Skip to content

Update readme about nri.sock and SELinux#219

Open
ngopalak-redhat wants to merge 1 commit intocontainerd:mainfrom
ngopalak-redhat:ngopalak/ngopalak_read_only
Open

Update readme about nri.sock and SELinux#219
ngopalak-redhat wants to merge 1 commit intocontainerd:mainfrom
ngopalak-redhat:ngopalak/ngopalak_read_only

Conversation

@ngopalak-redhat
Copy link
Contributor

In environments like OpenShift, its required to configure SELinux in security context. Hence added a small readme update.

Signed-off-by: Neeraj Krishna Gopalakrishna <ngopalak@redhat.com>
Copy link
Member

@klihub klihub left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you ! LGTM.

@klihub klihub requested a review from chrishenzie August 29, 2025 06:21
Copy link
Member

@mikebrow mikebrow left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

suggest adding a couple sentences that describes the expected error that will get generated and what the problem is... volume mounting a host level socket between the pod and the container runtime..

This way seems like a big hammer.. is there any other way to make it work? selinux mount label maybe?

and [best practices](https://kubernetes.io/docs/setup/best-practices/enforcing-pod-security-standards/)
about Kubernetes security.

To use the plugins in SELinux-enabled environments, either create a new policy
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
To use the plugins in SELinux-enabled environments, either create a new policy
One expected path for running NRI plugins is to run them as a pod/container in a daemonset on each of the nodes of a cluster.
### SELinux enabled environments
NOTE: To run the plugins, as a pod, in `SELinux-enabled` environments the kubernetes security level assigned to the pod MUST

pod security policies have been deprecated .. they've become levels assigned or via controller.. it's confusing :-)

about Kubernetes security.

To use the plugins in SELinux-enabled environments, either create a new policy
or set the SELinux type to spc_t (Super Privileged Container) in the pod's security
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
or set the SELinux type to spc_t (Super Privileged Container) in the pod's security
set the SELinux type label to spc_t (Super Privileged Container) in the pod's security

@samuelkarp samuelkarp added the status/needs-update Awaiting contributor update label Mar 5, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

status/needs-update Awaiting contributor update

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants