-
Notifications
You must be signed in to change notification settings - Fork 229
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fleet container fails: /var/run/secrets/kubernetes.io/serviceaccount/token: permission denied #790
Comments
Any advice on effective workaround? I tried to modify the related CRD object (gitjobs.gitjob.cattle.io) but the modification does not stay, it immediately returns back to original. |
Related? kubernetes-sigs/external-dns#1185 |
Also setting the fsgroup on the related gitjobs.gitjob.cattle.io object can be used as a workaround.
|
@patrijua it does seem to be related to the issue you linked. Relevant snippet from AWS documentation in https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts-technical-overview.html.
However, the followup workaround you listed seems to contradict this since runAsUser 1000 (non-root) seemed to work as expected? |
Both workarounds did work. Either run as root OR run as 1000 and add fsGroup: 65534 to securityContext. |
With Rancher v2.6.3 running in AWS EKS with kubernetes version 1.21, fleet fails to reconcile the downstream cluster because "fleet" container fails. Previous "step-git-source" is successful and clones the git repository.
Seems that the user running the pod (1000) does not have access to token. I did a test by modifying the pod definition to run as root and triggered the pod manually, then fleet container was ran successfully.
The text was updated successfully, but these errors were encountered: