Closed Va-Pros closed 7 months ago
Please see https://kubernetes.io/blog/2023/09/13/userns-alpha/ and references there in 'Node system requirements' section.
Please see https://kubernetes.io/blog/2023/09/13/userns-alpha/ and references there in 'Node system requirements' section.
Thanks for the answer, apparently, user namespace remapping will not be able to be used in the current environment. But is user namespace remapping necessary to run dbus-broker.service?
Technically it might not be and we saw FreeIPA container test running on OpenShift without namespaces in the past. But running a fairly big stack as true root on the host might not be what you want in any serious production setup anyway. I assume that similar to the example in https://github.com/freeipa/freeipa-container/issues/601 you attempt to run it with privileged: true
. And the disabled SELinux also is not something you'd want.
That error might be something small or silly, or it might mean that the dbus broker tries to connect somewhere on the host it has no business connecting. You might even be able to get it working by disabling seccomp but it is a setup you likely do not want to rely on.
Lately we've been testing (in GitHub Actions in this repo) with K3s with docker (via cri-dockerd) which allowed us to set { "userns-remap": "default" }
, which incidently avoids the dbus issue. Having a separate node in your Kubernetes cluster where you'd use the docker runtime and then assigning the FreeIPA pod to that node might be your best bet at the moment.
Technically it might not be and we saw FreeIPA container test running on OpenShift without namespaces in the past. But running a fairly big stack as true root on the host might not be what you want in any serious production setup anyway. I assume that similar to the example in #601 you attempt to run it with
privileged: true
. And the disabled SELinux also is not something you'd want.That error might be something small or silly, or it might mean that the dbus broker tries to connect somewhere on the host it has no business connecting. You might even be able to get it working by disabling seccomp but it is a setup you likely do not want to rely on.
Lately we've been testing (in GitHub Actions in this repo) with K3s with docker (via cri-dockerd) which allowed us to set
{ "userns-remap": "default" }
, which incidently avoids the dbus issue. Having a separate node in your Kubernetes cluster where you'd use the docker runtime and then assigning the FreeIPA pod to that node might be your best bet at the moment.
Thanks for your reply! I am not using privileged true
, instead I am using cgroup mounting. But this is not enough, apparently, as you wrote, "userns-remap": "default" }
is needed.
Out of curiosity, what is the the OS and version on that worker node?
Out of curiosity, what is the the OS and version on that worker node?
AstraLinuxSE 8.3.0-6
Good afternoon! \ Faced the same problem as #601 . Launching a container in docker with cgroup v2 and user namespace remapping works great locally. However, the following problem occurs in kubernetes:
Accordingly, I found in the logs that dbus-broker.service could not start:
Part of the yaml container:
We use:
Since there is no docker on the nodes, we cannot install user namespace remapping in the docker daemon. Do you have any ideas about launching dbus-broker.service in this environment?
Thanks!