Skip to content

Latest commit

 

History

History
175 lines (122 loc) · 6.69 KB

troubleshooting.md

File metadata and controls

175 lines (122 loc) · 6.69 KB

PODMAN logo

Troubleshooting

A list of common issues and solutions for Podman


1) Variety of issues - Validate Version

A large number of issues reported against Podman are often found to already be fixed in more current versions of the project. Before reporting an issue, please verify the version you are running with podman version and compare it to the latest release documented on the top of Podman's README.md.

If they differ, please update your version of PODMAN to the latest possible and retry your command before reporting the issue.


2) No such image or Bare keys cannot contain ':'

When doing a podman pull or podman build command and a "common" image cannot be pulled, it is likely that the /etc/containers/registries.conf file is either not installed or possibly misconfigured.

Symptom

$ sudo podman build -f Dockerfile
STEP 1: FROM alpine
error building: error creating build container: no such image "alpine" in registry: image not known

or

$ sudo podman pull fedora
error pulling image "fedora": unable to pull fedora: error getting default registries to try: Near line 9 (last key parsed ''): Bare keys cannot contain ':'.

Solution

  • Verify that the /etc/containers/registries.conf file exists. If not, verify that the skopeo-containers package is installed.
  • Verify that the entries in the [registries.search] section of the /etc/containers/registries.conf file are valid and reachable.
    • i.e. registries = ['registry.fedoraproject.org', 'quay.io', 'registry.access.redhat.com']

3) http: server gave HTTP response to HTTPS client

When doing a Podman command such as build, commit, pull, or push to a registry, tls verification is turned on by default. If authentication is not used with those commands, this error can occur.

Symptom

$ sudo podman push alpine docker://localhost:5000/myalpine:latest
Getting image source signatures
Get https://localhost:5000/v2/: http: server gave HTTP response to HTTPS client

Solution

By default tls verification is turned on when communicating to registries from Podman. If the registry does not require authentication the Podman commands such as build, commit, pull and push will fail unless tls verification is turned off using the --tls-verify option. NOTE: It is not at all recommended to communicate with a registry and not use tls verification.

  • Turn off tls verification by passing false to the tls-verification option.
  • I.e. podman push --tls-verify=false alpine docker://localhost:5000/myalpine:latest

4) Rootless: could not get runtime - database configuration mismatch

In Podman release 0.11.1, a default path for rootless containers was changed, potentially causing rootless Podman to be unable to function. The new default path is not a problem for new installations, but existing installations will need to work around it with the following fix.

Symptom

$ podman info
could not get runtime: database run root /run/user/1000/run does not match our run root /run/user/1000: database configuration mismatch

Solution

This problem has been fixed in Podman release 0.12.1 and it is recommended to upgrade to that version. If that is not possible use the following procedure.

To work around the new default path, we can manually set the path Podman is expecting in a configuration file.

First, we need to make a new local configuration file for rootless Podman.

  • mkdir -p ~/.config/containers
  • cp /usr/share/containers/libpod.conf ~/.config/containers

Next, edit the new local configuration file (~/.config/containers/libpod.conf) with your favorite editor. Comment out the line starting with cgroup_manager by adding a # character at the beginning of the line, and change the path in the line starting with tmp_dir to point to the first path in the error message Podman gave (in this case, /run/user/1000/run).


5) rootless containers cannot ping hosts

When using the ping command from a non-root container, the command may fail because of a lack of privileges.

Symptom

$ podman run --rm fedora ping -W10 -c1 redhat.com
PING redhat.com (209.132.183.105): 56 data bytes

--- redhat.com ping statistics ---
1 packets transmitted, 0 packets received, 100% packet loss

Solution

It is most likely necessary to enable unprivileged pings on the host. Be sure the UID of the user is part of the range in the /proc/sys/net/ipv4/ping_group_range file.

To change its value you can use something like: sysctl -w "net.ipv4.ping_group_range=0 2000000".

To make the change persistent, you'll need to add a file in /etc/sysctl.d that contains net.ipv4.ping_group_range=0 $MAX_UID.


6) Build hangs when the Dockerfile contains the useradd command

When the Dockerfile contains a command like RUN useradd -u 99999000 -g users newuser the build can hang.

Symptom

If you are using a useradd command within a Dockerfile with a large UID/GID, it will create a large sparse file /var/log/lastlog. This can cause the build to hang forever. Go language does not support sparse files correctly, which can lead to some huge files being created in your container image.

Solution

If the entry in the Dockerfile looked like: RUN useradd -u 99999000 -g users newuser then add the --log-no-init parameter to change it to: RUN useradd --log-no-init -u 99999000 -g users newuser. This option tells useradd to stop creating the lastlog file.

7) Permission denied when running Podman commands

When rootless podman attempts to execute a container on a non exec home directory a permission error will be raised.

Symptom

If you are running podman or buildah on a home directory that is mounted noexec, then they will fail. With a message like:

podman run centos:7
standard_init_linux.go:203: exec user process caused "permission denied"

Solution

Since the administrator of the system setup your home directory to be noexec, you will not be allowed to execute containers from storage in your home directory. It is possible to work around this by manually specifying a container storage path that is not on a noexec mount. Simply copy the file /etc/containers/storage.conf to ~/.config/containers/ (creating the directory if necessary). Specify a graphroot directory which is not on a noexec mount point and to which you have read/write privileges. You will need to modify other fields to writable directories as well.

For example

cat ~/.config/containers/storage.conf
[storage]
  driver = "overlay"
  runroot = "/run/user/1000"
  graphroot = "/execdir/myuser/storage"
  [storage.options]
    mount_program = "/bin/fuse-overlayfs"