Closed lance5890 closed 7 months ago
@Elbehery @tjungblu
I just wonder why should the etcd containerd should set the "privileged": true flag.
because we write the etcd data dir onto a hostPath, which requires this unfortunately.
I just wonder why should the etcd containerd should set the "privileged": true flag.
because we write the etcd data dir onto a hostPath, which requires this unfortunately.
1 but even without the 'privileged: true', the etcd can also write to /var/lib/etcd 2 as the etcd container run as root by default
I doubt that you can just mount /var/lib/etcd on the host without it. But feel free to try, you already know how to run PRs. Plenty of detail around this in https://kubernetes.io/docs/concepts/storage/volumes/#hostpath
I doubt that you can just mount /var/lib/etcd on the host without it. But feel free to try, you already know how to run PRs. Plenty of detail around this in https://kubernetes.io/docs/concepts/storage/volumes/#hostpath
can I join the cluster-etcd-operator as a member ? that would be my honor
Unless you're at RedHat and can authenticate via our SSO the automation won't be able to add you :) But I'm happy to give you the ok-to-test label to try it out.
I have seen many ocp containers have set the ""privileged": true"
I just wonder why should the etcd containerd should set the "privileged": true flag. compared to the kubeadm installation, the etcd container has not this flag
when using standard container runtimes (for example ContainerD or CRI-O) access to a privileged container allows for easy breakout to the underlying host, which in turn allows for access to all other workloads on that host and credentials for the node agent (Kubelet)