-
Notifications
You must be signed in to change notification settings - Fork 175
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Kubernetes 1.26.1 - Linux Capabilities - starting container process caused: apply caps: operation not permitted #330
Comments
I digged a bit through the error messages, ended up dropping
This was essentially that patch:
A version of this was pushed to I went ahead and patched
A version of this was pushed to With that, It looks like the Concourse model of running runc inside privileged pods gets more and more incompatible with more recent/secure versions of Kubernetes. I'm not sure how much further time I'm willing to spend on trying to get this working - concourse/concourse#5682 sounds like a more sustainable long-term solution. |
Hmmh, concourse adds both CAP_SYS_BOOT and CAP_SYS_MODULE, I just got tricked by the Talos documentation calling it wrong (fixed in siderolabs/talos#7473). I'll re-roll the first patch and see what dropping both capabilities will do:
|
Ok, with the new patch applied (pushed to That smells like an incompatibility, either with the cgroup structure in Talos, or assuming it's using Docker as an outer container runtime. |
moby/moby#40835 (comment) suggests this might be an issue with what mountpoints are seen inside the container, or with user namespace support, even though I'm a bit unsure where runc itself is emitting that error message… |
I sent a PR containing the first patch to concourse/concourse#8791. |
Describe the bug
Ive deployed the workers to a privileged namespace:
Namespace: cc
On Kubernetes 1.26.1
When trying to run a hello world pipeline I get this using Guardian inside the worker pod:
Im fairly new to Concourse, so if Im missing something, sorry!
I can see that securityContext: privileged: true is set on the workers statefulset - in the source YAML and its also seemingly set in the resulting statefulset:
(Ive been adding the capabilities to try to resolve the issue)
As far as I can tell the container is privileged - I am also using TalosCtl, but cant find anything, thus far to suggest it it Talos related.
Any steps/help/advice on where to go next or what Ive missed welcome.
Reproduction steps
...
Expected behavior
Expected would be the container image to pull and start successfully
Additional context
In my setup Im using custom registries so expect some setup here, but suspect we are hitting this issue pre to that being the problem
The text was updated successfully, but these errors were encountered: