-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
NET_ADMIN capability issue with linkerd --pre check #2884
Comments
Might be related (or possibly the same) as #2849. tl;dr though there are some psp resources in the k8s cluster, they aren't enforced because the psp admission controller isn't enabled. |
@chzbrgr71 mind sharing your PSP? |
I had not created any PSP's in my cluster. This is a vanilla AKS cluster. I did a quick check and found the below, but these were added after the error when I was doing some Prometheus testing.
|
The change in #2920 introduced a PodSecurityPolicy, providing `NET_ADMIN` capability to Linkerd. This eliminated the need for a `NET_ADMIN` capability check in `linkerd check`, as the default `linkerd install` now guarantees `NET_ADMIN` capability. At the same time, this added a requirement on that `linkerd install` create a PodSecurityPolicy. Remove the `NET_ADMIN` capability check from `linkerd check`. Introduce a check to validate the user can create a PodSecurityPolicy. Fixes #2884, #2849. Signed-off-by: Andrew Seigner <[email protected]>
The change in #2920 introduced a PodSecurityPolicy, providing `NET_ADMIN` capability to Linkerd. This eliminated the need for a `NET_ADMIN` capability check in `linkerd check`, as the default `linkerd install` now guarantees `NET_ADMIN` capability. At the same time, this added a requirement that `linkerd install` create a PodSecurityPolicy. Remove the `NET_ADMIN` capability check from `linkerd check`. Introduce a check to validate the user can create a PodSecurityPolicy. Fixes #2884, #2849. Signed-off-by: Andrew Seigner <[email protected]>
The change in #2920 introduced a PodSecurityPolicy, providing `NET_ADMIN` capability to Linkerd. This eliminated the need for a `NET_ADMIN` capability check in `linkerd check`, as the default `linkerd install` now guarantees `NET_ADMIN` capability. At the same time, this added a requirement that `linkerd install` create a PodSecurityPolicy. Remove the `NET_ADMIN` capability check from `linkerd check`. Introduce a check to validate the user can create a PodSecurityPolicy. Fixes #2884, #2849. Signed-off-by: Andrew Seigner <[email protected]>
The change in #2920 introduced a PodSecurityPolicy, providing `NET_ADMIN` capability to Linkerd. This eliminated the need for a `NET_ADMIN` capability check in `linkerd check`, as the default `linkerd install` now guarantees `NET_ADMIN` capability. At the same time, this added a requirement that `linkerd install` create a PodSecurityPolicy. Remove the `NET_ADMIN` capability check from `linkerd check`. Introduce a check to validate the user can create a PodSecurityPolicy. Fixes #2884, #2849 Signed-off-by: Andrew Seigner <[email protected]>
`linkerd check` validates whether PSP's exist, and if the caller has the `NET_ADMIN` capability. This check was previously failing if `NET_ADMIN` was not found, even in the case where the PSP admission controller was not running. Related, `linkerd install` now includes a PSP, so `linkerd check` should also validate that the caller can create PSP's. Modify the `NET_ADMIN` check to warn, but not fail, if PSP's are found but the caller does not have `NET_ADMIN`. Update the warning message to mention that this is only a problem if the PSP admission controller is running (and will only be a problem during injection, since #2920 handles control plane installation by adding its own PSP). Also introduce a check to validate the caller can create PSP's. Fixes #2884, #2849 Signed-off-by: Andrew Seigner <[email protected]>
`linkerd check` validates whether PSP's exist, and if the caller has the `NET_ADMIN` capability. This check was previously failing if `NET_ADMIN` was not found, even in the case where the PSP admission controller was not running. Related, `linkerd install` now includes a PSP, so `linkerd check` should also validate that the caller can create PSP's. Modify the `NET_ADMIN` check to warn, but not fail, if PSP's are found but the caller does not have `NET_ADMIN`. Update the warning message to mention that this is only a problem if the PSP admission controller is running (and will only be a problem during injection, since #2920 handles control plane installation by adding its own PSP). Also introduce a check to validate the caller can create PSP's. Fixes #2884, #2849 Signed-off-by: Andrew Seigner <[email protected]>
Bug Report
What is the issue?
On a freshly installed cluster in AKS. Ran
linkerd check --pre
. All checks pass except for "pre-kubernetes-capability" See output below.FWIW, the linkerd install ends up working and seems to be functioning correctly.
How can it be reproduced?
Logs, error output, etc
linkerd check
outputEnvironment
Possible solution
Additional context
The text was updated successfully, but these errors were encountered: