You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Kubernetes version: 1.24.10
Cluster Type: Downstream - 1 node with three roles: etcd, cp and worker
The cluster is installed on Ubuntu 22.04 VM
User Information
When editing the system-upgrade-controller pod I noticed the /etc/ssl directory on the host is mounted to the container with read and write permissions.
I wonder if and why the write permissions are required by the system-upgrade-controller container, if read permissions would be enough. Is the system-upgrade-controller expected to modify the certificates inside /etc/ssl on the host? Ability to modify the certificates in /etc/ssl may cause potential threads.
The text was updated successfully, but these errors were encountered:
I changed the volumeMounts by adding readOnly: true on the deployment on our clusters
Only tmp hasn't been modified, as it doesn't have such a big impact, though, I'm still wondering if it's really necessary and if this can be replaced by an emptyDir volume instead. I might be wrong, i don't know, as I'm not a developer.
With this, our operating systems are still up to date using SUC.
As for upgrading k3s or other rancher distros with SUC, I can't tell you, as we are using RKE2 and manually updating them using rancher. Whished that rancher has autoupdate features...
Rancher Server Setup
Rancher v2.7.1, Kubernetes Version: v1.24.10, RKE2 v1.24.9+rke2r2.
Installation option: Helm
Information about the Cluster
Kubernetes version: 1.24.10
Cluster Type: Downstream - 1 node with three roles: etcd, cp and worker
The cluster is installed on Ubuntu 22.04 VM
User Information
When editing the system-upgrade-controller pod I noticed the /etc/ssl directory on the host is mounted to the container with read and write permissions.
I wonder if and why the write permissions are required by the system-upgrade-controller container, if read permissions would be enough. Is the system-upgrade-controller expected to modify the certificates inside /etc/ssl on the host? Ability to modify the certificates in /etc/ssl may cause potential threads.
The text was updated successfully, but these errors were encountered: