New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
sgdisk "rook-discover" run without permission #9493
Labels
Comments
leseb
added a commit
to leseb/rook
that referenced
this issue
Jan 3, 2022
So that the tool inside the container have the permission to run correctly, e.g: sgdisk. Clsoes: rook#9493 Signed-off-by: Sébastien Han <seb@redhat.com>
leseb
added a commit
to leseb/rook
that referenced
this issue
Jan 3, 2022
So that the tool inside the container has the permission to run correctly, e.g: sgdisk. Clsoes: rook#9493 Signed-off-by: Sébastien Han <seb@redhat.com>
This was referenced Jan 3, 2022
parth-gr
pushed a commit
to parth-gr/rook
that referenced
this issue
Feb 22, 2022
So that the tool inside the container has the permission to run correctly, e.g: sgdisk. Clsoes: rook#9493 Signed-off-by: Sébastien Han <seb@redhat.com>
parth-gr
pushed a commit
to parth-gr/rook
that referenced
this issue
Feb 22, 2022
So that the tool inside the container has the permission to run correctly, e.g: sgdisk. Clsoes: rook#9493 Signed-off-by: Sébastien Han <seb@redhat.com>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Running in rook-discover "sgdisk --print /dev/vdb" prompts that there is no root permission, and DaemonSet yaml needs to set "securityContext.runAsUser:0", otherwise I cannot automatically discover the hard disk !
The text was updated successfully, but these errors were encountered: