Lab 5.4 - how to solve the challenge step?
To recap - the challenge is to use what you have learned about service accounts and RBAC roles to limit a psp to the dev-ns namespace.
My idea to solve the challenge is:
1. Create a PSP to allow everything and let everyone use it across all the namespaces.
2. A second PSP (the target) will be only allowed by all the accounts in the dev-ns
namespace.
Phase 1
student@master:~$ k get psp privileged Warning: policy/v1beta1 PodSecurityPolicy is deprecated in v1.21+, unavailable in v1.25+ NAME PRIV CAPS SELINUX RUNASUSER FSGROUP SUPGROUP READONLYROOTFS VOLUMES privileged true * RunAsAny RunAsAny RunAsAny RunAsAny false * student@master:~$ k describe clusterrole psp:privileged Name: psp:privileged Labels: <none> Annotations: <none> PolicyRule: Resources Non-Resource URLs Resource Names Verbs --------- ----------------- -------------- ----- podsecuritypolicies.policy [] [privileged] [use] student@master:~$ k describe clusterrolebinding any:psp:privileged Name: any:psp:privileged Labels: <none> Annotations: <none> Role: Kind: ClusterRole Name: psp:privileged Subjects: Kind Name Namespace ---- ---- --------- Group system:serviceaccounts Group system:authenticated student@master:~$ k auth can-i --as system:serviceaccounts:dev-ns:simple-sa use psp/privileged Warning: resource 'podsecuritypolicies' is not namespace scoped in group 'policy' yes student@master:~$ k auth can-i --as system:serviceaccounts:default:default use psp/privileged Warning: resource 'podsecuritypolicies' is not namespace scoped in group 'policy' yes student@master:~$ k auth can-i use psp/privileged Warning: resource 'podsecuritypolicies' is not namespace scoped in group 'policy' yes student@master:~$
Phase 2
student@master:~/5$ k -n dev-ns get psp Warning: policy/v1beta1 PodSecurityPolicy is deprecated in v1.21+, unavailable in v1.25+ NAME PRIV CAPS SELINUX RUNASUSER FSGROUP SUPGROUP READONLYROOTFS VOLUMES no-priv false RunAsAny MustRunAsNonRoot RunAsAny RunAsAny false * privileged true * RunAsAny RunAsAny RunAsAny RunAsAny false * student@master:~/5$ k -n dev-ns describe role psp:no-priv Name: psp:no-priv Labels: <none> Annotations: <none> PolicyRule: Resources Non-Resource URLs Resource Names Verbs --------- ----------------- -------------- ----- podsecuritypolicies.policy [] [no-priv] [use] student@master:~/5$ k -n dev-ns describe rolebinding any:psp:no-priv Name: any:psp:no-priv Labels: <none> Annotations: <none> Role: Kind: Role Name: psp:no-priv Subjects: Kind Name Namespace ---- ---- --------- Group system:authenticated Group system:serviceaccounts:dev-ns student@master:~/5$ k -n dev-ns auth can-i --as system:serviceaccount:dev-ns:default use psp/no-priv Warning: resource 'podsecuritypolicies' is not namespace scoped in group 'policy' yes student@master:~/5$ k -n dev-ns auth can-i use psp/no-priv Warning: resource 'podsecuritypolicies' is not namespace scoped in group 'policy' yes student@master:~/5$ k -n dev-ns get pod,rs,deploy No resources found in dev-ns namespace. student@master:~/5$
Now I am going to create the pod db-one
and deployment db-two
in the dev-ns
namespace. The respective pods require to run as root, which is forbidden by the no-priv
policy - we already saw it earlier in the lab. My expectation is that the policy would prevent the pods from starting:
student@master:~/5$ k run --image=mariadb db-one --port=3306 --env="MYSQL_ROOT_PASSWORD=LFtr@in" -n dev-ns pod/db-one created student@master:~/5$ k create -f db-two.yaml deployment.apps/db-two created student@master:~/5$ k -n dev-ns get pod,rs,deploy NAME READY STATUS RESTARTS AGE pod/db-one 0/1 ContainerCreating 0 14s pod/db-two-cfb5c47db-llbq8 0/1 ContainerCreating 0 3s NAME DESIRED CURRENT READY AGE replicaset.apps/db-two-cfb5c47db 1 1 0 3s NAME READY UP-TO-DATE AVAILABLE AGE deployment.apps/db-two 0/1 1 0 3s student@master:~/5$
And already we can see that my idea does not work. If the no-priv
policy actually worked in the dev-ns
namespace, then the replica controller would not have been able to create the pod, but it did. And right now the situation is that all is running, despite my expectations:
student@master:~/5$ k -n dev-ns get pod,rs,deploy NAME READY STATUS RESTARTS AGE pod/db-one 1/1 Running 0 2m30s pod/db-two-cfb5c47db-llbq8 1/1 Running 0 2m19s NAME DESIRED CURRENT READY AGE replicaset.apps/db-two-cfb5c47db 1 1 1 2m19s NAME READY UP-TO-DATE AVAILABLE AGE deployment.apps/db-two 1/1 1 1 2m19s student@master:~/5$
So my scheme does not work and I have no idea how to solve the challenge. Please, help. Thank you.
Categories
- All Categories
- 49 LFX Mentorship
- 102 LFX Mentorship: Linux Kernel
- 551 Linux Foundation Boot Camps
- 295 Cloud Engineer Boot Camp
- 118 Advanced Cloud Engineer Boot Camp
- 52 DevOps Engineer Boot Camp
- 53 Cloud Native Developer Boot Camp
- 4 Express Training Courses
- 4 Express Courses - Discussion Forum
- 1.9K Training Courses
- 18 LFC110 Class Forum
- 6 LFC131 Class Forum
- 25 LFD102 Class Forum
- 150 LFD103 Class Forum
- 17 LFD121 Class Forum
- LFD137 Class Forum
- 61 LFD201 Class Forum
- LFD210 Class Forum
- LFD210-CN Class Forum
- 1 LFD213 Class Forum - Discontinued
- 128 LFD232 Class Forum
- LFD237 Class Forum
- 23 LFD254 Class Forum
- 596 LFD259 Class Forum
- 102 LFD272 Class Forum
- 1 LFD272-JP クラス フォーラム
- LFD273 Class Forum
- 2 LFS145 Class Forum
- 24 LFS200 Class Forum
- 739 LFS201 Class Forum
- 1 LFS201-JP クラス フォーラム
- 3 LFS203 Class Forum
- 69 LFS207 Class Forum
- 300 LFS211 Class Forum
- 54 LFS216 Class Forum
- 47 LFS241 Class Forum
- 41 LFS242 Class Forum
- 37 LFS243 Class Forum
- 11 LFS244 Class Forum
- 33 LFS250 Class Forum
- 1 LFS250-JP クラス フォーラム
- LFS251 Class Forum
- 140 LFS253 Class Forum
- 1K LFS258 Class Forum
- 10 LFS258-JP クラス フォーラム
- 92 LFS260 Class Forum
- 129 LFS261 Class Forum
- 32 LFS262 Class Forum
- 79 LFS263 Class Forum
- 15 LFS264 Class Forum
- 11 LFS266 Class Forum
- 17 LFS267 Class Forum
- 17 LFS268 Class Forum
- 23 LFS269 Class Forum
- 203 LFS272 Class Forum
- 1 LFS272-JP クラス フォーラム
- LFS281 Class Forum
- 221 LFW211 Class Forum
- 166 LFW212 Class Forum
- SKF100 Class Forum
- 901 Hardware
- 219 Drivers
- 74 I/O Devices
- 44 Monitors
- 115 Multimedia
- 208 Networking
- 101 Printers & Scanners
- 85 Storage
- 761 Linux Distributions
- 88 Debian
- 66 Fedora
- 15 Linux Mint
- 13 Mageia
- 24 openSUSE
- 141 Red Hat Enterprise
- 33 Slackware
- 13 SUSE Enterprise
- 356 Ubuntu
- 477 Linux System Administration
- 41 Cloud Computing
- 69 Command Line/Scripting
- Github systems admin projects
- 95 Linux Security
- 77 Network Management
- 108 System Management
- 49 Web Management
- 66 Mobile Computing
- 23 Android
- 29 Development
- 1.2K New to Linux
- 1.1K Getting Started with Linux
- 536 Off Topic
- 131 Introductions
- 216 Small Talk
- 21 Study Material
- 816 Programming and Development
- 275 Kernel Development
- 507 Software Development
- 928 Software
- 260 Applications
- 184 Command Line
- 3 Compiling/Installing
- 76 Games
- 316 Installation
- 59 All In Program
- 59 All In Forum
Upcoming Training
-
August 20, 2018
Kubernetes Administration (LFS458)
-
August 20, 2018
Linux System Administration (LFS301)
-
August 27, 2018
Open Source Virtualization (LFS462)
-
August 27, 2018
Linux Kernel Debugging and Security (LFD440)