Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Is this operator capable of setting sebools? #89

Closed
tylerauerbeck opened this issue Oct 29, 2019 · 7 comments
Closed

Is this operator capable of setting sebools? #89

tylerauerbeck opened this issue Oct 29, 2019 · 7 comments
Labels
lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed.

Comments

@tylerauerbeck
Copy link

I have a workload that requires enabling container_manage_cgroup which traditionally I would do by logging onto the system and running setsebool container_manage_cgroup 1. I was hoping to be able to do this with this operator as well as I see it's capable of interacting with selinux. However my attempts so far have been unsuccessful. I've tried adding the following to the tuned-profiles configmap:

    openshift-node: |
      [main]
      summary=Optimize systems running OpenShift nodes
      include=openshift

      [sysctl]
      net.ipv4.tcp_fastopen=3
      fs.inotify.max_user_watches=65536

      [selinux]
      container_manage_cgroup=1

I've also tried setting container_manage_cgroup to true and yes just to try all the options, but still didn't have any luck. Is this possible through this operator? Is there a seperate/better way of handling this? Or is there anything that I need to do after modifying so that this gets put in place?

@jmencak
Copy link
Contributor

jmencak commented Nov 7, 2019

Thank you for the report and sorry for the delay in response. This is a valid issue. Currently the [selinux] plugin is not supported.

@jmencak
Copy link
Contributor

jmencak commented Nov 7, 2019

So I was confused for a moment. Looking more into the sources of the tuned daemon's [selinux] plugin, it has nothing to do with actually setting SELinux booleans. It only tunes the values in /sys/fs/selinux/, avc_cache_threshold in particular. So to answer your question, this operator cannot set sebools.

@tylerauerbeck
Copy link
Author

Thanks @jmencak . For others interested in this, it looks like the plan is to handle it here: openshift/machine-config-operator#852 and looks to be blocked by ostreedev/ostree#1026

@openshift-bot
Copy link
Contributor

Issues go stale after 90d of inactivity.

Mark the issue as fresh by commenting /remove-lifecycle stale.
Stale issues rot after an additional 30d of inactivity and eventually close.
Exclude this issue from closing by commenting /lifecycle frozen.

If this issue is safe to close now please do so with /close.

/lifecycle stale

@openshift-ci-robot openshift-ci-robot added the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Sep 21, 2020
@openshift-bot
Copy link
Contributor

Stale issues rot after 30d of inactivity.

Mark the issue as fresh by commenting /remove-lifecycle rotten.
Rotten issues close after an additional 30d of inactivity.
Exclude this issue from closing by commenting /lifecycle frozen.

If this issue is safe to close now please do so with /close.

/lifecycle rotten
/remove-lifecycle stale

@openshift-ci-robot openshift-ci-robot added lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed. and removed lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. labels Oct 22, 2020
@openshift-bot
Copy link
Contributor

Rotten issues close after 30d of inactivity.

Reopen the issue by commenting /reopen.
Mark the issue as fresh by commenting /remove-lifecycle rotten.
Exclude this issue from closing again by commenting /lifecycle frozen.

/close

@openshift-ci-robot
Copy link
Contributor

@openshift-bot: Closing this issue.

In response to this:

Rotten issues close after 30d of inactivity.

Reopen the issue by commenting /reopen.
Mark the issue as fresh by commenting /remove-lifecycle rotten.
Exclude this issue from closing again by commenting /lifecycle frozen.

/close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed.
Projects
None yet
Development

No branches or pull requests

4 participants