Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Disabling SELinux is ill-advised #2

Open
dawud opened this issue Apr 7, 2021 · 2 comments
Open

Disabling SELinux is ill-advised #2

dawud opened this issue Apr 7, 2021 · 2 comments

Comments

@dawud
Copy link

dawud commented Apr 7, 2021

In the documentation it is stated that:

The SAP workload requires some specific settings on all worker nodes:
Disabling SELinux

SELinux is a major protection mechanism and ensures isolation between processes, which is critical in containerised platforms.

Instead of disabling SELinux, an appropriate solution should be found to allow the process in the container to operate correctly.

@wrabcak
Copy link

wrabcak commented Apr 8, 2021

Hi All,
I agree with the issue definition.

Because SAP software will be in containers, SELinux sees container as atomic unit and there should not be any reason to disable SELinux to avoid SAP permission denies.

Is there any list of collected SELinux issues ? I would like to help here to address them to make the project working with SELinux.

Thanks,
Lukas.

@miminar
Copy link

miminar commented Apr 16, 2021

Just my 2 cents: SAP Data Intelligence (SDI) comprises of dozens of containerized components, one of them is a small HANA instance running in a pod. The SDI has been validated on OpenShift 4 with all the nodes in enforcing mode since the beginning.
Some of the pods (including the HANA pod) run unconfined (spc_t). Confining them is a topic for future discussions.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants