role-based Access Control (RBAC)
|
|||||||
------------------------------------
|
------------------------------------
|
||||||
|
|
||||||
Define RBAC policies to exercise strict control over permissions granted to
|
Define RBAC policies to exercise strict control over permissions granted to
|
||||||
non-admin users. Restrict non-admin users to the minimum level of privileges.
|
non-admin users. Restrict non-admin users to the minimum level of privileges.
|
||||||
|
|
||||||
Use Namespaces
|
Use Namespaces
|
||||||
--------------
|
--------------
|
||||||
@ -51,7 +51,7 @@ Specify Minimal-Required Security Context for Pods
|
|||||||
--------------------------------------------------
|
--------------------------------------------------
|
||||||
|
|
||||||
Explicitly specify the minimal-required security context for pods, containers
|
Explicitly specify the minimal-required security context for pods, containers
|
||||||
and volumes through pod security policies, for example:
|
and volumes through pod security policies, for example:
|
||||||
|
|
||||||
- runAsNonRoot
|
- runAsNonRoot
|
||||||
|
|
||||||
@ -63,11 +63,15 @@ and volumes through pod security policies, for example:
|
|||||||
Kata Containers
|
Kata Containers
|
||||||
---------------
|
---------------
|
||||||
|
|
||||||
|
.. note::
|
||||||
|
|
||||||
|
Kata Containers will not be supported in |prod-long| |prod-ver|.
|
||||||
|
|
||||||
Kata containers are an optional capability on |prod| that provide a secure
|
Kata containers are an optional capability on |prod| that provide a secure
|
||||||
container runtime with lightweight virtual machines that feel and perform like
|
container runtime with lightweight virtual machines that feel and perform like
|
||||||
containers, but provide stronger workload isolation. For improved performance
|
containers, but provide stronger workload isolation. For improved performance
|
||||||
with relation to isolation, Kata containers leverages hardware-enforced isolation
|
with relation to isolation, Kata containers leverages hardware-enforced isolation
|
||||||
with virtualization VT extensions.
|
with virtualization VT extensions.
|
||||||
|
|
||||||
For more information, see :ref:`starlingx-kubernetes-user-tutorials-overview`.
|
For more information, see :ref:`starlingx-kubernetes-user-tutorials-overview`.
|
||||||
|
|
||||||
@ -80,14 +84,14 @@ of security-sensitive aspects of Pod security. PodSecurityPolicies (PSP) define
|
|||||||
different levels of access to security-sensitive aspects of the pod. RBAC
|
different levels of access to security-sensitive aspects of the pod. RBAC
|
||||||
[Cluster]Roles can then be created for these PSPs, with RBAC
|
[Cluster]Roles can then be created for these PSPs, with RBAC
|
||||||
[Cluster]RoleBindings of these roles to a ‘subject’ (i.e. users, groups,
|
[Cluster]RoleBindings of these roles to a ‘subject’ (i.e. users, groups,
|
||||||
serviceaccounts, etc.).
|
serviceaccounts, etc.).
|
||||||
|
|
||||||
The following considerations apply to PodSecurityPolicies (PSPs):
|
The following considerations apply to PodSecurityPolicies (PSPs):
|
||||||
|
|
||||||
- includes enabling or disabling options such as running as root, access to
|
- includes enabling or disabling options such as running as root, access to
|
||||||
host filesystem, access to host networking, etc.
|
host filesystem, access to host networking, etc.
|
||||||
|
|
||||||
- are disabled by default
|
- are disabled by default
|
||||||
|
|
||||||
- can be enable by the System Administrator via **system service-parameter-add
|
- can be enable by the System Administrator via **system service-parameter-add
|
||||||
kubernetes kube_apiserver admission_plugins=PodSecurityPolicy**
|
kubernetes kube_apiserver admission_plugins=PodSecurityPolicy**
|
||||||
@ -105,8 +109,8 @@ usage:
|
|||||||
- authenticated users can only perform a restricted set of
|
- authenticated users can only perform a restricted set of
|
||||||
security-sensitive options on Pods and only in namespaces the user
|
security-sensitive options on Pods and only in namespaces the user
|
||||||
is allowed to access
|
is allowed to access
|
||||||
|
|
||||||
Administrator can then:
|
Administrator can then:
|
||||||
|
|
||||||
- create other custom PodSecurityPolicies and associated RBAC Roles
|
- create other custom PodSecurityPolicies and associated RBAC Roles
|
||||||
|
|
||||||
@ -114,7 +118,7 @@ Administrator can then:
|
|||||||
|
|
||||||
|
|
||||||
------------------------------------
|
------------------------------------
|
||||||
Container Image Signature Validation
|
Container Image Signature Validation
|
||||||
------------------------------------
|
------------------------------------
|
||||||
|
|
||||||
The Portieris admission controller allows you to enforce image security polices
|
The Portieris admission controller allows you to enforce image security polices
|
||||||
|
@ -24,6 +24,7 @@
|
|||||||
.. |eBPF| replace:: :abbr:`eBPF (Extended Berkeley Packet Filter)`
|
.. |eBPF| replace:: :abbr:`eBPF (Extended Berkeley Packet Filter)`
|
||||||
.. |CA| replace:: :abbr:`CA (Certificate Authority)`
|
.. |CA| replace:: :abbr:`CA (Certificate Authority)`
|
||||||
.. |CAs| replace:: :abbr:`CAs (Certificate Authorities)`
|
.. |CAs| replace:: :abbr:`CAs (Certificate Authorities)`
|
||||||
|
.. |CDI| replace:: :abbr:`CDI (Containerized Data Importer)`
|
||||||
.. |CLI| replace:: :abbr:`CLI (Command Line Interface)`
|
.. |CLI| replace:: :abbr:`CLI (Command Line Interface)`
|
||||||
.. |CLIs| replace:: :abbr:`CLIs (Command Line Interfaces)`
|
.. |CLIs| replace:: :abbr:`CLIs (Command Line Interfaces)`
|
||||||
.. |CNI| replace:: :abbr:`CNI (Container Networking Interface)`
|
.. |CNI| replace:: :abbr:`CNI (Container Networking Interface)`
|
||||||
@ -67,6 +68,7 @@
|
|||||||
.. |IPMI| replace:: :abbr:`IPMI (Intelligent Platform Management Interface)`
|
.. |IPMI| replace:: :abbr:`IPMI (Intelligent Platform Management Interface)`
|
||||||
.. |IOPS| replace:: :abbr:`IOPS (I/O operations per second)`
|
.. |IOPS| replace:: :abbr:`IOPS (I/O operations per second)`
|
||||||
.. |IRQ| replace:: :abbr:`IRQ (Interrupt Request)`
|
.. |IRQ| replace:: :abbr:`IRQ (Interrupt Request)`
|
||||||
|
.. |ISA| replace:: :abbr:`ISA (Instruction Set Architecture)`
|
||||||
.. |KVM| replace:: :abbr:`KVM (Kernel-based Virtual Machine)`
|
.. |KVM| replace:: :abbr:`KVM (Kernel-based Virtual Machine)`
|
||||||
.. |LACP| replace:: :abbr:`LACP (Link Aggregation Control Protocol)`
|
.. |LACP| replace:: :abbr:`LACP (Link Aggregation Control Protocol)`
|
||||||
.. |LAG| replace:: :abbr:`LAG (Link Aggregation)`
|
.. |LAG| replace:: :abbr:`LAG (Link Aggregation)`
|
||||||
@ -141,6 +143,7 @@
|
|||||||
.. |SRIOVs| replace:: :abbr:`SR-IOVs (Single Root I/O Virtualizations)`
|
.. |SRIOVs| replace:: :abbr:`SR-IOVs (Single Root I/O Virtualizations)`
|
||||||
.. |SSD| replace:: :abbr:`SSD (Solid State Drive)`
|
.. |SSD| replace:: :abbr:`SSD (Solid State Drive)`
|
||||||
.. |SSDs| replace:: :abbr:`SSDs (Solid State Drives)`
|
.. |SSDs| replace:: :abbr:`SSDs (Solid State Drives)`
|
||||||
|
.. |SSSD| replace:: :abbr:`SSSD (System Security Services Daemon)`
|
||||||
.. |SSH| replace:: :abbr:`SSH (Secure Shell)`
|
.. |SSH| replace:: :abbr:`SSH (Secure Shell)`
|
||||||
.. |SSL| replace:: :abbr:`SSL (Secure Socket Layer)`
|
.. |SSL| replace:: :abbr:`SSL (Secure Socket Layer)`
|
||||||
.. |STP| replace:: :abbr:`STP (Spanning Tree Protocol)`
|
.. |STP| replace:: :abbr:`STP (Spanning Tree Protocol)`
|
||||||
|
@ -6,7 +6,9 @@
|
|||||||
Kata Containers Overview
|
Kata Containers Overview
|
||||||
========================
|
========================
|
||||||
|
|
||||||
|prod| supports Kata Containers.
|
.. note::
|
||||||
|
|
||||||
|
Kata Containers will not be supported in |prod-long| |prod-ver|.
|
||||||
|
|
||||||
|prod| uses a **containerd** :abbr:`CRI (Container Runtime Interface)` that supports
|
|prod| uses a **containerd** :abbr:`CRI (Container Runtime Interface)` that supports
|
||||||
both runc and Kata Container runtimes. The default runtime is runc. If you want
|
both runc and Kata Container runtimes. The default runtime is runc. If you want
|
||||||
|
@ -6,6 +6,10 @@
|
|||||||
Known Kata Container Limitations
|
Known Kata Container Limitations
|
||||||
================================
|
================================
|
||||||
|
|
||||||
|
.. note::
|
||||||
|
|
||||||
|
Kata Containers will not be supported in |prod-long| |prod-ver|.
|
||||||
|
|
||||||
This section describes the known limitations when using Kata containers.
|
This section describes the known limitations when using Kata containers.
|
||||||
|
|
||||||
.. _known-limitations-section-tsh-tl1-zlb:
|
.. _known-limitations-section-tsh-tl1-zlb:
|
||||||
|
@ -6,6 +6,10 @@
|
|||||||
Specify Kata Container Runtime in Pod Spec
|
Specify Kata Container Runtime in Pod Spec
|
||||||
==========================================
|
==========================================
|
||||||
|
|
||||||
|
.. note::
|
||||||
|
|
||||||
|
Kata Containers will not be supported in |prod-long| |prod-ver|.
|
||||||
|
|
||||||
You can specify the use of Kata Container runtime in your pod specification by
|
You can specify the use of Kata Container runtime in your pod specification by
|
||||||
runtime class or by annotation.
|
runtime class or by annotation.
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user