Skip to main content
NetApp Knowledge Base

Does the root_user access images in Trident ver 25.10.x?

Views:
12
Visibility:
Public
Votes:
0
Category:
astra_trident
Specialty:
SNAPX
Last Updated:

Applies to

Trident version 25.10.x

Answer

Yes

Common best practices andrealities regarding privileged containers in Kubernetes environments-

 

1. Why Trident images run asroot

• Privilege Requirement:Trident, as a Container Storage Interface (CSI) driver, performs privilegedstorage operations (like mounting volumes, managing devices, interacting withthe host kernel, etc.).

• Root Permissions: Suchactions require root permissions inside the container to interact with thehost’s storage stack at a low level. Running as root is thus by design and isrequired for functionality.

2. Aquasec/Other Scanners andCompliance

• Scanner Behavior: Containersecurity scanners (like Aquasec, Trivy, etc.) flag containers running as rootas a compliance concern because, in general, running as root increases theattack surface if an attacker can gain a shell or inject code.

• Compliance vs.Practicality: For many system-level containers (network/storage drivers), thesescanners will raise warnings even though there is a functional need.

3. Security Impact of TridentRunning as Root

• Environment: Tridentoperates in Kubernetes environments with carefully controlled permissions,where pod access is typically tightly managed.

• No Shell Access: The imagesare purpose-built and do not provide an interactive shell or login. This meansthat even though the process runs as root, the risk of exploitation iscontained, provided the image is secure and free of exploit primitives (e.g.,no shell, no unneeded binaries).

• Minimal Attack Surface: Aslong as Trident only exposes the required endpoints (typically internal gRPCinterfaces, not user-facing APIs), and unnecessary utilities are stripped, thepractical risk is low.

4. Industry Standard

• CSI Drivers Standard: Thispattern (privileged operation, running as root) is common among CSI drivers andother system-level operators.

Rootless Mode: Not Supportedfor Trident

• CSI drivers like Tridentdepend on kernel-level operations, host mounts, and device management—whichrequire root privileges.

• Trident documentation andupstream CSI design generally do not support running as non-root.

• Attempting to run Trident(or similar drivers) as a non-root user will result in failure to performrequired actions (e.g., mount volumes).

Additional Information

additionalInformation_text
NetApp provides no representations or warranties regarding the accuracy or reliability or serviceability of any information or recommendations provided in this publication or with respect to any results that may be obtained by the use of the information or observance of any recommendations provided herein. The information in this document is distributed AS IS and the use of this information or the implementation of any recommendations or techniques herein is a customer's responsibility and depends on the customer's ability to evaluate and integrate them into the customer's operational environment. This document and the information contained herein may be used solely in connection with the NetApp products discussed in this document.