Skip to content

Commit

Permalink
Merge pull request #7011 from rhatdan/troubleshoot
Browse files Browse the repository at this point in the history
document CAP_SYS_ADMIN required for systemd PrivateNetwork
  • Loading branch information
openshift-merge-robot authored Jul 19, 2020
2 parents d087ade + 94d9add commit b7b8fce
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion rootless.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ can easily fail
* As of Fedora 31 defaults to cgroup V2, which has full support of rootless cgroup management. Note this requires the --cgroup-manager within rootless containers to use systemd, which new containers will get by default.
* Some system unit configuration options do not work in the rootless container
* systemd fails to apply several options and failures are silently ignored (e.g. CPUShares, MemoryLimit). Should work on cgroup V2.
* Use of certain options will cause service startup failures (e.g. PrivateNetwork).
* Use of certain options will cause service startup failures (e.g. PrivateNetwork). The systemd services requiring `PrivateNetwork` can be made to work by passing `--cap-add SYS_ADMIN`, but the security implications should be carefully evaluated. In most cases, it's better to create an override.conf drop-in that sets `PrivateNetwork=no`. This also applies to containers run by root.
* Can not share container images with CRI-O or other rootfull users
* Difficult to use additional stores for sharing content
* Does not work on NFS or parallel filesystem homedirs (e.g. [GPFS](https://www.ibm.com/support/knowledgecenter/en/SSFKCN/gpfs_welcome.html))
Expand Down

0 comments on commit b7b8fce

Please sign in to comment.