-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
calico kubernetes, and selinux #2704
Comments
Here is the diff I made to https://docs.projectcalico.org/v3.8/manifests/calico.yaml which fixes the problem for me:
|
@rcythr Thanks for sleuthing that out, would you mind putting up a PR with the fix? The file that you'd need to change is here: https://github.com/projectcalico/calico/blob/master/_includes/master/charts/calico/templates/calico-node.yaml#L48 (and the similar files in Going through the PR process makes sure that all contributions are properly attributed. |
Sure, I'll get one submitted this weekend and refer to this issue. |
Sorry for the wait, getting a dev environment (for running the tests) took a little longer than I expected and I kicked the can down the road to this weekend. I'm trying to get that PR created today. |
Expected Behavior
Calico should work with selinux in enforcing mode. It's not reasonable to disable selinux for the whole system due to a single component.
Current Behavior
Calico does not work with selinux in enforcing mode.
Possible Solution
I noticed that calico-node runs with
However, the init containers do not, and the install process breaks with permission denied errors due to selinux. I added the same security context to all the init containers, and the install works fine now.
Steps to Reproduce (for bugs)
Context
My organization mandates the use of selinux on all hosts. Any component which requires that selinux be disabled is simply not allowed to be used. In order to use calico, I needed to get it working with selinux.
Your Environment
The text was updated successfully, but these errors were encountered: