-
Notifications
You must be signed in to change notification settings - Fork 95
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Is there a way to run as unprivileged? #36
Comments
Hi @mrueg |
@edeNFed, is it also possible to enhance the cli to support passing / specifying a custom apiVersion: batch/v1
kind: Job
spec:
template:
metadata:
name: kubectl-flame-226b6efa-60d7-4256-9317-8aca48862125
namespace: my-app
spec:
securityContext: # <--- Required
fsGroup: 2000
runAsNonRoot: true
runAsUser: 1000
... Thanks! |
@edeNFed Any plans to make it unprivileged? I'm running into the same issue as well when trying to use it in my cluster. Its been over a year since you mentioned you were making a change to add this feature. |
Can I ask any updates on this unprivileged options? Thank you! |
First of all, thanks for writing the plugin. Profiling on kubernetes is difficult and I'm looking forward to seeing if this plugin can ease the pain.
Currently, our clusters have a default podsecurity policy which disallow privileged containers.
Resulting in something like this, when I try to run the plugin:
I see this plugin needs to run the jobs on Kubernetes currently as privileged: https://github.com/VerizonMedia/kubectl-flame/blob/cb7290125d6d471bfb159be5e3ff3bf7178bef94/cli/cmd/kubernetes/job/python.go#L72 (same on jvm and golang)
Is there a way to reduce the number of privileges it needs to run? E.g. by setting the right capabilities?
The text was updated successfully, but these errors were encountered: