Nowadays, Kubernetes is the leading platform for managing containerized application workloads. These are built of numerous pods, groups of one or more containers that are always co-located and co-scheduled on the same node. Given a pod, the scheduler performs a critical task, i.e., it finds the best possible node for its execution. This process is affected by several factors, including resource availability, hardware requirements, data processing restrictions (e.g., GDPR and CCPA), workload sensitivity, and the presence of other workloads. Developers can control the scheduling process through several methods, such as node selectors, affinity, anti-affinity, and topology spread constraints. However, this activity is cumbersome, error prone, and can easily lead to security incidents. In this paper we propose an approach to constrain and validate pod scheduling decisions without relying on complex, handwritten node selection policies. The idea is to combine the node filtering capabilities of Kubernetes with the use of OPA Gatekeeper for automated policy enforcement. We discuss how this approach overcomes the limitation associated with existing solutions, and then describe how it is used to support corporate governance policies in common scenarios. Preliminary experiments confirm the applicability of our proposal.

(2025). POSTER: Policy-driven security-aware scheduling in Kubernetes . Retrieved from https://hdl.handle.net/10446/317166

POSTER: Policy-driven security-aware scheduling in Kubernetes

Rossi, Matthew;Beretta, Michele;Facchinetti, Dario;Paraboschi, Stefano
2025-01-01

Abstract

Nowadays, Kubernetes is the leading platform for managing containerized application workloads. These are built of numerous pods, groups of one or more containers that are always co-located and co-scheduled on the same node. Given a pod, the scheduler performs a critical task, i.e., it finds the best possible node for its execution. This process is affected by several factors, including resource availability, hardware requirements, data processing restrictions (e.g., GDPR and CCPA), workload sensitivity, and the presence of other workloads. Developers can control the scheduling process through several methods, such as node selectors, affinity, anti-affinity, and topology spread constraints. However, this activity is cumbersome, error prone, and can easily lead to security incidents. In this paper we propose an approach to constrain and validate pod scheduling decisions without relying on complex, handwritten node selection policies. The idea is to combine the node filtering capabilities of Kubernetes with the use of OPA Gatekeeper for automated policy enforcement. We discuss how this approach overcomes the limitation associated with existing solutions, and then describe how it is used to support corporate governance policies in common scenarios. Preliminary experiments confirm the applicability of our proposal.
2025
Rossi, Matthew; Beretta, Michele; Facchinetti, Dario; Paraboschi, Stefano Giulio
File allegato/i alla scheda:
File Dimensione del file Formato  
poster-secure-scheduling.pdf

accesso aperto

Versione: publisher's version - versione editoriale
Licenza: Licenza Free to read
Dimensione del file 1.46 MB
Formato Adobe PDF
1.46 MB Adobe PDF Visualizza/Apri
Pubblicazioni consigliate

Aisberg ©2008 Servizi bibliotecari, Università degli studi di Bergamo | Terms of use/Condizioni di utilizzo

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/10446/317166
Citazioni
  • Scopus 1
  • ???jsp.display-item.citation.isi??? 0
social impact