Open FoxUSA opened 5 months ago
I set the container CMD to top
and messing about in /etc/services.d
in the base gui image, I can get services to start it I set uid
and gid
files then running /init
(In screen
otherwise it will crash the container). I have USER_ID
and GROUP_ID
set. It seems like the USER_ID
user needs more power in the container or it shouldn't be used for services other than the CrashPlan service.
Following an update no longer starts
What is the last version of the image that worked?
Note that nothing changed recently in the baseimage... To better understand the issue:
docker inspect <container name>
.CONTAINER_DEBUG=1
environment variable (to have more details about xvnc).docker run --rm jlesage/crashplan-pro
to see if you have the same failure ?Truenas Scales uses containerd.
The old config stopped working around 2023-12-27.
It working with the uid and gid set to 1000 so I don't really want to mess with it. If I hit any issues I will try and report back
k3s crictl inspect $ID
{
"status": {
"id": "ac8de69648b7541499d2c42cf99bda6f1efc826dff34047acad9bf6113611883",
"metadata": {
"attempt": 0,
"name": "ix-chart"
},
"state": "CONTAINER_RUNNING",
"createdAt": "2024-01-26T11:05:33.648787077-07:00",
"startedAt": "2024-01-26T11:05:33.8040805-07:00",
"finishedAt": "0001-01-01T00:00:00Z",
"exitCode": 0,
"image": {
"annotations": {},
"image": "docker.io/jlesage/crashplan-pro:latest"
},
"imageRef": "docker.io/jlesage/crashplan-pro@sha256:c6aa8606e26dcfb98937121bfd8e10adff52594dad22673875906976ae9d69fe",
"reason": "",
"message": "",
"labels": {
"io.kubernetes.container.name": "ix-chart",
"io.kubernetes.pod.name": "crashplan-ix-chart-7d8d66d654-wfctx",
"io.kubernetes.pod.namespace": "ix-crashplan",
"io.kubernetes.pod.uid": "ebf4d1fd-6c95-473a-ac73-d2708532e8c9"
},
"annotations": {
"io.kubernetes.container.hash": "d26c5087",
"io.kubernetes.container.ports": "[{\"containerPort\":5800,\"protocol\":\"TCP\"}]",
"io.kubernetes.container.restartCount": "0",
"io.kubernetes.container.terminationMessagePath": "/dev/termination-log",
"io.kubernetes.container.terminationMessagePolicy": "File",
"io.kubernetes.pod.terminationGracePeriod": "30"
},
"mounts": [
{
"containerPath": "/media/data",
"gidMappings": [],
"hostPath": "/mnt/ssd.pool/encrypted",
"propagation": "PROPAGATION_PRIVATE",
"readonly": true,
"selinuxRelabel": false,
"uidMappings": []
},
{
"containerPath": "/config",
"gidMappings": [],
"hostPath": "/mnt/ssd.pool/encrypted/applications/crashplan",
"propagation": "PROPAGATION_PRIVATE",
"readonly": false,
"selinuxRelabel": false,
"uidMappings": []
},
{
"containerPath": "/media/data/foo",
"gidMappings": [],
"hostPath": "/mnt/archive.pool/encrypted/foo",
"propagation": "PROPAGATION_PRIVATE",
"readonly": true,
"selinuxRelabel": false,
"uidMappings": []
},
{
"containerPath": "/media/data/family.archive",
"gidMappings": [],
"hostPath": "/mnt/photo.pool/encrypted/family.archive",
"propagation": "PROPAGATION_PRIVATE",
"readonly": true,
"selinuxRelabel": false,
"uidMappings": []
},
{
"containerPath": "/var/run/secrets/kubernetes.io/serviceaccount",
"gidMappings": [],
"hostPath": "/var/lib/kubelet/pods/ebf4d1fd-6c95-473a-ac73-d2708532e8c9/volumes/kubernetes.io~projected/kube-api-access-nlqc8",
"propagation": "PROPAGATION_PRIVATE",
"readonly": true,
"selinuxRelabel": false,
"uidMappings": []
},
{
"containerPath": "/etc/hosts",
"gidMappings": [],
"hostPath": "/var/lib/kubelet/pods/ebf4d1fd-6c95-473a-ac73-d2708532e8c9/etc-hosts",
"propagation": "PROPAGATION_PRIVATE",
"readonly": false,
"selinuxRelabel": false,
"uidMappings": []
},
{
"containerPath": "/dev/termination-log",
"gidMappings": [],
"hostPath": "/var/lib/kubelet/pods/ebf4d1fd-6c95-473a-ac73-d2708532e8c9/containers/ix-chart/2456dfb7",
"propagation": "PROPAGATION_PRIVATE",
"readonly": false,
"selinuxRelabel": false,
"uidMappings": []
}
],
"logPath": "/var/log/pods/ix-crashplan_crashplan-ix-chart-7d8d66d654-wfctx_ebf4d1fd-6c95-473a-ac73-d2708532e8c9/ix-chart/0.log",
"resources": {
"linux": {
"cpuPeriod": "100000",
"cpuQuota": "0",
"cpuShares": "2",
"cpusetCpus": "",
"cpusetMems": "",
"hugepageLimits": [],
"memoryLimitInBytes": "0",
"memorySwapLimitInBytes": "0",
"oomScoreAdj": "1000",
"unified": {}
},
"windows": null
}
},
"info": {
"sandboxID": "590e9e6f2963d657553adec7f10838e0313ac0c031b0b01bfd87efd568e7ce1f",
"pid": 16216,
"removing": false,
"snapshotKey": "ac8de69648b7541499d2c42cf99bda6f1efc826dff34047acad9bf6113611883",
"snapshotter": "overlayfs",
"runtimeType": "io.containerd.runc.v2",
"runtimeOptions": {
"systemd_cgroup": true
},
"config": {
"metadata": {
"name": "ix-chart"
},
"image": {
"image": "sha256:0cb185e1bdc0cb3f753bfbea64dbaa5c7f3ede1ae7c497eb03ca9f1cbe5f571e"
},
"envs": [
{
"key": "ZGROUP_ID",
"value": "1006"
},
{
"key": "CRASHPLAN_SERVER_ADDRESS",
"value": "SMB"
},
{
"key": "DARK_MODE",
"value": "1"
},
{
"key": "CRASHPLAN_SRV_MAX_MEM",
"value": "4G"
},
{
"key": "ZUSER_ID",
"value": "1006"
},
{
"key": "CRASHPLAN_IX_CHART_PORT",
"value": "tcp://172.17.238.76:5800"
},
{
"key": "KUBERNETES_SERVICE_HOST",
"value": "172.17.0.1"
},
{
"key": "KUBERNETES_SERVICE_PORT_HTTPS",
"value": "443"
},
{
"key": "KUBERNETES_PORT_443_TCP_ADDR",
"value": "172.17.0.1"
},
{
"key": "KUBERNETES_PORT_443_TCP_PROTO",
"value": "tcp"
},
{
"key": "KUBERNETES_PORT_443_TCP_PORT",
"value": "443"
},
{
"key": "CRASHPLAN_IX_CHART_SERVICE_PORT_IX_CRASHPLAN_9800_0",
"value": "5800"
},
{
"key": "CRASHPLAN_IX_CHART_PORT_5800_TCP_PROTO",
"value": "tcp"
},
{
"key": "KUBERNETES_SERVICE_PORT",
"value": "443"
},
{
"key": "KUBERNETES_PORT",
"value": "tcp://172.17.0.1:443"
},
{
"key": "KUBERNETES_PORT_443_TCP",
"value": "tcp://172.17.0.1:443"
},
{
"key": "CRASHPLAN_IX_CHART_PORT_5800_TCP",
"value": "tcp://172.17.238.76:5800"
},
{
"key": "CRASHPLAN_IX_CHART_PORT_5800_TCP_PORT",
"value": "5800"
},
{
"key": "CRASHPLAN_IX_CHART_PORT_5800_TCP_ADDR",
"value": "172.17.238.76"
},
{
"key": "CRASHPLAN_IX_CHART_SERVICE_HOST",
"value": "172.17.238.76"
},
{
"key": "CRASHPLAN_IX_CHART_SERVICE_PORT",
"value": "5800"
}
],
"mounts": [
{
"container_path": "/media/data",
"host_path": "/mnt/ssd.pool/encrypted",
"readonly": true
},
{
"container_path": "/config",
"host_path": "/mnt/ssd.pool/encrypted/applications/crashplan"
},
{
"container_path": "/media/data/foo",
"host_path": "/mnt/archive.pool/encrypted/foo",
"readonly": true
},
{
"container_path": "/media/data/family.archive",
"host_path": "/mnt/photo.pool/encrypted/family.archive",
"readonly": true
},
{
"container_path": "/var/run/secrets/kubernetes.io/serviceaccount",
"host_path": "/var/lib/kubelet/pods/ebf4d1fd-6c95-473a-ac73-d2708532e8c9/volumes/kubernetes.io~projected/kube-api-access-nlqc8",
"readonly": true
},
{
"container_path": "/etc/hosts",
"host_path": "/var/lib/kubelet/pods/ebf4d1fd-6c95-473a-ac73-d2708532e8c9/etc-hosts"
},
{
"container_path": "/dev/termination-log",
"host_path": "/var/lib/kubelet/pods/ebf4d1fd-6c95-473a-ac73-d2708532e8c9/containers/ix-chart/2456dfb7"
}
],
"labels": {
"io.kubernetes.container.name": "ix-chart",
"io.kubernetes.pod.name": "crashplan-ix-chart-7d8d66d654-wfctx",
"io.kubernetes.pod.namespace": "ix-crashplan",
"io.kubernetes.pod.uid": "ebf4d1fd-6c95-473a-ac73-d2708532e8c9"
},
"annotations": {
"io.kubernetes.container.hash": "d26c5087",
"io.kubernetes.container.ports": "[{\"containerPort\":5800,\"protocol\":\"TCP\"}]",
"io.kubernetes.container.restartCount": "0",
"io.kubernetes.container.terminationMessagePath": "/dev/termination-log",
"io.kubernetes.container.terminationMessagePolicy": "File",
"io.kubernetes.pod.terminationGracePeriod": "30"
},
"log_path": "ix-chart/0.log",
"linux": {
"resources": {
"cpu_period": 100000,
"cpu_shares": 2,
"oom_score_adj": 1000,
"hugepage_limits": [
{
"page_size": "2MB"
}
]
},
"security_context": {
"namespace_options": {
"pid": 1
},
"run_as_user": {},
"masked_paths": [
"/proc/acpi",
"/proc/kcore",
"/proc/keys",
"/proc/latency_stats",
"/proc/timer_list",
"/proc/timer_stats",
"/proc/sched_debug",
"/proc/scsi",
"/sys/firmware"
],
"readonly_paths": [
"/proc/asound",
"/proc/bus",
"/proc/fs",
"/proc/irq",
"/proc/sys",
"/proc/sysrq-trigger"
],
"seccomp": {
"profile_type": 1
}
}
}
},
"runtimeSpec": {
"ociVersion": "1.0.2-dev",
"process": {
"user": {
"uid": 0,
"gid": 0,
"additionalGids": [
0,
1,
2,
3,
4,
6,
10,
11,
20,
26,
27
]
},
"args": [
"/init"
],
"env": [
"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/opt/base/sbin:/opt/base/bin",
"HOSTNAME=crashplan-ix-chart-7d8d66d654-wfctx",
"ENV=/root/.docker_rc",
"USER_ID=1000",
"GROUP_ID=1000",
"SUP_GROUP_IDS=",
"UMASK=0022",
"LANG=en_US.UTF-8",
"TZ=Etc/UTC",
"KEEP_APP_RUNNING=0",
"APP_NICENESS=0",
"INSTALL_PACKAGES=",
"PACKAGES_MIRROR=",
"CONTAINER_DEBUG=0",
"DISPLAY_WIDTH=1920",
"DISPLAY_HEIGHT=1080",
"DARK_MODE=0",
"SECURE_CONNECTION=0",
"SECURE_CONNECTION_VNC_METHOD=SSL",
"SECURE_CONNECTION_CERTS_CHECK_INTERVAL=60",
"WEB_LISTENING_PORT=5800",
"VNC_LISTENING_PORT=5900",
"VNC_PASSWORD=",
"ENABLE_CJK_FONT=0",
"CRASHPLAN_SRV_MAX_MEM=1024M",
"CRASHPLAN_SERVER_ADDRESS=",
"ZGROUP_ID=1006",//I 'commented' these out to get it working as commented above
"CRASHPLAN_SERVER_ADDRESS=SMB",
"DARK_MODE=1",
"CRASHPLAN_SRV_MAX_MEM=4G",
"ZUSER_ID=1006",//I 'commented' these out to get it working as commented above
"CRASHPLAN_IX_CHART_PORT=tcp://172.17.238.76:5800",
"KUBERNETES_SERVICE_HOST=172.17.0.1",
"KUBERNETES_SERVICE_PORT_HTTPS=443",
"KUBERNETES_PORT_443_TCP_ADDR=172.17.0.1",
"KUBERNETES_PORT_443_TCP_PROTO=tcp",
"KUBERNETES_PORT_443_TCP_PORT=443",
"CRASHPLAN_IX_CHART_SERVICE_PORT_IX_CRASHPLAN_9800_0=5800",
"CRASHPLAN_IX_CHART_PORT_5800_TCP_PROTO=tcp",
"KUBERNETES_SERVICE_PORT=443",
"KUBERNETES_PORT=tcp://172.17.0.1:443",
"KUBERNETES_PORT_443_TCP=tcp://172.17.0.1:443",
"CRASHPLAN_IX_CHART_PORT_5800_TCP=tcp://172.17.238.76:5800",
"CRASHPLAN_IX_CHART_PORT_5800_TCP_PORT=5800",
"CRASHPLAN_IX_CHART_PORT_5800_TCP_ADDR=172.17.238.76",
"CRASHPLAN_IX_CHART_SERVICE_HOST=172.17.238.76",
"CRASHPLAN_IX_CHART_SERVICE_PORT=5800"
],
"cwd": "/tmp",
"capabilities": {
"bounding": [
"CAP_CHOWN",
"CAP_DAC_OVERRIDE",
"CAP_FSETID",
"CAP_FOWNER",
"CAP_MKNOD",
"CAP_NET_RAW",
"CAP_SETGID",
"CAP_SETUID",
"CAP_SETFCAP",
"CAP_SETPCAP",
"CAP_NET_BIND_SERVICE",
"CAP_SYS_CHROOT",
"CAP_KILL",
"CAP_AUDIT_WRITE"
],
"effective": [
"CAP_CHOWN",
"CAP_DAC_OVERRIDE",
"CAP_FSETID",
"CAP_FOWNER",
"CAP_MKNOD",
"CAP_NET_RAW",
"CAP_SETGID",
"CAP_SETUID",
"CAP_SETFCAP",
"CAP_SETPCAP",
"CAP_NET_BIND_SERVICE",
"CAP_SYS_CHROOT",
"CAP_KILL",
"CAP_AUDIT_WRITE"
],
"permitted": [
"CAP_CHOWN",
"CAP_DAC_OVERRIDE",
"CAP_FSETID",
"CAP_FOWNER",
"CAP_MKNOD",
"CAP_NET_RAW",
"CAP_SETGID",
"CAP_SETUID",
"CAP_SETFCAP",
"CAP_SETPCAP",
"CAP_NET_BIND_SERVICE",
"CAP_SYS_CHROOT",
"CAP_KILL",
"CAP_AUDIT_WRITE"
]
},
"oomScoreAdj": 1000
},
"root": {
"path": "rootfs"
},
"mounts": [
{
"destination": "/proc",
"type": "proc",
"source": "proc",
"options": [
"nosuid",
"noexec",
"nodev"
]
},
{
"destination": "/dev",
"type": "tmpfs",
"source": "tmpfs",
"options": [
"nosuid",
"strictatime",
"mode=755",
"size=65536k"
]
},
{
"destination": "/dev/pts",
"type": "devpts",
"source": "devpts",
"options": [
"nosuid",
"noexec",
"newinstance",
"ptmxmode=0666",
"mode=0620",
"gid=5"
]
},
{
"destination": "/dev/mqueue",
"type": "mqueue",
"source": "mqueue",
"options": [
"nosuid",
"noexec",
"nodev"
]
},
{
"destination": "/sys",
"type": "sysfs",
"source": "sysfs",
"options": [
"nosuid",
"noexec",
"nodev",
"ro"
]
},
{
"destination": "/sys/fs/cgroup",
"type": "cgroup",
"source": "cgroup",
"options": [
"nosuid",
"noexec",
"nodev",
"relatime",
"ro"
]
},
{
"destination": "/config",
"type": "bind",
"source": "/mnt/ssd.pool/encrypted/applications/crashplan",
"options": [
"rbind",
"rprivate",
"rw"
]
},
{
"destination": "/storage",
"type": "bind",
"source": "/mnt/ssd.pool/ix-applications/k3s/agent/containerd/io.containerd.grpc.v1.cri/containers/ac8de69648b7541499d2c42cf99bda6f1efc826dff34047acad9bf6113611883/volumes/bed21021942d8787afd10135730d72339c1e4ba579d3e57635bfdf15ddfb9be5",
"options": [
"rbind",
"rprivate",
"rw"
]
},
{
"destination": "/media/data",
"type": "bind",
"source": "/mnt/ssd.pool/encrypted",
"options": [
"rbind",
"rprivate",
"ro"
]
},
{
"destination": "/etc/hosts",
"type": "bind",
"source": "/var/lib/kubelet/pods/ebf4d1fd-6c95-473a-ac73-d2708532e8c9/etc-hosts",
"options": [
"rbind",
"rprivate",
"rw"
]
},
{
"destination": "/dev/termination-log",
"type": "bind",
"source": "/var/lib/kubelet/pods/ebf4d1fd-6c95-473a-ac73-d2708532e8c9/containers/ix-chart/2456dfb7",
"options": [
"rbind",
"rprivate",
"rw"
]
},
{
"destination": "/etc/hostname",
"type": "bind",
"source": "/mnt/ssd.pool/ix-applications/k3s/agent/containerd/io.containerd.grpc.v1.cri/sandboxes/590e9e6f2963d657553adec7f10838e0313ac0c031b0b01bfd87efd568e7ce1f/hostname",
"options": [
"rbind",
"rprivate",
"rw"
]
},
{
"destination": "/etc/resolv.conf",
"type": "bind",
"source": "/mnt/ssd.pool/ix-applications/k3s/agent/containerd/io.containerd.grpc.v1.cri/sandboxes/590e9e6f2963d657553adec7f10838e0313ac0c031b0b01bfd87efd568e7ce1f/resolv.conf",
"options": [
"rbind",
"rprivate",
"rw"
]
},
{
"destination": "/dev/shm",
"type": "bind",
"source": "/run/k3s/containerd/io.containerd.grpc.v1.cri/sandboxes/590e9e6f2963d657553adec7f10838e0313ac0c031b0b01bfd87efd568e7ce1f/shm",
"options": [
"rbind",
"rprivate",
"rw"
]
},
{
"destination": "/media/data/foo",
"type": "bind",
"source": "/mnt/archive.pool/encrypted/foo",
"options": [
"rbind",
"rprivate",
"ro"
]
},
{
"destination": "/media/data/family.archive",
"type": "bind",
"source": "/mnt/photo.pool/encrypted/family.archive",
"options": [
"rbind",
"rprivate",
"ro"
]
},
{
"destination": "/var/run/secrets/kubernetes.io/serviceaccount",
"type": "bind",
"source": "/var/lib/kubelet/pods/ebf4d1fd-6c95-473a-ac73-d2708532e8c9/volumes/kubernetes.io~projected/kube-api-access-nlqc8",
"options": [
"rbind",
"rprivate",
"ro"
]
}
],
"annotations": {
"io.kubernetes.cri.container-name": "ix-chart",
"io.kubernetes.cri.container-type": "container",
"io.kubernetes.cri.image-name": "docker.io/jlesage/crashplan-pro:latest",
"io.kubernetes.cri.sandbox-id": "590e9e6f2963d657553adec7f10838e0313ac0c031b0b01bfd87efd568e7ce1f",
"io.kubernetes.cri.sandbox-name": "crashplan-ix-chart-7d8d66d654-wfctx",
"io.kubernetes.cri.sandbox-namespace": "ix-crashplan",
"io.kubernetes.cri.sandbox-uid": "ebf4d1fd-6c95-473a-ac73-d2708532e8c9"
},
"linux": {
"resources": {
"devices": [
{
"allow": false,
"access": "rwm"
}
],
"memory": {},
"cpu": {
"shares": 2,
"period": 100000
}
},
"cgroupsPath": "kubepods-besteffort-podebf4d1fd_6c95_473a_ac73_d2708532e8c9.slice:cri-containerd:ac8de69648b7541499d2c42cf99bda6f1efc826dff34047acad9bf6113611883",
"namespaces": [
{
"type": "pid"
},
{
"type": "ipc",
"path": "/proc/16106/ns/ipc"
},
{
"type": "uts",
"path": "/proc/16106/ns/uts"
},
{
"type": "mount"
},
{
"type": "network",
"path": "/proc/16106/ns/net"
},
{
"type": "cgroup"
}
],
"maskedPaths": [
"/proc/acpi",
"/proc/kcore",
"/proc/keys",
"/proc/latency_stats",
"/proc/timer_list",
"/proc/timer_stats",
"/proc/sched_debug",
"/proc/scsi",
"/sys/firmware"
],
"readonlyPaths": [
"/proc/asound",
"/proc/bus",
"/proc/fs",
"/proc/irq",
"/proc/sys",
"/proc/sysrq-trigger"
]
}
}
}
}
Sorry, I you saying that it is now working ?
Current Behavior
Fails to start
Expected Behavior
Start
Steps To Reproduce
No response
Environment
Container creation
Through the truenas container screen
Container log
Container inspect
No response
Anything else?
This ran for maybe a year without issue. Following an update no longer starts