-
Notifications
You must be signed in to change notification settings - Fork 335
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
custom SecurityContextConstraint to run sig-storage/local-volume-provisioner in a DaemonSet? #447
Comments
I am using the following scc which looks to be working for now but the volume gets a "permission denied":
|
@jonasbartho What i noticed in scc.yaml your current SCC lacks certain capabilities that might be required. Specifically, the SYS_ADMIN capability is often needed for operations involving hostPath volumes.
and check whether it run fine or not. |
Here One more thing what i want to ask is Had you given the appropriate permission to the directory |
If you forget and hadnt given appropriate permission to the directory |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
Hi,
Is there any documentation on which custom SecurityContextConstraint that can be used to run
registry.k8s.io/sig-storage/local-volume-provisioner
in a daemonset without having "privileged=true" enabled? This is not allowed anymore in OKD/Openshift.Proper documentation around this would be very useful. (using an operator is not possible here btw)
The text was updated successfully, but these errors were encountered: