-
Notifications
You must be signed in to change notification settings - Fork 199
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Insufficient permissions on volume for non-root containers #901
Comments
I was able to reproduce the issue with the |
/assign |
this issue could be related to fsGroupPolicy, which is only supported from 1.20, and you need to run following command to support fsGroupPolicy: https://github.com/kubernetes-sigs/azuredisk-csi-driver/tree/master/deploy/example/fsgroup#option2-enable-fsgrouppolicy-support-on-a-cluster-with-csi-driver-already-installed When minimum supported k8s version is 1.20, we will enable fsGroupPolicy feature by default. |
@andyzhangx Thanks! Enabling fsGroupPolicy also worked for me. |
Thank you @edreed , @andyzhangx I confirm that both enabling |
What happened:
Pods crash at start because it can't create files in the new PVC.
I'm able to make the pod work by manually create a temporary pod, mounting, create files and changing ownership.
What you expected to happen:
I expect that the new CSI provisionner can work as a drop-in replacement of the kubernetes.io/azure-disk provisionner.
How to reproduce it:
Create a new cluster with aks version 1.21.1.
Anything else we need to know?:
Environment:
kubectl version
):Server Version: version.Info{Major:"1", Minor:"21", GitVersion:"v1.21.1", GitCommit:"ca992926ba9f76abd853859a64b5b04a1b562362", GitTreeState:"clean", BuildDate:"2021-05-19T22:29:12Z", GoVersion:"go1.16.4", Compiler:"gc", Platform:"linux/amd64"}
uname -a
):The text was updated successfully, but these errors were encountered: