ManageIQ / manageiq-pods

ManageIQ on Kubernetes and OpenShift
Apache License 2.0
51 stars 100 forks source link

Investigate runAsUser deployment errors on non-OpenShift clusters #1134

Open bdunne opened 1 month ago

bdunne commented 1 month ago

Discussed in https://github.com/orgs/ManageIQ/discussions/22449

Originally posted by **stevenrenaud** April 7, 2023 Hello, Good job with ManageIQ. I struggle a little while deploying in Azure AKS with operator. Is there any way to add the SecurityOption : runAsUser: XXXX through the Operator ? I can't achieve to deploy without. If i remove operator and i apply the config in every deployment everything is OK. someting like this : ` securityContext: capabilities: drop: - ALL privileged: false runAsUser: 65532 runAsNonRoot: true allowPrivilegeEscalation: false `
CCoupel commented 1 month ago

Hi all, Thanks for the great job on this great solution. I am facing an equivalent issue on my k8s cluster (rancher) While deploying NAJDORF or OPARIN, all pods runs well: security context is set to {} in the deployment. But, with PETROSIAN and other recent ones, httpd and orchestrator failed with "container has runAsNonRoot and image will run as root". I can see that in the deployment, the securityContxt set the runAsNonRoot to true.

This deployment is set during the reconciling from the operator, so, how can we solve this? Does any one succeed in deploying it?