Skip to content

rbac disabled by default which is security vunerability #5400

@manju-rn

Description

@manju-rn

The default installation of microk8s does not enable rbac which is a security vulnerability as it would allow any pod with cluster wide access to do anything and everything. A simple rogue pod could wreak havoc. In today's world where MCP is installed in cluster making it even more exposed to agents accessing them.

There are not even "caution" or "warnings" indicating the potential vulnerability in the installation page. Hope rbac is enabled by default just like many other k8s distros do.

To anybody who is reading this - please enable by doing microk8s enable rbac - your exisitng workloads may fail who were enjoying this unrestricted access - but they were already rogue :-)
The workloads with proper RBAC would anyway continue to work

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions