-
Notifications
You must be signed in to change notification settings - Fork 91
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Lack of fsGroup in ClusterLogging CRD. #245
Comments
This was done by design to remove any volume specific configurations. The recommended fix for this is to create a different storageClass for Elasticsearch to use and specify that on your CR. The out of the box |
Hey, |
Issues go stale after 90d of inactivity. Mark the issue as fresh by commenting If this issue is safe to close now please do so with /lifecycle stale |
Stale issues rot after 30d of inactivity. Mark the issue as fresh by commenting If this issue is safe to close now please do so with /lifecycle rotten |
Rotten issues close after 30d of inactivity. Reopen the issue by commenting /close |
@openshift-bot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Hey,
It looks like CRD of ClusterLogging does not allow us to define
fsGroup
(https://docs.openshift.com/enterprise/3.1/install_config/persistent_storage/pod_security_context.html#fsgroup).It huge gap due to the fact that by default CSI creates volume with root as owner whereas the user used inside elasticsearch container is created with uid: 1000. It means that all clusters, deployed with storageClass provided by CSI will raise the following error:
due to the insufficient privileges on PV.
The text was updated successfully, but these errors were encountered: