Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OpenShift & fsGroup SecurityContext #116

Closed
ArthurVardevanyan opened this issue Oct 9, 2023 · 6 comments
Closed

OpenShift & fsGroup SecurityContext #116

ArthurVardevanyan opened this issue Oct 9, 2023 · 6 comments
Assignees

Comments

@ArthurVardevanyan
Copy link
Contributor

This change in Operator 0.0.8 causes the pods to not start start due to OpenShift requiring the use of Random UIDs

OpenShift will inject a given fsGroup for a given namespace:
image

REF:

@Pothulapati
Copy link
Collaborator

Interesting but Dragonfly binary also requires a specific fsGroup to let the binary inside have the required permissions on volumes. Any ideas on what do you think we should do? We could attach that group only when backups are scheduled but this would still cause this problem when there are backups needed.

@ArthurVardevanyan
Copy link
Contributor Author

The random UIDs are per namespace not per pod, I wouldn't expect there to be an issue.

@Pothulapati
Copy link
Collaborator

So, We are trying to fix this. First, we want to explore how other Operators that also have a fsGroup being set work with Openshift

@ArthurVardevanyan Do you have any ideas on how we should fix this?

@ArthurVardevanyan
Copy link
Contributor Author

PR: #163

@Pothulapati
Copy link
Collaborator

#163 merged, hence closing!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants