secrets-store-csi-driver-provider-azure
secrets-store-csi-driver-provider-azure copied to clipboard
SecurityContext configurable
Running root pods in Azure causes a high security alert in Azure monitors. Is it possible to configure the securityContext so we can run unprivileged pods?
https://github.com/Azure/secrets-store-csi-driver-provider-azure/blob/master/charts/csi-secrets-store-provider-azure/templates/provider-azure-installer.yaml#L73
Running root pods in Azure causes a high security alert in Azure monitors. Is it possible to configure the securityContext so we can run unprivileged pods?
@arevell89 The provider pods need to create and bind unix socket on the host. It needs to run as root to be able to perform this. For this reason, it is recommended to install the driver and provider in kube-system namespace. Please refer to "Why kube-system` in the installation guide.
Closing this as privileged is required for the provider pods. Feel free to reopen if there is a feature request or if you have any further questions.