-
Notifications
You must be signed in to change notification settings - Fork 547
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Can't dynamic create PersistentVolume after PVC created. Operation not permitted #904
Comments
looks like to be a user permission issue, either you might have specified wrong user keyring in secret or the user cap is not enough to perform rados operations. can you try with below user caps
@nixpanic do you see any other issue? |
Hi Madhu, we also tried profile rbd and its not working, its not a permission issue on ceph. We can manually create volumes in the rbd pool and do all listing operations with they keyring provided for kubernetes flawless, also tested inside one of the csi provisioning containers. The interessting thing is i dont even see the requests in the monitor logs when it complains about operation not permitted |
@flyersa can you give a try with admin credentials? I just wanted to check is it a permission issue or the ceph-csi issue. why am I asking because we have E2E runs on each PR I don't see any issue with cephcsi code. if its an issue please provide csi-rbdplugin container logs we can take a look at it. |
and also provide the cephcsi version you are using |
@Madhu-1 about version with admin creds works
but not with
but I can create Volume with this creds from CLI in container and I can create PV from Rancher UI also with simple user not admin |
the permissions are now exactly 1:1 the same as admin creds on client.kubernetes
so something wrong with csi defiantly |
instead of canary can you try release cephcsi version ie 2.0.0 or 2.0.1 |
means you are saying pvc creation is working with admin credentials?
create PV from rancher UI? do you mean create PVC? |
@drweber i had same problem,i exec kubectl describe pvc ,founded error infomation |
Looks like we are hitting this issue if we use any other user than admin
@nixpanic PTAL |
This is happening with canary image, @drweber @luhailiang0527 please use released ceph-csi version |
This errors comes from pkg/rbd/rbd_util.go#L179:
That means the However, the From this, I think it is a bug in go-ceph. |
Updated E2E to use a normal user other than admin user, who is having access to create and mount cephfs PVC and create and map rbd PVC we will use the user created by rook who is having above access. Signed-off-by: Madhu Rajanna [email protected] This PR adds a test case for ceph#904 Signed-off-by: Madhu Rajanna <[email protected]>
Hi @drweber, @flyersa and @luhailiang0527 could you try the following testing image? |
@nixpanic as a reminder the go-ceph code prints the absolute value of the "errno" in the error, so I'm not as confident that its a bug. But please do file a go-ceph issue if your altered container reveals its a problem with the error handling. |
@phlogistonjohn the error case in |
Oh yes, that's true and we can certainly change that. But skimming some of the ceph sources I don't see an obvious path where this function would return |
looks like adding fixe issue
and now it
example of yaml was taken from manual and later updated from and image |
Looking into this more, with #919 it is easier to reproduce. The cephcsi:testing_issue_904 image is based on the master branch ( Using the The code under |
Use the Credentials.ID in combination with the keyfile to connect to the Ceph cluster. This makes it possible to use different users for different tasks on the cluster. Fixes: ceph#904 Signed-off-by: Niels de Vos <[email protected]>
Updated E2E to use a normal user other than admin user, who is having access to create and mount cephfs PVC and create and map rbd PVC we will use the user created by rook who is having above access. Signed-off-by: Madhu Rajanna [email protected] This PR adds a test case for ceph#904 Signed-off-by: Madhu Rajanna <[email protected]>
Use the Credentials.ID in combination with the keyfile to connect to the Ceph cluster. This makes it possible to use different users for different tasks on the cluster. Fixes: ceph#904 Signed-off-by: Niels de Vos <[email protected]>
Updated E2E to use a normal user other than admin user, who is having access to create and mount cephfs PVC and create and map rbd PVC we will use the user created by rook who is having above access. Signed-off-by: Madhu Rajanna [email protected] This PR adds a test case for ceph#904 Signed-off-by: Madhu Rajanna <[email protected]>
Updated E2E to use a normal user other than admin user, who is having access to create and mount cephfs PVC and create and map rbd PVC we will use the user created by rook who is having above access. Signed-off-by: Madhu Rajanna [email protected] This PR adds a test case for ceph#904 Signed-off-by: Madhu Rajanna <[email protected]>
Use the Credentials.ID in combination with the keyfile to connect to the Ceph cluster. This makes it possible to use different users for different tasks on the cluster. Fixes: ceph#904 Signed-off-by: Niels de Vos <[email protected]>
Updated E2E to use a normal user other than admin user, who is having access to create and mount cephfs PVC and create and map rbd PVC we will use the user created by rook who is having above access. Signed-off-by: Madhu Rajanna [email protected] This PR adds a test case for ceph#904 Signed-off-by: Madhu Rajanna <[email protected]>
Use the Credentials.ID in combination with the keyfile to connect to the Ceph cluster. This makes it possible to use different users for different tasks on the cluster. Fixes: #904 Signed-off-by: Niels de Vos <[email protected]>
Updated E2E to use a normal user other than admin user, who is having access to create and mount cephfs PVC and create and map rbd PVC we will use the user created by rook who is having above access. Signed-off-by: Madhu Rajanna [email protected] This PR adds a test case for #904 Signed-off-by: Madhu Rajanna <[email protected]>
Yes, even this issue is not present in 2.0.1 or 2.0.0 release |
quay.io/cephcsi/cephcsi v3.1.0 docker image explain: [root@master01 ceph-csi]# git branch
[root@master01 ceph-csi]# |
Hello everyone. I've got issue with CEPH
I have:
v2.3.5
:3 etcd, 2 controplane, 10 workernodes
etcd and controlplane have inly Internal NIC
workernodes have 3 NICs: Internal (internal access only), External (public access), Storage (for CEPH access)
1.16.7
in CEPH configuration
after apply:
in csi-provisioner :
I can create PersistentVolume in Rancher UI and attach to created StorageClass and it shown as created by external provisioner
rbd.csi.ceph.com
Network connection is ok, credentials work
kubectl run ceph-test --image=ceph/ceph:v15.2 --restart=Never -n default
:The text was updated successfully, but these errors were encountered: