Lab 5.4 - how to solve the challenge step?
To recap - the challenge is to use what you have learned about service accounts and RBAC roles to limit a psp to the dev-ns namespace.
My idea to solve the challenge is:
1. Create a PSP to allow everything and let everyone use it across all the namespaces.
2. A second PSP (the target) will be only allowed by all the accounts in the dev-ns
namespace.
Phase 1
- student@master:~$ k get psp privileged
- Warning: policy/v1beta1 PodSecurityPolicy is deprecated in v1.21+, unavailable in v1.25+
- NAME PRIV CAPS SELINUX RUNASUSER FSGROUP SUPGROUP READONLYROOTFS VOLUMES
- privileged true * RunAsAny RunAsAny RunAsAny RunAsAny false *
- student@master:~$ k describe clusterrole psp:privileged
- Name: psp:privileged
- Labels: <none>
- Annotations: <none>
- PolicyRule:
- Resources Non-Resource URLs Resource Names Verbs
- --------- ----------------- -------------- -----
- podsecuritypolicies.policy [] [privileged] [use]
- student@master:~$ k describe clusterrolebinding any:psp:privileged
- Name: any:psp:privileged
- Labels: <none>
- Annotations: <none>
- Role:
- Kind: ClusterRole
- Name: psp:privileged
- Subjects:
- Kind Name Namespace
- ---- ---- ---------
- Group system:serviceaccounts
- Group system:authenticated
- student@master:~$ k auth can-i --as system:serviceaccounts:dev-ns:simple-sa use psp/privileged
- Warning: resource 'podsecuritypolicies' is not namespace scoped in group 'policy'
- yes
- student@master:~$ k auth can-i --as system:serviceaccounts:default:default use psp/privileged
- Warning: resource 'podsecuritypolicies' is not namespace scoped in group 'policy'
- yes
- student@master:~$ k auth can-i use psp/privileged
- Warning: resource 'podsecuritypolicies' is not namespace scoped in group 'policy'
- yes
- student@master:~$
Phase 2
- student@master:~/5$ k -n dev-ns get psp
- Warning: policy/v1beta1 PodSecurityPolicy is deprecated in v1.21+, unavailable in v1.25+
- NAME PRIV CAPS SELINUX RUNASUSER FSGROUP SUPGROUP READONLYROOTFS VOLUMES
- no-priv false RunAsAny MustRunAsNonRoot RunAsAny RunAsAny false *
- privileged true * RunAsAny RunAsAny RunAsAny RunAsAny false *
- student@master:~/5$ k -n dev-ns describe role psp:no-priv
- Name: psp:no-priv
- Labels: <none>
- Annotations: <none>
- PolicyRule:
- Resources Non-Resource URLs Resource Names Verbs
- --------- ----------------- -------------- -----
- podsecuritypolicies.policy [] [no-priv] [use]
- student@master:~/5$ k -n dev-ns describe rolebinding any:psp:no-priv
- Name: any:psp:no-priv
- Labels: <none>
- Annotations: <none>
- Role:
- Kind: Role
- Name: psp:no-priv
- Subjects:
- Kind Name Namespace
- ---- ---- ---------
- Group system:authenticated
- Group system:serviceaccounts:dev-ns
- student@master:~/5$ k -n dev-ns auth can-i --as system:serviceaccount:dev-ns:default use psp/no-priv
- Warning: resource 'podsecuritypolicies' is not namespace scoped in group 'policy'
- yes
- student@master:~/5$ k -n dev-ns auth can-i use psp/no-priv
- Warning: resource 'podsecuritypolicies' is not namespace scoped in group 'policy'
- yes
- student@master:~/5$ k -n dev-ns get pod,rs,deploy
- No resources found in dev-ns namespace.
- student@master:~/5$
Now I am going to create the pod db-one
and deployment db-two
in the dev-ns
namespace. The respective pods require to run as root, which is forbidden by the no-priv
policy - we already saw it earlier in the lab. My expectation is that the policy would prevent the pods from starting:
- student@master:~/5$ k run --image=mariadb db-one --port=3306 --env="MYSQL_ROOT_PASSWORD=LFtr@in" -n dev-ns
- pod/db-one created
- student@master:~/5$ k create -f db-two.yaml
- deployment.apps/db-two created
- student@master:~/5$ k -n dev-ns get pod,rs,deploy
- NAME READY STATUS RESTARTS AGE
- pod/db-one 0/1 ContainerCreating 0 14s
- pod/db-two-cfb5c47db-llbq8 0/1 ContainerCreating 0 3s
- NAME DESIRED CURRENT READY AGE
- replicaset.apps/db-two-cfb5c47db 1 1 0 3s
- NAME READY UP-TO-DATE AVAILABLE AGE
- deployment.apps/db-two 0/1 1 0 3s
- student@master:~/5$
And already we can see that my idea does not work. If the no-priv
policy actually worked in the dev-ns
namespace, then the replica controller would not have been able to create the pod, but it did. And right now the situation is that all is running, despite my expectations:
- student@master:~/5$ k -n dev-ns get pod,rs,deploy
- NAME READY STATUS RESTARTS AGE
- pod/db-one 1/1 Running 0 2m30s
- pod/db-two-cfb5c47db-llbq8 1/1 Running 0 2m19s
- NAME DESIRED CURRENT READY AGE
- replicaset.apps/db-two-cfb5c47db 1 1 1 2m19s
- NAME READY UP-TO-DATE AVAILABLE AGE
- deployment.apps/db-two 1/1 1 1 2m19s
- student@master:~/5$
So my scheme does not work and I have no idea how to solve the challenge. Please, help. Thank you.
Categories
- All Categories
- 207 LFX Mentorship
- 145 LFX Mentorship: Linux Kernel
- 819 Linux Foundation IT Professional Programs
- 371 Cloud Engineer IT Professional Program
- 167 Advanced Cloud Engineer IT Professional Program
- 66 DevOps Engineer IT Professional Program
- 132 Cloud Native Developer IT Professional Program
- 143 Express Training Courses & Microlearning
- 143 Express Courses - Discussion Forum
- Microlearning - Discussion Forum
- 6.7K Training Courses
- 40 LFC110 Class Forum - Discontinued
- 66 LFC131 Class Forum
- 39 LFD102 Class Forum
- 238 LFD103 Class Forum
- 17 LFD110 Class Forum
- 46 LFD121 Class Forum
- 1 LFD123 Class Forum
- LFD125 Class Forum
- 17 LFD133 Class Forum
- 6 LFD134 Class Forum
- 18 LFD137 Class Forum
- 70 LFD201 Class Forum
- 3 LFD210 Class Forum
- 2 LFD210-CN Class Forum
- 2 LFD213 Class Forum - Discontinued
- 128 LFD232 Class Forum - Discontinued
- 1 LFD233 Class Forum
- 3 LFD237 Class Forum
- 24 LFD254 Class Forum
- 727 LFD259 Class Forum
- 110 LFD272 Class Forum
- 3 LFD272-JP クラス フォーラム
- 10 LFD273 Class Forum
- 263 LFS101 Class Forum
- LFS111 Class Forum
- 2 LFS112 Class Forum
- 1 LFS116 Class Forum
- 3 LFS118 Class Forum
- 1 LFS120 Class Forum
- 3 LFS142 Class Forum
- 3 LFS144 Class Forum
- 3 LFS145 Class Forum
- 1 LFS146 Class Forum
- 16 LFS148 Class Forum
- 15 LFS151 Class Forum
- 1 LFS157 Class Forum
- 72 LFS158 Class Forum
- LFS158-JP クラス フォーラム
- 12 LFS162 Class Forum
- 1 LFS166 Class Forum
- 7 LFS167 Class Forum
- 1 LFS170 Class Forum
- 1 LFS171 Class Forum
- 2 LFS178 Class Forum
- 2 LFS180 Class Forum
- 1 LFS182 Class Forum
- 4 LFS183 Class Forum
- 30 LFS200 Class Forum
- 737 LFS201 Class Forum - Discontinued
- 2 LFS201-JP クラス フォーラム
- 17 LFS203 Class Forum
- 118 LFS207 Class Forum
- 1 LFS207-DE-Klassenforum
- LFS207-JP クラス フォーラム
- 301 LFS211 Class Forum
- 55 LFS216 Class Forum
- 50 LFS241 Class Forum
- 43 LFS242 Class Forum
- 37 LFS243 Class Forum
- 13 LFS244 Class Forum
- 6 LFS245 Class Forum
- LFS246 Class Forum
- LFS248 Class Forum
- 45 LFS250 Class Forum
- 1 LFS250-JP クラス フォーラム
- LFS251 Class Forum
- 145 LFS253 Class Forum
- LFS254 Class Forum
- LFS255 Class Forum
- 6 LFS256 Class Forum
- 1 LFS257 Class Forum
- 1.3K LFS258 Class Forum
- 9 LFS258-JP クラス フォーラム
- 116 LFS260 Class Forum
- 156 LFS261 Class Forum
- 41 LFS262 Class Forum
- 82 LFS263 Class Forum - Discontinued
- 15 LFS264 Class Forum - Discontinued
- 11 LFS266 Class Forum - Discontinued
- 23 LFS267 Class Forum
- 18 LFS268 Class Forum
- 29 LFS269 Class Forum
- 8 LFS270 Class Forum
- 200 LFS272 Class Forum
- 1 LFS272-JP クラス フォーラム
- 2 LFS147 Class Forum
- 2 LFS274 Class Forum
- 4 LFS281 Class Forum
- 7 LFW111 Class Forum
- 257 LFW211 Class Forum
- 179 LFW212 Class Forum
- 12 SKF100 Class Forum
- SKF200 Class Forum
- 2 SKF201 Class Forum
- 797 Hardware
- 199 Drivers
- 68 I/O Devices
- 37 Monitors
- 98 Multimedia
- 174 Networking
- 91 Printers & Scanners
- 85 Storage
- 754 Linux Distributions
- 82 Debian
- 67 Fedora
- 16 Linux Mint
- 13 Mageia
- 23 openSUSE
- 147 Red Hat Enterprise
- 31 Slackware
- 13 SUSE Enterprise
- 351 Ubuntu
- 465 Linux System Administration
- 39 Cloud Computing
- 71 Command Line/Scripting
- Github systems admin projects
- 91 Linux Security
- 78 Network Management
- 101 System Management
- 47 Web Management
- 56 Mobile Computing
- 19 Android
- 28 Development
- 1.2K New to Linux
- 1K Getting Started with Linux
- 366 Off Topic
- 114 Introductions
- 171 Small Talk
- 26 Study Material
- 534 Programming and Development
- 293 Kernel Development
- 223 Software Development
- 1.8K Software
- 263 Applications
- 182 Command Line
- 3 Compiling/Installing
- 405 Games
- 311 Installation
- 79 All In Program
- 79 All In Forum
Upcoming Training
-
August 20, 2018
Kubernetes Administration (LFS458)
-
August 20, 2018
Linux System Administration (LFS301)
-
August 27, 2018
Open Source Virtualization (LFS462)
-
August 27, 2018
Linux Kernel Debugging and Security (LFD440)