dongjoon-hyun commented on code in PR #39675:
URL: https://github.com/apache/spark/pull/39675#discussion_r1082532817


##########
docs/running-on-kubernetes.md:
##########
@@ -34,13 +34,13 @@ Please see [Spark Security](security.html) and the specific 
security sections in
 
 Images built from the project provided Dockerfiles contain a default 
[`USER`](https://docs.docker.com/engine/reference/builder/#user) directive with 
a default UID of `185`.  This means that the resulting images will be running 
the Spark processes as this UID inside the container. Security conscious 
deployments should consider providing custom images with `USER` directives 
specifying their desired unprivileged UID and GID.  The resulting UID should 
include the root group in its supplementary groups in order to be able to run 
the Spark executables.  Users building their own images with the provided 
`docker-image-tool.sh` script can use the `-u <uid>` option to specify the 
desired UID.
 
-Alternatively the [Pod Template](#pod-template) feature can be used to add a 
[Security 
Context](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#volumes-and-file-systems)
 with a `runAsUser` to the pods that Spark submits.  This can be used to 
override the `USER` directives in the images themselves.  Please bear in mind 
that this requires cooperation from your users and as such may not be a 
suitable solution for shared environments.  Cluster administrators should use 
[Pod Security 
Policies](https://kubernetes.io/docs/concepts/policy/pod-security-policy/#users-and-groups)
 if they wish to limit the users that pods may run as.
+Alternatively the [Pod Template](#pod-template) feature can be used to add a 
[Security 
Context](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#volumes-and-file-systems)
 with a `runAsUser` to the pods that Spark submits.  This can be used to 
override the `USER` directives in the images themselves.  Please bear in mind 
that this requires cooperation from your users and as such may not be a 
suitable solution for shared environments.  Cluster administrators should use 
[Pod Security 
Admission](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod)
 if they wish to limit the users that pods may run as.

Review Comment:
   I'm not sure about this part because K8s 1.25 is not available in EKS 
environment yet.



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: reviews-unsubscr...@spark.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


---------------------------------------------------------------------
To unsubscribe, e-mail: reviews-unsubscr...@spark.apache.org
For additional commands, e-mail: reviews-h...@spark.apache.org

Reply via email to