Skip to content
This repository has been archived by the owner on Dec 5, 2017. It is now read-only.

linux/fs isolator on slaves is incompatible with k8s-mesos #799

Open
jdef opened this issue Apr 8, 2016 · 2 comments
Open

linux/fs isolator on slaves is incompatible with k8s-mesos #799

jdef opened this issue Apr 8, 2016 · 2 comments

Comments

@jdef
Copy link

jdef commented Apr 8, 2016

  • the isolator will be enabled by default in DCOS 1.7
  • the isolator is incompatible with volume management as implemented by kubelet
    • kubelet expects to manage the mount namespace of the host
    • linux/fs isolator clones the hosts mount namespace, child namespace is a slave of the host
      • this breaks k8s volume management

xref d2iq-archive/universe#379

@thebennos
Copy link

how can we help?

@jdef
Copy link
Author

jdef commented Jul 19, 2016

I'd start with support for the kubelet's --containerized flag. The docs
say that it's still experimental, so I'm not sure what's working vs. not.
Using --containerized requires that nsenter is present and in the
kubelet's PATH. It's used for creating files on the host FS and for
mounting volumes. Once the flag is in place and nsenter is available to the
kubelet-executor you can test that (volume-based) secrets still work.

On Tue, Jul 19, 2016 at 7:18 AM, Benjamin [email protected] wrote:

how can we help?


You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub
#799 (comment),
or mute the thread
https://github.com/notifications/unsubscribe-auth/ACPVLJT1sNI1EAPsIufr3GCBh78yiQIhks5qXLKKgaJpZM4IDem9
.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

2 participants