You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
lrwxrwxrwx. 1 root root 13 Dec 11 12:29 ca.crt -> ..data/ca.crt
lrwxrwxrwx. 1 root root 14 Dec 11 12:29 tls.crt -> ..data/tls.crt
lrwxrwxrwx. 1 root root 14 Dec 11 12:29 tls.key -> ..data/tls.key
cat: /certs/ca.crt: Permission denied
Copied /certs/ca.crt to /tmp/ca.crt
cat: /certs/tls.crt: Permission denied
Copied /certs/tls.crt to /tmp/tls.crt
cat: /certs/tls.key: Permission denied
Copied /certs/tls.key to /tmp/tls.key
All files have been copied.
Additional information
when sysctlImage.enabled: true is set on OCP the privilege SCC must be provided otherwise the ES initcontainer sysctl cannot be executed.
But granting scc privileged on the OCP level will mount the certs folder with uid 0.
volumePermissions:
enabled: true
does not help
The text was updated successfully, but these errors were encountered:
Bitnami containers are designed to operate as non-root by default. Consequently, any files or directories used by the application should be owned by the root group, as the random user (1001 by default) is a member of this root group. To ensure proper permissions, you'll need to adjust the ownership of your local directory accordingly.
For more comprehensive information about non-root containers and their significance for security, you can explore the following resources:
hi @carrodher thanks, for the additional documentation I've already reviewed most of them (before opening this issue), and it seems there is a sort of mutual exclusion between sysctlImage.enabled: true that requires root permission and copyTls initcontainer that cannot be executed if the tls secret is mounted with uid
Name and Version
bitnami/elasticsearch 21.3.18
What architecture are you using?
amd64
What steps will reproduce the bug?
fresh install in ocp with autogenerated tls and sysctlImage enabled
Are you using any custom parameters or values?
What is the expected behavior?
The TLS certs are copied without problems
What do you see instead?
Additional information
when
sysctlImage.enabled: true
is set on OCP the privilege SCC must be provided otherwise the ES initcontainer sysctl cannot be executed.But granting scc privileged on the OCP level will mount the
certs
folder with uid 0.does not help
The text was updated successfully, but these errors were encountered: