-
Notifications
You must be signed in to change notification settings - Fork 2.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cannot use sysctl in pod #12747
Comments
These worked for me?
I actually think this does not work the way I would expect. I would figure the sysctl should only work on the pod and not on the container. If these containers are in the same Pod, by default they are sharing the network namespace. So setting this field for each container would alter it for the other containers, which potentially could cause unexpected behaviour. @cdoern Could you add --syscall support to podman pod create? |
It worked after reinstalling the os, and I don’t know why |
Reopening to implement on the pod level |
so @rhatdan just to clarify, this is something that only needs to be set in infra, not passed down on a container by container basis? Currently working on this and running into some namespace issues upon implementation |
added support for pod wide sysctls. The sysctls supported are the same as the continer run controls. These controls are only valid if the proper namespaces are shared within the pod, otherwise only the infra ctr gets the sysctl resolves containers#12747 Signed-off-by: cdoern <cdoern@redhat.com>
added support for pod wide sysctls. The sysctls supported are the same as the continer run controls. These controls are only valid if the proper namespaces are shared within the pod, otherwise only the infra ctr gets the sysctl resolves containers#12747 Signed-off-by: cdoern <cdoern@redhat.com>
Correct, the containers will not be allowed to do this. |
/kind bug
Cannot use sysctl.net.ipv4.ip_unprivileged_port_start in pod
Steps to reproduce the issue:
Describe the results you received:
foobar1
foobar2
Error: open /proc/sys/net/ipv4/ip_unprivileged_port_start: Permission denied: OCI permission denied
Describe the results you expected:
foobar1
foobar2
foobar3
Additional information you deem important (e.g. issue happens only occasionally):
The cause of the problem is "--pod".
Output of
podman version
:Output of
podman info --debug
:Package info (e.g. output of
rpm -q podman
orapt list podman
):Have you tested with the latest version of Podman and have you checked the Podman Troubleshooting Guide? (https://github.com/containers/podman/blob/master/troubleshooting.md)
Yes
Additional environment details (AWS, VirtualBox, physical, etc.):
physical/fedora35 amd64
The text was updated successfully, but these errors were encountered: