kubectl-node-shell | Exec into node via kubectl | Command Line Interface library
kandi X-RAY | kubectl-node-shell Summary
kandi X-RAY | kubectl-node-shell Summary
Exec into node via kubectl
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of kubectl-node-shell
kubectl-node-shell Key Features
kubectl-node-shell Examples and Code Snippets
Community Discussions
Trending Discussions on kubectl-node-shell
QUESTION
I'm currently attempting to look into whether it's possible to prevent a Kubernetes user from creating privileged containers via RBAC. I'm aware that as of Kubernetes 1.1, privileged containers are enabled by default to support underlying Docker requirements. This is fine, I'm not looking to block everybody from being able to run privileged containers.
I would, however, like to work on a principle of least privilege. For example, I'd like to prevent users being able to use something such as kubectl node-shell from being able to gain root access to a worker node, preferably through RBAC.
Is this possible?
...ANSWER
Answered 2021-Mar-10 at 17:25There are several ways to achieve this and I'd like to start with the first, official one: Pod Security Policy.
The policy you want to implement is the following: Privileged
determines if any container in a pod can enable privileged mode. By default a container is not allowed to access any devices on the host, but a "privileged" container is given access to all devices on the host. This allows the container nearly all the same access as processes running on the host. This is useful for containers that want to use linux capabilities like manipulating the network stack and accessing devices.
The Kubernetes documentation provides few examples on how to interact with PSP, although a big disclaimer must be stated: the PodSecurityPolicy admission controlled must be activated on the API Server.
Besides the official admission controller, there are other projects that allow performing the denial of containers matching criteria, as well as running as privileged: Gatekeeper, Kyverno.
There are other projects that can address your use-case but wanted to share these last two since they seem the most promising ones.
ExamplesCommunity Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install kubectl-node-shell
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page