-
Notifications
You must be signed in to change notification settings - Fork 84
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Blob protocol=nfs and uncommon permissions #1769
Comments
the gid depends on securityContext setting, have you tried below example pod? blob-csi-driver/deploy/example/statefulset-nonroot-nfs.yaml Lines 16 to 19 in 54f7967
|
@andyzhangx thx for your feedback. We'd be very delighted if it would work just way. However, it does not!. According to docs there must be a special flag on the CSI driver, which seems not enabled on our cluster. Requirement: Implementation: |
I also used the managed blob csi driver with
|
Thx for your valuable feedback, highly appreciated. Questions that come to my mind:
chmod/chown in general is working but does not scale on a container with > 2.000.000 blobs in 750 directories. (it took az storage fs access set-recursive --acl 45 minutes to apply changes). I'll double check things on our side once more to see where it is failing |
The securityContext field in Kubernetes is used to specify security-related attributes for a container. In this case, the securityContext is being used to ensure that the container runs as a non-root user with a specific user ID and group ID. The runAsUser field specifies the user ID that the container should run as. In this case, the value is set to 10001, which means that the container will run as a user with the ID 10001. The runAsGroup field specifies the group ID that the container should run as. In this case, the value is set to 10001, which means that the container will run as a group with the ID 10001. The fsGroup field specifies the group ID that should be used for file system access checks. In this case, the value is set to 10001, which means that the container will have access to files and directories that are owned by the group with the ID 10001. By setting these fields in the securityContext, the container is being run with reduced privileges, which can help to improve the security of the overall system.
there is no difference
yes |
What happened:
What you expected to happen:
How to reproduce it:
create and use a phyiscal-volume in azure kubernetes with
storageClassName: azureblob-nfs-premium
protocol nfs
Anything else we need to know?:
Environment:
aks/kubernetes: v1.29.9
mcr.microsoft.com/oss/kubernetes-csi/livenessprobe:v2.14.0
mcr.microsoft.com/oss/kubernetes-csi/csi-node-driver-registrar:v2.12.0
mcr.microsoft.com/oss/kubernetes-csi/blob-csi:v1.23.9
The text was updated successfully, but these errors were encountered: