I've created an issue, since noone answered my question so far.
Here is the Link: https://github.com/kubernetes/kubernetes/issues/51529

For fellows that face the same issue, the solution seems be:
- run the controller-manager against the secure API endpoint.
- create dedicated tokens/users/serviceaccounts for your controllers and 
bind them to your restricted PSP Role.

Am Freitag, 11. August 2017 15:27:32 UTC+2 schrieb Gogene:

> When I create a DaemonSet or a Deployment as a unprivileged User or an 
> unprivileged ServiceAccount (RBAC & PodSecurityPolicy) the 
> PodSecurityPolicys are being ignored, so it is possible to bypass the PSP 
> to create privileged Pods from DaemonSet and Deployments.
> If the user tries to deploy a privileged Pod directly it's getting denied 
> by a forbidden message.
>
> The PodSecurityPolicys are kinda useless, when I have to grant our users 
> access to create ressources like DaemonSets/Deployments/ReplicaSets etc...
> Is it possible to block this behavior with additional RBAC roles? Or is it 
> a bug and should I create an issue?
>
> Thanks in advance!
>

-- 
You received this message because you are subscribed to the Google Groups 
"Kubernetes user discussion and Q&A" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to kubernetes-users+unsubscr...@googlegroups.com.
To post to this group, send email to kubernetes-users@googlegroups.com.
Visit this group at https://groups.google.com/group/kubernetes-users.
For more options, visit https://groups.google.com/d/optout.

Reply via email to