-
Notifications
You must be signed in to change notification settings - Fork 385
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Pods unable to start: Permission denied #717
Comments
What happens if you change that to:
|
Same results after fixing it. Potentially some SELinux issue.
Running
EDIT: Resolved as suggested by the above error ausearch -c 'runc:[2:INIT]' --raw | audit2allow -M my-runc2INIT
semodule -i my-runc2INIT.pp |
k0s was started as a systemd service. Suspecting could be related to the SELinux issues when configured as a systemd service: containers/podman#1980. Not an SELinux expert here. Another similar SELinux issue here but started as a cron job: containers/container-selinux#100. |
Version
Platform
Which platform did you run k0s on?
What happened?
Setup is in airgap environment. Images pulled from private repository.
Pods unable to start. Traced to possible cause of calico-node DaemonSet unable to start.
How To Reproduce
Set
images.repository
to private repository.Customize containerd configuration using
containerd.toml
configuration to use private repository:Expected behavior
Pods able to start,
Screenshots & Logs
Additional context
Working alright in v0.9.1. Noticed
containerd
socket when running as root changed from/var/lib/k0s/run
to/run/k0s
fromv0.9.1
tov0.10.0
due to this commit. Not sure if this is causing issues.The text was updated successfully, but these errors were encountered: