Dogfooding: Enable sudo access for Workspaces setup for internal team members

MR: Pending

Description

As part of Sudo access in a workspace (&13983 - closed) , we have released a new feature to enable secure sudo access in Workspace. This requires setup by the user on their Kubernetes cluster.

We want to enable this for our internal team members through the setup managed by groupdeveloper tooling.

Details about the steps can be seen here.

Acceptance Criteria

  • Sudo access is available to users of internal setup of Workspaces on .com

Technical Requirements

As per the discussion bwlow, we will use sysbox for this, at the very least until we can use native kubernetes user namespacing on GKE.

As documented sysbox is the first choice. Its installation method seems to be more generic (daemonset on kubernetes cluster). Kata containers has cluster provider specific instructions.

Additionally, Contributor Success team uses Sysbox in their Workspaces setup without issues 🎉

Impact Assessment

Having the ability to sudo in workspaces would allow inspecting system logs and ease debugging improving the troubleshooting experience on remote development environments

Edited by Manuel Schönlaub