Skip to content

The documentation should warn that the Linkerd proxy uid should not be set to the same uid as the workload #14796

@chri4774

Description

@chri4774

What problem are you trying to solve?

Linkerd allows users to specify a custom uid for the Linkerd proxy container. However, it is important to ensure that this uid is different from the uid used by the workload container.
In our case, we have strict OPA Gatekeeper rules for allowed uids in our application pods in our K8S cluster. Because of this, when we implemented Linkerd, it was natural to set the Linkerd proxy and Linkerd init container uids to the same value as the workload container uid.
The result was that outgoing traffic from these pods was not encrypted at all, and this went unnoticed until we stumbled upon it while debugging another issue.
The only place in the Linkerd documentation where I could understand what was going on was the IPtables reference (see https://linkerd.io/2.19/reference/iptables/#outbound-connections).

How should the problem be solved?

Suggestions:

Any alternatives you've considered?

How would users interact with this feature?

No response

Would you like to work on this feature?

None

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions