You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Add support for arbitrary user IDs in secured Kubernetes environments without needing to disable permission checks.
#12905 added support for arbitrary user IDs, but it changed the permissions of the files in a way that require Beats docker images to be run with BEAT_STRICT_PERMS=false, what is not recommended so far.
We should find a way to support arbitrary user IDs, without changing the current behaviour for the rest of cases.
From OpenShift recommendations: "For an image to support running as an arbitrary user, directories and files that may be written to by processes in the image should be owned by the root group and be read/writable by that group. Files to be executed should also have group execute permissions."
As the files that conflict with BEAT_STRICT_PERMS don't need to be written by the beat, maybe it is enough with changing the group owner to root, and leave the permissions as they were before #12905.
Add support for arbitrary user IDs in secured Kubernetes environments without needing to disable permission checks.
#12905 added support for arbitrary user IDs, but it changed the permissions of the files in a way that require Beats docker images to be run with
BEAT_STRICT_PERMS=false
, what is not recommended so far.We should find a way to support arbitrary user IDs, without changing the current behaviour for the rest of cases.
Related issues:
The text was updated successfully, but these errors were encountered: