You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Our current guidance, instructions, config files, etc for running CRDB in a containerized environment has cockroachdb running as root inside the container. This is a security vulnerability and needs to be addressed as soon as possible.
I checked our default configs and instructions for Helm, StatefulSets (static config), and Docker all run the crdb container as the root user. There’s also no mention of changing this in our Production Checklist. This was discovered during the work packaging the new K8s operator for OpenShift because it detects that we're trying to exec inside the container as root.