You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Using control_t lets the container watch, but presumably that's not ideal? Is there another type that's better suited or that we could create?
control_t is reasonable, though it's not least privilege since it also allows use of the host's API socket.
The primary reason watches are restricted is to prevent fanotify from being used to block the host's access to its own files by denying the permission check. It should be OK to relax the policy so it only blocks these watch_with_perm actions.
The other benefit of restricting watches is to prevent pods from depending on the existence of specific directories or files in the host OS, which could change in an incompatible way across an upgrade. But this isn't as important and doesn't actually make sense in cases like this where we want pods to be able to collect host logs.
Image I'm using:
aws-k8s-1.17 v1.0.1
What I expected to happen:
To be able to collect journal logs from a pod.
What actually happened:
How to reproduce the problem:
Deploy the agent for Cloudwatch Container Insights:
/~https://github.com/aws-samples/amazon-cloudwatch-container-insights
The text was updated successfully, but these errors were encountered: