-
Notifications
You must be signed in to change notification settings - Fork 90
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Systemd checks report issue in Ubuntu image #417
Comments
@joel-bluedata are you looking at this already? @Vellanci and I were going to look at this also. Let us know. |
According to my findings Systemd doesn't work in containers out of box. One way of fixing it is by adding cgroup mount and making it privileged. Another one way is by adding more tmpfs mounts (for /run, /run/lock) and allowing it to be unprivileged. For kubernetes it can implemented by using emptyDir and localPath mounts. Also Dockerfile should install systemd and couple of env vars. I managed to get it working with simple kubernetes pod. I will continue investigation on how to do it with KD. |
Adding @swamibluedata for visibility |
I noticed "systemdRequired" that implements the unprivileged way I mentioned before. Apart from mount points created by this feature, for Ubuntu Systemd /run/lock is also required to be mounted. Also current ubuntu image doesn't run systemd as PID 1 (entrypoint) process. |
I managed to solve the issue with two changes:
|
…ystemd versions)
#417 Add /run/lock as default tmpfs mount (required by newer Systemd versions)
The Ubuntu image systemd check returns an error, preventing KD appconfig packages from working.
For more info: #415
The text was updated successfully, but these errors were encountered: