aws / containers-roadmap

This is the public roadmap for AWS container services (ECS, ECR, Fargate, and EKS).
https://aws.amazon.com/about-aws/whats-new/containers/
Other
5.2k stars 316 forks source link

[Fargate] [request]: Allow privileged mode #1000

Open biltongza opened 4 years ago

biltongza commented 4 years ago

Community Note

Tell us about your request I want to be able to mount filesystems within my containers, and for that I need to be able to use privileged mode or add capabilities to the docker container.

Which service(s) is this request for? Fargate

Tell us about the problem you're trying to solve. What are you trying to do, and why is it hard? Specifically, I am trying to mount an overlay in a container. This requires the container be run in privileged mode.

Are you currently working around this issue? No, there does not appear to be a workaround.

ecliptik commented 3 years ago

We are interested in this since we are using Gitlab Kubernetes Runners for our CI/CD pipelines and using Docker-in-Docker to build application containers and push them to ECR.

Currently we have larger ec2 nodes that are tainted to only run Gitlab runner pods to avoid resource contention with other applications/service on the EKS clusters. These nodes are only used when CI/CD jobs are in us, and are idle for periods of time. Autoscaling them is also a challenge when many jobs are running at once since cold-starts of EC2 instances can take 2-3 minutes to join the cluster.

By using Fargate Profiles, we would like to setup the gitlab namespace so that any job pods created there will run on their own Fargate node instead of a static ec2 node. This would allow us greater resource flexibility, cost optimization, and separation of jobs to avoid resource contention.

We can do some of our jobs in Fargate like this, but a large majority of our jobs are using docker and docker-compose to build images and run CI/CD tests and would require privileged mode and volume sharing of the Docker socket.

tata9001 commented 3 years ago

All the steps are dockerized in my company, so there is no way to use fargate as the CI/CD agent. We are really looking forward to have this ability to run docker in docker on the Fargate platform.

Waples commented 3 years ago

Bump so this not being forgotten. I need to get priv mode working on our current AWS EKS Fargate CI/CD GitLab PoC.

sandan commented 3 years ago

+1 For EKS Fargate. We'd like more capabilities to be supported (specifically SYS_PTRACE, DAC_READ_SEARCH) to a container's securityContext. So far it looks like these work:

        securityContext:
          capabilities:
            drop:
              - all
            add:
              - SETPCAP
              - SETUID
              - SETGID

There's an open request for SYS_PTRACE: https://github.com/aws/containers-roadmap/issues/1102.

jonrau1 commented 3 years ago

+1 - Open Distro requires Privileged containers to run on EKS.

FANMixco commented 3 years ago

s3fs requires privileged also to sync folders:

https://github.com/s3fs-fuse/s3fs-fuse/issues/1246

binarynate commented 3 years ago

+1 for supporting privileged or dockerSecurityOptions. I want to run Chromium in Fargate, but privileged or dockerSecurityOptions is required to enable Chromium's app sandbox.

amunhoz commented 3 years ago

+1

bradynotarize commented 2 years ago

Required for any container using s3fs-fuse.

andymac4182 commented 2 years ago

Looking at running OpenVSCode in Fargate but need this to be able to run containers inside so docker-in-docker. https://github.com/gitpod-io/openvscode-server

mayurvin commented 2 years ago

I need the privileged mode on fargate with ECS so that I can install and run a docker daemon. At this time, docker daemon cannot be started unless the task is being run with the --privileged mode. Please add this capability as soon as possible.

nielsvanoosterom-varias commented 2 years ago

+1 for this.

jarredkenny commented 2 years ago

I would like to be able to use docker-forticlient as a base image for a Fargate task so that my task can reach private resources behind a VPN without a 24/7 IPSec tunnel on a VPC.

https://github.com/HybirdCorp/docker-forticlient

askkhan84 commented 2 years ago

Need this for DinD to run Github self hosted runners on Fargate

tekknolagi commented 2 years ago

+1 to use nsjail inside Fargate

ecliptik commented 2 years ago

Any updates on this? I've tried using buildah, podman, rootless, and nerdctl on fargate but none of them work.

Alternative is to bring up a separate docker build host and expose it over TCP, but that has major operational and security concerns.

mreferre commented 2 years ago

Any updates on this? I've tried using buildah, podman, rootless, and nerdctl on fargate but none of them work.

Alternative is to bring up a separate docker build host and expose it over TCP, but that has major operational and security concerns.

Can this help? Would Kaniko be a viable alternative for you? https://aws.amazon.com/blogs/containers/building-container-images-on-amazon-ecs-on-aws-fargate/

pditommaso commented 2 years ago

I think the main use case for this request is not to build containers with Fargate, but to be able to mount a file system via FUSE in fargate task. From the first comment:

I want to be able to mount filesystems within my containers, and for that I need to be able to use privileged mode or add capabilities to the docker container.

mreferre commented 2 years ago

Fair enough. I am not sure I'd characterize that as the "main use case" but definitely it was the initial theme of this issue and we should respect that (even though people added additional reasons for needing privileged access, including builds, so it diluted a bit the initial intent).

ecliptik commented 2 years ago

Would Kaniko be a viable alternative for you?

Kaniko is a no-go for us as it adds additional complexity into our Gitlab CI/CD pipelines.

I think the main use case for this request is not to build containers with Fargate, but to be able to mount a file system via FUSE in fargate task. From the first comment:

Our main request is to build container images using Fargate. We've raised this with AWS Enterprise Support as well, specifically for running Gitlab Runners in Fargate and building and pushing container images to ECR.

anjalichaudhary commented 2 years ago

Looking at running OpenVSCode in Fargate but need this to be able to run containers inside so docker-in-docker. https://github.com/gitpod-io/openvscode-server

@andymac4182 Were you able to find a solution for this? If yes, could you please share your approach.

dasanjaneyuludarla commented 2 years ago

+1

andymac4182 commented 2 years ago

@anjalichaudhary Ended up just using Gitpod online. Would of preferred Fargate but it doesn't work :(

nicodp-leap commented 2 years ago

+1 for supporting privileged or dockerSecurityOptions. I want to run Chromium in Fargate, but privileged or dockerSecurityOptions is required to enable Chromium's app sandbox.

Did you find any solution? I'm having the same problem.

binarynate commented 2 years ago

@nicodp-leap I haven't found a solution, so I'm running Chromium on EC2 instead of Fargate. I would still love to be able to switch it over to Fargate, though.

gugaiz commented 2 years ago

@binarynate @nicodp-leap one option is to use AWS Batch with EC2 instances in the background. You must set min vCPU to 0 when configuring "compute environments". That will lunch an EC2 instance, run the job in privileged mode and finish the instance after that. You can even use EC2 spot instances for that.

kerashanog commented 1 year ago

+1 for option runtime like Nestybox/sysbox on Fargate

jimmybergman commented 1 year ago

+1 for this, would like to be able to use nsjail from Fargate containers

acidjazz commented 1 year ago

+1 for this, need to use s3fuse

FearlessHyena commented 1 year ago

It's been almost 3 years since this was opened. Is it at least being considered?

ashish0fficial commented 1 year ago

Hi +1 for this -- many images wants to be run in privileged mode true or either tell us better solution for this

davies commented 1 year ago

+1 for this to use juicefs in containers, which turns S3 into a shared disk but requires FUSE.

luthfimasruri commented 1 year ago

Any solution for this?

S0LERA commented 1 year ago

+1 We need to use Rancher, that requires --privileged

hilary-b commented 1 year ago

+1 for building docker images

junekhan commented 1 year ago

+1 also for building docker images. We applied Kaniko as a makeshift, but now we need to build multi-arch docker images which Kaniko can't do.

ClaytonOlleyNutrien commented 1 year ago

Doesn't privileged mode basically mean root access to the host machine? On a cloud resource you don't "own" or manage directly? Maybe I'm missing something but I can't see how we'll ever get root level access to a Fargate machine.

omeid commented 1 year ago

@ClaytonOlleyNutrien The host machine in question for Fargate containers is a virtual machine, not the underlying physical hardware that runs the VM.

esamattis commented 1 year ago

Those who are interested in running jails or sandbox processes (ping @tekknolagi, @jimmybergman) you might not actually need privileged containers but just an ability to create user namespaces which normally do not require any extra permissions. Unprivileged user namespaces are the canonical way to create rootless sandboxes in Linux. See this issue for details: https://github.com/aws/containers-roadmap/issues/2102

Unprivileged user namespaces could also allow to run rootless Docker or Podman in Fargate.

one-summers-day commented 12 months ago

+1 For rust.. when rust invokes an error it uses usys/unix/time.rs and that requires privileged mode (sudo) to run correctly T_T

DoobleD commented 6 months ago

We're interested in this capability as well. In our case, we use iptables and ipset from our container to dynamically block offending IP addresses, and without the privileged mode, we get these errors:

Kernel error received: Operation not permitted

Unless there is a (simple) solution to this, this is a deal breaker for us. We can't move to Fargate.

We also use sysctl to tune some kernel parameters from the container (net.core.somaxconn, net.ipv4.ip_local_port_range, fs.inotify.max_user_instances). Even though there is now solutions to set some of these in configuration, the privileged mode would make it much simpler by allowing the use of sysctl from the container.

BTW I'm sure there are very good reasons why this is not (yet) possible, and we have no idea if it would even be possible to allow this mode. Thanks to the AWS team for all the awesome services they provide. :)

hyavari commented 6 months ago

+1 for accessing XFRM in kernel and creating IPSec SAs.

fernandomullerjr commented 5 months ago

+1 We need to use Rancher, that requires --privileged