-
Notifications
You must be signed in to change notification settings - Fork 717
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cannot create Kibana with the pod security policy "readOnlyRootFilesystem=true" #4022
Comments
I think you are right about the path. I am curious to know how you manage to run Elasticsearch with |
@chingis-elastic
Yes. And my colleagues(@tapih and @zoetrope) did report the problem with Elasticsearch in #2108 |
I think the description of the problem in #2108 is still applicable. I can't see a good way of completely avoiding the root filesystem with Elasticsearch deployments. |
I also ran into the same issues trying to get Elasticsearch and Kibana to run with a ReadOnlyRootFilesystem enabled.
assuming the extra mount is at |
Bug Report
What did you do?
I try to deploy Kibana using ECK 1.2.1.
What did you expect to see?
The Kibana is deployed successfully.
What did you see instead? Under which circumstances?
The initContainer of Kibana get failed due to the pod security policy of
readOnlyRootFilesystem=true
.Environment
ECK version:
1.2.1 (Commit ID: b531623 )
Kubernetes information:
Kibana CR
https://github.com/elastic/cloud-on-k8s/blob/1.2.1/pkg/controller/kibana/init_configuration.go#L20
The
elastic-internal-init-config.ok
file should be created inInitContainerConfigVolumeMountPath
.The text was updated successfully, but these errors were encountered: