-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
pvc is created but pod is unable to mount the volume #13
Comments
Hi @brunnels, Can you exec the command "dd if=/dev/sdb bs=4096 count=512 status=none" on the node ? The function just execute the above command and get the result. |
The node is talos so no ssh access. I can exec on the trident-node-linux pod if that would help but logs indicate it would probably fail. All my talos nodes have the iscsi-tools system extension. |
@davidcheng0716 It looks like the synology-csi that uses iscsi for RWO and cifs for RWM works well under talos. https://www.talos.dev/v1.7/kubernetes-guides/configuration/synology-csi/ Perhaps the qnap-csi needs some additional configuration steps like the openebs jiva as detailed here? |
@davidcheng0716 I found this project talos-debug-tools that creates a daemonset similar to the qnap csi driver. I changed the namespace to be the same as the qnap csi driver namespace and I am able to ssh into the pod and run the dd command without error. Maybe the debug daemonset could provide some insight into something the qnap csi daemonset might be missing? |
Comparing the securityContext:
allowPrivilegeEscalation: true
capabilities:
add:
- SYS_ADMIN
privileged: true and this for the securityContext:
runAsNonRoot: false
seccompProfile:
type: RuntimeDefault |
Hi @brunnels, |
@davidcheng0716 Do you plan to release the source for the operator? If the source were available I could make the necessary changes and test. |
@davidcheng0716 any movement on this? I'm happy to assist with testing. |
@brunnels |
@davidcheng0716 I have baremetal. I'm using https://github.com/onedr0p/cluster-template template. This makes it very quick to get a repeatable, secure, and best practices cluster up in a few minutes. |
@brunnels The talos debug daemonset installs the tools in the container instead of calling the tool on the node. Therefore, it can work when you ssh into the pod. I'm wondering if the node has the tool 'dd' without the container on the node. |
@davidcheng0716 no, that's not the problem. If you see my prior comment I can use the talos debug daemonset to get into a pod in the same namespace on the same node and I can run dd on the iscsi pvc that qnap created. I think the issue lies with the pod securityContext. By default talos security policy prevents privileged escalation in the pod but can be overridden with a namespace annotation and adding the capabilites https://www.talos.dev/v1.7/kubernetes-guides/configuration/pod-security/ I have the annotation on the qnap-trident namespace but I cannot change the pod securityContext set but the qnap-trident operator. |
@davidcheng0716 I just re-read you comment and looked at the debug-tools dockerfile and you are correct. It is installing dd into the pod. My apologies. The node won't have dd. It's the very bare minimum so anything the pod needs it must provide. |
@Shanna-chen Why did you close this? Issue is not completed or fixed. |
Sorry, I closed it by mistake. I will reopen it to continue evaluating this issue. |
Latest QTS5 version
Logs from trident controller don't appear to have anything wrong
trident-node-linux logs have errors
The text was updated successfully, but these errors were encountered: