Skip to content

Commit 36ba953

Browse files
authored
vault/csi-provider: update recommendations for OpenShift (#883)
Also use the chart values to set `privileged: true` instead of directly patching the daemonSet. Across 1.20-1.18, 1.16 doc versions.
1 parent 6e1fe28 commit 36ba953

File tree

4 files changed

+36
-68
lines changed

4 files changed

+36
-68
lines changed

content/vault/v1.16.x/content/docs/platform/k8s/csi/installation.mdx

Lines changed: 9 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -46,28 +46,20 @@ more.
4646

4747
## Installation on OpenShift
4848

49-
We recommend using the [Vault agent injector on Openshift](/vault/docs/platform/k8s/helm/openshift)
50-
instead of the Secrets Store CSI driver. OpenShift
51-
[does not recommend](https://docs.openshift.com/container-platform/4.9/storage/persistent_storage/persistent-storage-hostpath.html)
52-
using `hostPath` mounting in production or
53-
[certify Helm charts](https://github.com/redhat-certification/chart-verifier/blob/dbf89bff2d09142e4709d689a9f4037a739c2244/docs/helm-chart-checks.md#table-2-helm-chart-default-checks)
54-
using CSI objects because pods must run as privileged. Pods will have elevated access to
55-
other pods on the same node, which OpenShift does not recommend.
56-
5749
You can run the Secrets Store CSI driver with additional
5850
security configurations on a OpenShift development
5951
or testing cluster.
6052

61-
Deploy the Secrets Store CSI driver and Vault Helm chart
62-
to your OpenShift cluster.
63-
64-
Then, patch the `DaemonSet` for the Vault CSI provider to
65-
run with a privileged security context.
53+
Deploy the Secrets Store CSI driver and Vault Helm chart to your OpenShift
54+
cluster. Set the [provider container's securityContext](/vault/docs/deploy/kubernetes/helm/configuration#container-2)
55+
to `privileged: true` in the Vault Helm chart values:
6656

67-
```shell-session
68-
$ kubectl patch daemonset vault-csi-provider \
69-
--type='json' \
70-
--patch='[{"op": "add", "path": "/spec/template/spec/containers/0/securityContext", "value": {"privileged": true} }]'
57+
```yaml
58+
csi:
59+
daemonSet:
60+
securityContext:
61+
container:
62+
privileged: true
7163
```
7264
7365
The Secrets Store CSI driver and Vault CSI provider need `hostPath` mount access.

content/vault/v1.18.x/content/docs/platform/k8s/csi/installation.mdx

Lines changed: 9 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -46,28 +46,20 @@ more.
4646

4747
## Installation on OpenShift
4848

49-
We recommend using the [Vault agent injector on Openshift](/vault/docs/platform/k8s/helm/openshift)
50-
instead of the Secrets Store CSI driver. OpenShift
51-
[does not recommend](https://docs.openshift.com/container-platform/4.9/storage/persistent_storage/persistent-storage-hostpath.html)
52-
using `hostPath` mounting in production or
53-
[certify Helm charts](https://github.com/redhat-certification/chart-verifier/blob/dbf89bff2d09142e4709d689a9f4037a739c2244/docs/helm-chart-checks.md#table-2-helm-chart-default-checks)
54-
using CSI objects because pods must run as privileged. Pods will have elevated access to
55-
other pods on the same node, which OpenShift does not recommend.
56-
5749
You can run the Secrets Store CSI driver with additional
5850
security configurations on a OpenShift development
5951
or testing cluster.
6052

61-
Deploy the Secrets Store CSI driver and Vault Helm chart
62-
to your OpenShift cluster.
63-
64-
Then, patch the `DaemonSet` for the Vault CSI provider to
65-
run with a privileged security context.
53+
Deploy the Secrets Store CSI driver and Vault Helm chart to your OpenShift
54+
cluster. Set the [provider container's securityContext](/vault/docs/deploy/kubernetes/helm/configuration#container-2)
55+
to `privileged: true` in the Vault Helm chart values:
6656

67-
```shell-session
68-
$ kubectl patch daemonset vault-csi-provider \
69-
--type='json' \
70-
--patch='[{"op": "add", "path": "/spec/template/spec/containers/0/securityContext", "value": {"privileged": true} }]'
57+
```yaml
58+
csi:
59+
daemonSet:
60+
securityContext:
61+
container:
62+
privileged: true
7163
```
7264
7365
The Secrets Store CSI driver and Vault CSI provider need `hostPath` mount access.

content/vault/v1.19.x/content/docs/deploy/kubernetes/csi/installation.mdx

Lines changed: 9 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -46,28 +46,20 @@ more.
4646

4747
## Installation on OpenShift
4848

49-
We recommend using the [Vault agent injector on Openshift](/vault/docs/platform/k8s/helm/openshift)
50-
instead of the Secrets Store CSI driver. OpenShift
51-
[does not recommend](https://docs.openshift.com/container-platform/4.9/storage/persistent_storage/persistent-storage-hostpath.html)
52-
using `hostPath` mounting in production or
53-
[certify Helm charts](https://github.com/redhat-certification/chart-verifier/blob/dbf89bff2d09142e4709d689a9f4037a739c2244/docs/helm-chart-checks.md#table-2-helm-chart-default-checks)
54-
using CSI objects because pods must run as privileged. Pods will have elevated access to
55-
other pods on the same node, which OpenShift does not recommend.
56-
5749
You can run the Secrets Store CSI driver with additional
5850
security configurations on a OpenShift development
5951
or testing cluster.
6052

61-
Deploy the Secrets Store CSI driver and Vault Helm chart
62-
to your OpenShift cluster.
63-
64-
Then, patch the `DaemonSet` for the Vault CSI provider to
65-
run with a privileged security context.
53+
Deploy the Secrets Store CSI driver and Vault Helm chart to your OpenShift
54+
cluster. Set the [provider container's securityContext](/vault/docs/deploy/kubernetes/helm/configuration#container-2)
55+
to `privileged: true` in the Vault Helm chart values:
6656

67-
```shell-session
68-
$ kubectl patch daemonset vault-csi-provider \
69-
--type='json' \
70-
--patch='[{"op": "add", "path": "/spec/template/spec/containers/0/securityContext", "value": {"privileged": true} }]'
57+
```yaml
58+
csi:
59+
daemonSet:
60+
securityContext:
61+
container:
62+
privileged: true
7163
```
7264
7365
The Secrets Store CSI driver and Vault CSI provider need `hostPath` mount access.

content/vault/v1.20.x/content/docs/deploy/kubernetes/csi/installation.mdx

Lines changed: 9 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -46,28 +46,20 @@ more.
4646

4747
## Installation on OpenShift
4848

49-
We recommend using the [Vault agent injector on Openshift](/vault/docs/platform/k8s/helm/openshift)
50-
instead of the Secrets Store CSI driver. OpenShift
51-
[does not recommend](https://docs.openshift.com/container-platform/4.9/storage/persistent_storage/persistent-storage-hostpath.html)
52-
using `hostPath` mounting in production or
53-
[certify Helm charts](https://github.com/redhat-certification/chart-verifier/blob/dbf89bff2d09142e4709d689a9f4037a739c2244/docs/helm-chart-checks.md#table-2-helm-chart-default-checks)
54-
using CSI objects because pods must run as privileged. Pods will have elevated access to
55-
other pods on the same node, which OpenShift does not recommend.
56-
5749
You can run the Secrets Store CSI driver with additional
5850
security configurations on a OpenShift development
5951
or testing cluster.
6052

61-
Deploy the Secrets Store CSI driver and Vault Helm chart
62-
to your OpenShift cluster.
63-
64-
Then, patch the `DaemonSet` for the Vault CSI provider to
65-
run with a privileged security context.
53+
Deploy the Secrets Store CSI driver and Vault Helm chart to your OpenShift
54+
cluster. Set the [provider container's securityContext](/vault/docs/deploy/kubernetes/helm/configuration#container-2)
55+
to `privileged: true` in the Vault Helm chart values:
6656

67-
```shell-session
68-
$ kubectl patch daemonset vault-csi-provider \
69-
--type='json' \
70-
--patch='[{"op": "add", "path": "/spec/template/spec/containers/0/securityContext", "value": {"privileged": true} }]'
57+
```yaml
58+
csi:
59+
daemonSet:
60+
securityContext:
61+
container:
62+
privileged: true
7163
```
7264
7365
The Secrets Store CSI driver and Vault CSI provider need `hostPath` mount access.

0 commit comments

Comments
 (0)