Skip to content

Commit b711c3b

Browse files
authored
Merge pull request #97863 from danielclowers/CNV-63561
CNV#63561: virt-launcher does not use kubevirt-controller SA
2 parents b3458c9 + 65970d1 commit b711c3b

File tree

1 file changed

+7
-2
lines changed

1 file changed

+7
-2
lines changed

modules/virt-additional-scc-for-kubevirt-controller.adoc

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,12 @@
88

99
Security context constraints (SCCs) control permissions for pods. These permissions include actions that a pod, a collection of containers, can perform and what resources it can access. You can use SCCs to define a set of conditions that a pod must run with to be accepted into the system.
1010

11-
The `virt-controller` is a cluster controller that creates the `virt-launcher` pods for virtual machines in the cluster. These pods are granted permissions by the `kubevirt-controller` service account.
11+
The `virt-controller` is a cluster controller that creates the `virt-launcher` pods for virtual machines in the cluster.
12+
13+
[NOTE]
14+
====
15+
By default, `virt-launcher` pods run with the `default` service account in the namespace. If your compliance controls require a unique service account, assign one to the VM. The setting applies to the `VirtualMachineInstance` object and the `virt-launcher` pod.
16+
====
1217

1318
The `kubevirt-controller` service account is granted additional SCCs and Linux capabilities so that it can create `virt-launcher` pods with the appropriate permissions. These extended permissions allow virtual machines to use {VirtProductName} features that are beyond the scope of typical pods.
1419

@@ -18,7 +23,7 @@ The `kubevirt-controller` service account is granted the following SCCs:
1823
This allows virtual machines to use the hostpath volume plugin.
1924
2025
* `scc.AllowPrivilegedContainer = false` +
21-
This ensures the virt-launcher pod is not run as a privileged container.
26+
This ensures the `virt-launcher` pod is not run as a privileged container.
2227
2328
* `scc.AllowedCapabilities = []corev1.Capability{"SYS_NICE", "NET_BIND_SERVICE"}`
2429

0 commit comments

Comments
 (0)