Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Investigate the use of ID-mapped mounts #179

Open
WanzenBug opened this issue Nov 22, 2022 · 2 comments
Open

Investigate the use of ID-mapped mounts #179

WanzenBug opened this issue Nov 22, 2022 · 2 comments

Comments

@WanzenBug
Copy link
Member

ID-mapped mounts promise to make it easy to change the observable root uid+gid of a volume. This would be useful for us since any use of fsGroup currently involves a chown -R by kubelet. Depending on the size of the volume, this can delay actually starting the Pod after NodePublishVolume() by over 10 minutes.

Here are the results of a bit of investigation:

  • ID mapped mounts could be integrated into the CSI driver
  • ID mapped mounts could also be something to directly integrate with kubelet
  • Altough available since kernel 5.12, RHEL9 and copy-cats have it disabled for unspecified security concerns (NB: CentOS Stream and Fedora have it enabled, and apart from that one thread that did not go anywhere it seems to work just fine)
  • The tooling is non-existent. We would need to write our own mount wrapper should we ever want to continue on that path.
@rck
Copy link
Member

rck commented Nov 22, 2022

would it make sense to open an issue somewhere in kubernetes upstream?

@WanzenBug
Copy link
Member Author

would it make sense to open an issue somewhere in kubernetes upstream?

Sure. Since I already had a bit of a discussion on the topic in the #sig-storage channel of the kubernetes slack, I'll ask there on what needs to happen to get it into upstream.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants