-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
kind in dind under sysbox not working after upgrade to kind
v0.11.1
#2490
Comments
kind
0.11.1kind
v0.11.1
We don't currently support sysbox ... #1772 has not seen any contributions and I don't think any of us maintainers have the bandwidth for this at the moment. In order to support rootless properly (see guide: https://kind.sigs.k8s.io/docs/user/rootless/) we currently require cgroups v2. |
I don't think sysbox is the point here, and I never meant to use kind as rootless. As said, in 0.10.0 it worked, so perhaps the detection of rootless is broken. For example, if cgroup v2 is not available, kind could fallback to not use rootless at all. Sysbox is just the simplest way to create an environment where the issue can be replicated. |
Furthermore, the issue referenced talks about using Sysbox as container runtime for creating kind clusters instead of the normal |
But we are not developing with sysbox, and don't have time to do so, which is my point. (and nobody else has contributed anything related so far). Sysbox does alter the environment quite a bit. Currently we've not seen this issue outside sysbox. Enabling userns and NOT running rootless docker is esoteric to the point that we've not had any reports up until this point. |
@BenTheElder, the problem is not Sysbox specific ... The same issue is probably seen in all those scenarios where a rootfull runtime creates an I think the current entrypoint logic should not couple the unprivileged-user-ns execution with the Hope that makes sense.
|
/cc @AkihiroSuda |
Left a comment in https://github.com/kubernetes-sigs/kind/pull/2492/files#r725882283 |
@AkihiroSuda, makes perfect sense to me. |
docker / podman in-LXD is also an unusual / unsupported environment that nobody [in our ecosystem] testing. I would call LXD + kind quite esoteric. Let me be a bit clearer: I have no intention to block any fixes and welcome any patches: but there should be no expectation that this environment will work in the future, we're not testing it and don't have the bandwidth to do so, we're barely keeping up with the existing support.
Sure, but, this is just one specific problem. Any future problems for these environments will stem from the same root issue: We are not and do not plan to test them, and until now have received no contributions related to them. |
@BenTheElder, I understand. We will keep an eye on KinD-over-Sysbox scenarios and report/fix any issues that may arise. Thanks. |
Thank you all a lot! |
What happened:
After upgrading to
kind
0.11.1 from 0.10.0,kind create cluster
does not work anymore.What you expected to happen:
To work, as it worked before the upgrade.
How to reproduce it (as minimally and precisely as possible):
I'm using Sysbox as my container runtime.
kind create cluster
Anything else we need to know?:
Environment:
References nestybox/sysbox#410
The text was updated successfully, but these errors were encountered: