Open dronenb opened 3 months ago
runAsGroup and fsGroup are configurable options in values.yaml. Suggest configure the params with proper values and retry. @dronenb
@trinaths that's what I'm saying, when running in OpenShift, they should not be set explicitly when running in OpenShift, since it will automatically inject these - https://www.redhat.com/en/blog/a-guide-to-openshift-and-uids
There is not a way to unset these in the helm chart, as such I submitted this issue. Setting it explicitly to a high UID will work as a workaround, but it is not the right solution:
securityContext:
runAsUser: 1000810000
fsGroup: 1000810000
runAsGroup: 1000810000
Considering this operator is officially supported on OpenShift, I believe this is an issue that needs to be rectified. I would appreciate it if you re-opened this issue.
Reopening this issue for further review.
Created [CONTCNTR-4845] for internal tracking.
Setup Details
CIS Operator f5-bigip-ctlr-operator.v1.17.0
Description
When deploying an F5 CIS controller into OpenShift using the
F5 Container Ingress Services
Operator (v1.17.0 from the OpenShift marketplace), the following error appears in the deployment:F5BigIpCtlr
object:Resulting deployment status:
This is due to OpenShift's default
restricted-v2
SCC.Expected Result
There is no reason this particular deployment needs to have a fixed UID or GID. It will run fine with OpenShift's default random UID and GID 0.
Actual Result
Helm template has fixed UID/GID, thus it forces the deployment to have fixed UID/GID and causes deployment to not progress: https://github.com/F5Networks/k8s-bigip-ctlr/blob/c200ed8da28b0fb45edbbfbd6209732262696fa6/helm-charts/f5-bigip-ctlr/templates/f5-bigip-ctlr-deploy.yaml#L47-L64
Observations (if any)
The Helm template should be updated to not hardcode the UID so that OpenShift users can run the deployment using the default
restricted-v2
SCC.