Skip to content
This repository has been archived by the owner on Feb 5, 2020. It is now read-only.

Mount iscsiadm and configuration in kubelet container #2022

Closed
wants to merge 1 commit into from

Conversation

cehoffman
Copy link

@cehoffman cehoffman commented Sep 29, 2017

In order to use iscsi volumes, the kubelet container needs access to iscsiadm and configuration.

This solution is referenced in coreos/coreos-kubernetes#481. There also appears to be a bug with stable at least. The documentation states that /etc/iscsi/initiatorname.iscsi is automatically created and filled with a unique name, but this is not my experience. For these changes to be useful, that file needs to be created with a unique name. I am doing that as part of the ignition configuration now, but did not include it here incase it should be fixed in an upstream dependency of Tectonic.

@coreosbot
Copy link

Can one of the admins verify this patch?

4 similar comments
@coreosbot
Copy link

Can one of the admins verify this patch?

@coreosbot
Copy link

Can one of the admins verify this patch?

@coreosbot
Copy link

Can one of the admins verify this patch?

@coreosbot
Copy link

Can one of the admins verify this patch?

@redbaron
Copy link

redbaron commented Dec 7, 2017

/etc/iscsi/initiatorname.iscsi is autogenerated with a value derived from machine-id by a iscsid-initiatorname.service, which is itself started by iscsid.service.

@cehoffman
Copy link
Author

@redbaron correct, I found this out once I enabled iscsid. I had forgotten to update this. The initiatorname isn't any issue like I had originally thought.

@redbaron
Copy link

redbaron commented Dec 7, 2017

I used changes from this PR to sucessfully mount iscsi volumes, don't why it is still not merged

@sym3tri
Copy link
Contributor

sym3tri commented Feb 5, 2018

@crawford @aaronlevy any opposition to this change?

@crawford
Copy link
Contributor

crawford commented Feb 6, 2018

@sym3tri seems fine.

@aaronlevy
Copy link
Contributor

I'm not super exited about a binary from host being used in the kubelet container (my comment is pretty dated at this point - but is it safe enough to assume libc on host == libc in hyperkube container?)

Is there a reason the binary can't be shipped as part of hyperkube (rather than relying on a copy mounted from host?)

Should we maybe consider documenting using a systemd drop-in to add extra flags to the args passed to kubelet-wrapper?

@cehoffman
Copy link
Author

@aaronlevy I think documenting a the drop-in would be nice. There are a few other reasons one might one to extend the rkt args for kubelet. For example, I do it to mount a preloaded docker auth file for access to a private container registry.

@sym3tri
Copy link
Contributor

sym3tri commented Jun 13, 2018

Thanks for this contribution, but we're not adding any new features to this repo at this time. We're converging Tectonic with a future release of Open Shift. We'll keep this request in mind as we integrate the products.

See our blog post for more info: https://coreos.com/blog/coreos-tech-to-combine-with-red-hat-openshift

@sym3tri sym3tri closed this Jun 13, 2018
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants