-
Notifications
You must be signed in to change notification settings - Fork 582
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Can't install Kubernetes >=1.22 on Flatcar Linux due to missing SELinux custom policies #2788
Comments
Did you find a solution to this? I think rke is installing this package automatic on rpm distroes, but flatcar is not one of those. Should this be lifted to https://github.com/rancher/rke2-selinux, and a request for adding flatcar? Anyone know how this works together? |
@xeor i didn't find a solution yet. I naively tried to register the SE module extracted from the rpm directly in a flatcar instance and, obviously, it failed as I'm also considering opening an issue on Flatcar side and see what's their opinion about this and what would be the best approach. Maybe opening a request for a new package to be included in Flatcar, but don't know if it meets Flatcar requirements for new packages ? In the meantime, it would be interesting to have a feedback from the rancher/rke team about this ^^ And yes, I imagine the same situation occurs with |
This issue/PR has been automatically marked as stale because it has not had activity (commit/comment/label) for 60 days. It will be closed in 14 days if no further activity occurs. Thank you for your contributions. |
Any progress so far? |
@bitfisher I opened an issue on Flatcar side too (see flatcar/Flatcar#598). The current workaround is to have selinux disabled for the docker service. This is of course not ideal but work seems currently on-going on Flatcar side to smooth out SELinux related stuff flatcar/Flatcar#673 |
We have the same issue in our production cluster, and we are stuck in v1.21.X. but I tried to disable systemd:
units:
- name: "docker.service"
enabled: true
dropins:
- name: "01-selinux.conf"
contents: |
[Service]
Environment=DOCKER_SELINUX=--selinux-enabled=false But I don't want to disable |
Any updates? |
Is there any other option than disabling |
This repository uses an automated workflow to automatically label issues which have not had any activity (commit/comment/label) for 60 days. This helps us manage the community issues better. If the issue is still relevant, please add a comment to the issue so the workflow can remove the label and we know it is still valid. If it is no longer relevant (or possibly fixed in the latest release), the workflow will automatically close the issue in 14 days. Thank you for your contributions. |
Unstale please |
Any Updates? Is there any other option than disabling SELinux? |
This repository uses an automated workflow to automatically label issues which have not had any activity (commit/comment/label) for 60 days. This helps us manage the community issues better. If the issue is still relevant, please add a comment to the issue so the workflow can remove the label and we know it is still valid. If it is no longer relevant (or possibly fixed in the latest release), the workflow will automatically close the issue in 14 days. Thank you for your contributions. |
This is still an issue, so unstale please! A response from anyone at Rancher would be highly appreciated! Anyone managed updating k8s to >= 1.22 without disabling SELinux? Any guiadance from Rancher regarding this issue? |
This repository uses an automated workflow to automatically label issues which have not had any activity (commit/comment/label) for 60 days. This helps us manage the community issues better. If the issue is still relevant, please add a comment to the issue so the workflow can remove the label and we know it is still valid. If it is no longer relevant (or possibly fixed in the latest release), the workflow will automatically close the issue in 14 days. Thank you for your contributions. |
Unfortunately this is still an issue, so unstale please! A response from anyone at Rancher would be highly appreciated! Anyone managed updating k8s to >= 1.22 without disabling SELinux? Any guidance from Rancher regarding this issue? |
The thing is that Rancher/SUSE will pull out their support matrix and say Flatcar is not supported officially .. and they don't provide so far any support for any other immutable container OS. (sic!) |
That's bad news :( I haven't seen any comment from Rancher/SUSE that Flatcar-Support will be dropped. Even in their docs it's still mentioned as supported. (weird) So we will either have to switch to another OS or drop RKE :( Any other options you see? |
As @mikekuzak is not associated with SUSE or Rancher, this statement is not helping in any way... Flatcar has never been officially supported, and I guess they are busy with other issues. So Flatcar will never be a priority. Remember, this is open source, means you could contribute a SELinux solution. Though I would do that for RKE2. But this is also not an official statement, give them some slack, Rancher is a nice project. |
Same issue with Fedora CoreOS 37 on OpenStack:
Installing rancher-selinux from GitHub does not solve the issue. The only solution for now is to use a 1.21 kubernetes-rancher version (e.g., v1.21.14-rancher1-1). |
unstale |
This repository uses an automated workflow to automatically label issues which have not had any activity (commit/comment/label) for 60 days. This helps us manage the community issues better. If the issue is still relevant, please add a comment to the issue so the workflow can remove the label and we know it is still valid. If it is no longer relevant (or possibly fixed in the latest release), the workflow will automatically close the issue in 14 days. Thank you for your contributions. |
Unstale again please. There still isn't a way to upgrade past 1.21 on Fedora CoreOS. |
disable SELinux on docker ...
…On Mon, 4 Dec 2023, 15:54 tailtwo, ***@***.***> wrote:
Unstale again please. There still isn't a way to upgrade past 1.21 on
CoreOS.
—
Reply to this email directly, view it on GitHub
<#2788 (comment)>, or
unsubscribe
<https://github.com/notifications/unsubscribe-auth/AEOPPA427OUWQ7NAPUSZW63YHXW4PAVCNFSM5K2UKAB2U5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TCOBTHA4TGOJSHE2A>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
This repository uses an automated workflow to automatically label issues which have not had any activity (commit/comment/label) for 60 days. This helps us manage the community issues better. If the issue is still relevant, please add a comment to the issue so the workflow can remove the label and we know it is still valid. If it is no longer relevant (or possibly fixed in the latest release), the workflow will automatically close the issue in 14 days. Thank you for your contributions. |
Unstale again please |
This repository uses an automated workflow to automatically label issues which have not had any activity (commit/comment/label) for 60 days. This helps us manage the community issues better. If the issue is still relevant, please add a comment to the issue so the workflow can remove the label and we know it is still valid. If it is no longer relevant (or possibly fixed in the latest release), the workflow will automatically close the issue in 14 days. Thank you for your contributions. |
unstale
…On Mon, 27 May 2024, 05:18 github-actions[bot], ***@***.***> wrote:
This repository uses an automated workflow to automatically label issues
which have not had any activity (commit/comment/label) for 60 days. This
helps us manage the community issues better. If the issue is still
relevant, please add a comment to the issue so the workflow can remove the
label and we know it is still valid. If it is no longer relevant (or
possibly fixed in the latest release), the workflow will automatically
close the issue in 14 days. Thank you for your contributions.
—
Reply to this email directly, view it on GitHub
<#2788 (comment)>, or
unsubscribe
<https://github.com/notifications/unsubscribe-auth/AEOPPA5MS73P3IVPRD3ZSPLZEKJWFAVCNFSM5K2UKAB2U5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TEMJTGI2TENZQG43Q>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
This repository uses an automated workflow to automatically label issues which have not had any activity (commit/comment/label) for 60 days. This helps us manage the community issues better. If the issue is still relevant, please add a comment to the issue so the workflow can remove the label and we know it is still valid. If it is no longer relevant (or possibly fixed in the latest release), the workflow will automatically close the issue in 14 days. Thank you for your contributions. |
Unstale |
This repository uses an automated workflow to automatically label issues which have not had any activity (commit/comment/label) for 60 days. This helps us manage the community issues better. If the issue is still relevant, please add a comment to the issue so the workflow can remove the label and we know it is still valid. If it is no longer relevant (or possibly fixed in the latest release), the workflow will automatically close the issue in 14 days. Thank you for your contributions. |
unstale |
Are policies being installed by https://github.com/rancher/rancher-selinux/releases? There's a requirement for k8s >= 1.22 clusters to install the rancher-selinux RPM package. Going through the history, I see the following in the original design discussion:
Looks like Given that this change was scoped for Kubernetes versions 1.22 and higher, the version alignment looks correct so I am wondering what is missing here that needs to be fixed. |
Thanks for the explanation, is this also the case with RKE2/K3s? As RKE is
slowly being phased out .
…On Thu, 10 Oct 2024, 16:58 Kinara Shah, ***@***.***> wrote:
Are policies being installed by
https://github.com/rancher/rancher-selinux/releases? There's a
requirement for k8s >= 1.22 clusters to install the rancher-selinux RPM
package.
Going through the history, I see the following in the original design
discussion:
If this package is not installed, rke up should fail during the pre-check,
which should show something like:
[selinux] Host [x] does not recognize SELinux label [rke_container_t]. This is required for Kubernetes version [v1.22.0-rancher0]. Please install rancher-selinux RPM package and try again".
Looks like rke_container_t was added to our rancher-selinux repo as part
of the original implementation, PR for reference:
https://github.com/rancher/rancher-selinux/pull/6/files
Given that this change was scoped for Kubernetes versions 1.22 and higher,
the version alignment looks correct so I am wondering what is missing here
that needs to be fixed.
—
Reply to this email directly, view it on GitHub
<#2788 (comment)>, or
unsubscribe
<https://github.com/notifications/unsubscribe-auth/AEOPPA3OQFG3EQEILJMU6R3Z22P2FAVCNFSM5K2UKAB2U5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TENBQGU2TAMRTHE3Q>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
@mikekuzak For installing with RKE2, you can check https://github.com/rancher/rke2-selinux and https://docs.rke2.io/security/selinux and open an issue at https://github.com/rancher/rke2/issues/ if you run into problems. |
RKE version:
1.3.3 (using terraform RKE provider v1.3.0)
Docker version: (
docker version
,docker info
preferred)Operating system and kernel: (
cat /etc/os-release
,uname -r
preferred)Type/provider of hosts: (VirtualBox/Bare-metal/AWS/GCE/DO)
Master/Worker nodes provisionned by terraform using the RKE provider v1.3.0. Nodes are vSphere virtual machines based on the Flatcar OVA.
cluster.yml file:
As I'm using the terraform provider, here's the tf
rke_cluster
declarationSteps to Reproduce:
Try to update a kubernetes cluster from 1.21 (or possibly earlier versions) to 1.22 when using Flatcar OS 3033.2.0. I imagine that a fresh 1.22 installation would lead to the same result.
Results:
The following error occurs:
As shown in
docker info
above, SELinux is enabled on dockerd, triggering this specific step from RKE. Starting from 1.22, a dedicated custom SELinux policy must be installed on SELinux-enabled nodes. As I'm using Flatcar Linux, it's not possible to deploy this RPM as-is.I'm quite a newbie when it comes to SELinux and I don't see how I can easily work around this as disabling SELinux on the docker daemon is not an option for me. Is there any plan on RKE side to better integrate this with Flatcar Linux ? I may be missing a simple way to circumvent this so don't hesitate to tell me ^^
Thanks
The text was updated successfully, but these errors were encountered: