-
Notifications
You must be signed in to change notification settings - Fork 1.9k
Open
Labels
kind/featurestatus/triagedWhether the issue has been explicitly triagedWhether the issue has been explicitly triaged
Description
Feature Area
What feature would you like to see?
Allow users to configure Kubernetes securityContext (for example privileged: true, allowPrivilegeEscalation...) for user runtime pods created by @dsl.container_component using .set_security_context function.
What is the use case or pain point?
Some valid workloads require privileged containers, such as:
- BuildKit (buildctl-daemonless.sh) for building container images
- Dockerless image builds
- Low-level system tooling
- Kernel-adjacent workloads
Currently, these workloads cannot run inside Kubeflow Pipelines, even though:
- Kubernetes supports privileged pods
- Argo Workflows supports privileged pods
- The same containers work correctly when run as standalone Kubernetes pods
This limitation blocks legitimate production use cases and forces users to bypass Kubeflow Pipelines.
Is there a workaround currently?
No clean workaround exists today.
Love this idea? Give it a 👍.
Metadata
Metadata
Assignees
Labels
kind/featurestatus/triagedWhether the issue has been explicitly triagedWhether the issue has been explicitly triaged
Type
Projects
Status
No status