logoalt Hacker News

weitzjtoday at 7:07 AM2 repliesview on HN

I don’t understand how they are separating security in the virtual mode as they only mention pods. It seems every workload still shares the underlying node, even when in virtual mode. Take for example the OCI cache on the nodes. What about cache poisoning?


Replies

enrichmantoday at 8:37 AM

In virtual mode, the only pods running directly on the host are the K3s servers and agents. All "virtual cluster pods" run within these components, meaning they do not appear as individual pods on the host cluster.

The only trade-off is that K3s currently requires privileged mode to operate. We are actively exploring ways to address this limitation and improve security, such as implementing user namespaces or microVMs.

show 1 reply
ithkuiltoday at 8:03 AM

Aren't OCI caches content addressed?

show 1 reply