openshift.io/scc is "restricted" for app1-45-3blnd (not running as root).
It also has that value for app5-36-2rfsq (running as root).

On Mon, Feb 6, 2017 at 1:11 PM, Clayton Coleman <ccole...@redhat.com> wrote:

> Were those apps created in order?  Or at individual times?   If you did
> the following order of actions:
>
> 1. create app2, app4
> 2. grant the default service account access to a higher level SCC
> 3. create app1, app3, app5, and app6
>
> Then this would be what I would expect.  Can you look at the annotations
> of pod app1-45-3blnd and see what the value of "openshift.io/scc" is?
>
>
> On Mon, Feb 6, 2017 at 1:57 PM, Alex Wauck <alexwa...@exosite.com> wrote:
>
>> OK, this just got a lot more interesting:
>>
>> $ oc -n some-project exec app1-45-3blnd -- id
>> uid=0(root) gid=0(root) groups=0(root),1(bin),2(daemon
>> ),3(sys),4(adm),6(disk),10(wheel),11(floppy),20(dialout),
>> 26(tape),27(video),1000370000
>> $ oc -n some-project exec app2-18-q2fwm -- id
>> uid=1000370000 gid=0(root) groups=1000370000
>> $ oc -n some-project exec app3-10-lhato -- id
>> uid=0(root) gid=0(root) groups=0(root),1(bin),2(daemon
>> ),3(sys),4(adm),6(disk),10(wheel),11(floppy),20(dialout),
>> 26(tape),27(video),1000370000
>> $ oc -n some-project exec app4-16-dl2r7 -- id
>> uid=1000370000 gid=0(root) groups=1000370000
>> $ oc -n some-project exec app5-36-2rfsq -- id
>> uid=0(root) gid=0(root) groups=0(root),1000370000
>> $ oc -n some-project exec app6-15-078fd -- id
>> uid=0(root) gid=0(root) groups=0(root),1000370000
>>
>> All of these pods are running on the same node, and as you can see, they
>> are in the same project.  Yet, some are running as root and some are not.
>> How weird is that?
>>
>> On Mon, Feb 6, 2017 at 12:49 PM, Alex Wauck <alexwa...@exosite.com>
>> wrote:
>>
>>> $ oc export -n some-project pod/good-pod | grep serviceAccount
>>>   serviceAccount: default
>>>   serviceAccountName: default
>>> $ oc export -n some-project pod/bad-pod | grep serviceAccount
>>>   serviceAccount: default
>>>   serviceAccountName: default
>>>
>>> Same serviceAccountName.  This problem seems to happen with any pod from
>>> any project that happens to run on these newer nodes.  I examined the
>>> output of `oc describe scc`, and I did not find any unexpected access to
>>> elevated privileges for a default serviceaccount.  The project were I'm
>>> currently seeing the problem is not mentioned at all.  Also, I've seen the
>>> problem happen with pods that are managed by the same replication
>>> controller.
>>>
>>> On Mon, Feb 6, 2017 at 12:46 PM, Clayton Coleman <ccole...@redhat.com>
>>> wrote:
>>>
>>>> Adding the list back
>>>>
>>>> ---------- Forwarded message ----------
>>>> From: Clayton Coleman <ccole...@redhat.com>
>>>> Date: Mon, Feb 6, 2017 at 1:42 PM
>>>> Subject: Re: Pods randomly running as root
>>>> To: Alex Wauck <alexwa...@exosite.com>
>>>> Cc: users <us...@redhat.com>
>>>>
>>>>
>>>> Do the pods running as root and not have the same serviceAccountName
>>>> field or different ones?  IF different, you may have granted the service
>>>> account access to a higher role - defaulting is determined by the SCC's
>>>> that a service account can access, so an admin level service account will
>>>> run as root by default unless you specify you don't want that.
>>>>
>>>> On Mon, Feb 6, 2017 at 1:37 PM, Alex Wauck <alexwa...@exosite.com>
>>>> wrote:
>>>>
>>>>> I'm looking at two nodes where one has the problem and the other
>>>>> doesn't, and I have confirmed that their node-config.yaml is the same for
>>>>> both (modulo IP addresses).  The generated kubeconfigs for these nodes on
>>>>> the master are also the same (modulo IP addresses and keys/certs).
>>>>>
>>>>> On Mon, Feb 6, 2017 at 10:46 AM, Alex Wauck <alexwa...@exosite.com>
>>>>> wrote:
>>>>>
>>>>>> Oh, wait.  I was looking at the wrong section.  The non-root pod as a
>>>>>> runAsUser attribute, but the root pod doesn't!
>>>>>>
>>>>>> On Mon, Feb 6, 2017 at 10:44 AM, Alex Wauck <alexwa...@exosite.com>
>>>>>> wrote:
>>>>>>
>>>>>>> A pod that IS running as root have this:
>>>>>>>
>>>>>>>   securityContext:
>>>>>>>     fsGroup: 1000370000
>>>>>>>     seLinuxOptions:
>>>>>>>       level: s0:c19,c14
>>>>>>>
>>>>>>> Another pod in the same project that is NOT running as root has the
>>>>>>> exact same securityContext section.
>>>>>>>
>>>>>>> On Mon, Feb 6, 2017 at 10:25 AM, Clayton Coleman <
>>>>>>> ccole...@redhat.com> wrote:
>>>>>>>
>>>>>>>> Do the pods themselves have a user UID set on them?  Each pod
>>>>>>>> should have the container "securityContext" field set and have an 
>>>>>>>> explicit
>>>>>>>> user ID value set.
>>>>>>>>
>>>>>>>> On Mon, Feb 6, 2017 at 11:23 AM, Alex Wauck <alexwa...@exosite.com>
>>>>>>>> wrote:
>>>>>>>>
>>>>>>>>> These are completely normal app containers.  They are managed by
>>>>>>>>> deploy configs.  Whether they run as root or not seems to depend on 
>>>>>>>>> which
>>>>>>>>> node they run on: the older nodes seem to run pods as random UIDs, 
>>>>>>>>> while
>>>>>>>>> the newer ones run as root.  Our older nodes have 
>>>>>>>>> docker-selinux-1.10.3
>>>>>>>>> installed, while the newer ones do not.  They only have
>>>>>>>>> docker-selinux-1.9.1 available, since the 1.10.3 package seems to 
>>>>>>>>> have been
>>>>>>>>> removed from the CentOS extras repo.
>>>>>>>>>
>>>>>>>>> We are running OpenShift 1.2.1, since I haven't had time to
>>>>>>>>> upgrade it.
>>>>>>>>>
>>>>>>>>> On Mon, Feb 6, 2017 at 8:31 AM, Clayton Coleman <
>>>>>>>>> ccole...@redhat.com> wrote:
>>>>>>>>>
>>>>>>>>>> Are you running them directly (launching a pod)?  Or running them
>>>>>>>>>> under another controller resource.
>>>>>>>>>>
>>>>>>>>>> On Feb 6, 2017, at 2:00 AM, Alex Wauck <alexwa...@exosite.com>
>>>>>>>>>> wrote:
>>>>>>>>>>
>>>>>>>>>> Recently, I began to notice that some of my pods on OpenShift run
>>>>>>>>>> as root instead of a random UID.  There does not seem to be any 
>>>>>>>>>> obvious
>>>>>>>>>> cause (e.g. SCC).  Any idea how this could happen or where to look 
>>>>>>>>>> for
>>>>>>>>>> clues?
>>>>>>>>>>
>>>>>>>>>>
>>>>
>>>
>>>
>>> --
>>>
>>> Alex Wauck // DevOps Engineer
>>>
>>> *E X O S I T E*
>>> *www.exosite.com <http://www.exosite.com/>*
>>>
>>> Making Machines More Human.
>>>
>>>
>>
>>
>> --
>>
>> Alex Wauck // DevOps Engineer
>>
>> *E X O S I T E*
>> *www.exosite.com <http://www.exosite.com/>*
>>
>> Making Machines More Human.
>>
>>
>


-- 

Alex Wauck // DevOps Engineer

*E X O S I T E*
*www.exosite.com <http://www.exosite.com/>*

Making Machines More Human.
_______________________________________________
users mailing list
users@lists.openshift.redhat.com
http://lists.openshift.redhat.com/openshiftmm/listinfo/users

Reply via email to