-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[master] kube-proxy doesn't start up due to "apply caps: operation not permitted" error #2058
Comments
Maybe we can avoid hitting this issue by updating the parent Docker (and Podman) to support So, I guess we will need to write a wrapper script for runc to eliminate unsupported caps? |
Hmm can't repro in our CI or my local dev. That's fun.
I'm not sure if that's reasonable on the containerd side. We generally only ask for changes that have a legitimate use orthogonally to KIND. In which case:
Seems likely. |
previously: #1906, moby/moby#41562 |
seems we have a bit of a chicken and egg issue here 😞
This will be fun for us, since as you said it will be some time before that reaches users. |
as for repro: my test hosts are not yet on kernel 5.8+ which your opencontainers/runc@6dfbe9b helpfully points out is when these were introduced. |
Aside from kind, minikube and k3d will need this fix. I'm thinking of modifying |
/cc |
related discussion in the runtime spec; opencontainers/runtime-spec#1071 so, for docker, this could be resolved once runc v1.0.0-rc93 is included in our containerd packages (must be tested with containerd 1.4.x), but would require the minimum "required" version in packaging to be raised (as older versions will no longer be compatible) |
Thanks @thaJeztah! -- I think were going to have to work around this for some time though, we still see users with docker 18.X pretty often and it otherwise works fine, but worse we have the actual situation in kubernetes's CI like this:
turtles all the way down and all that ... Even if we bump docker in CI to pickup this change ASAP, we still have the containerd on the real hosts. Right now CI is actually running on top of containerd 1.2.10 (!) for the nodes under wg-k8s-infra. There's definitely newer available (it's also still on Kubernetes 1.16.X ...) but I think it will be some time before the currently unreleased containerd 1.5.X makes it's way onto the CI nodes. |
/cc @dims |
This should be resolved in the base image now, which will be picked up in future node images and/or if the user is building and testing Kubernetes @ HEAD (if someone is not using kind @ HEAD for this particular purpose, please consider using a stable kind release instead!) Thanks all! |
@vrothberg I'm hitting this with this package
is it possible that runc version does not have the fix mentioned in #2058 (comment) ? |
@aojea, the fix was included in run v1.0.0-rc93. |
ok, then it was a red herring, thanks for the quick response, I'll keep digging |
@aojea perhaps related to situations as described in moby/moby#42906 (addressed by moby/moby#42933 on "master" in the Moby repo). The runc fix was to account for capabilities that were supported by the kernel, but not yet known to runc's code, but there were some other situations where (e.g. in a |
I am using cri-o 1.22. Updating runc to 1.0.2-1 fixed the issues |
What happened:
The kube-proxy pod doesn't start up
What you expected to happen:
Should start.
How to reproduce it (as minimally and precisely as possible):
Set up
Result:
Anything else we need to know?:
Possibly related to containerd/containerd#4717
Environment:
kind version
): acac774kubectl version
): v1.20.2docker info
): moby/moby@3e0025e2fc/etc/os-release
): Ubuntu 20.10, kernel 5.8.0-41-genericThe text was updated successfully, but these errors were encountered: