OpenShift’s Security Context Constraints (SCC) gate every capability the Publisher needs. The chart’s ServiceAccount must be granted the privileged SCC.
# Grant privileged SCC to the ServiceAccount the chart created oc adm policy add-scc-to-user privileged \ -z $(kubectl get sa -n npa-publisher \ -l app.kubernetes.io/name=kubernetes-netskope-publisher \ -o jsonpath='{.items[0].metadata.name}') \ -n npa-publisher
# Force pods to be recreated under the new SCC kubectl rollout restart -n npa-publisher \ daemonset/kubernetes-netskope-publisher || \ kubectl rollout restart -n npa-publisher \ statefulset/kubernetes-netskope-publisher
Recommended values
1 2 3 4 5 6 7 8 9 10 11
workload: type:statefulset replicas:2
networking: mode:pod disableIPv6:true
tunDevice: enabled:true
Quirks
SELinux: the Publisher writes to /etc/npa. The default restricted-v2 SCC blocks this; privileged is required.
OpenShift on ROSA/ARO: same SCC binding works.
OVN-Kubernetes vs OpenShift SDN: both work in mode: pod.