在kubernetes statefulset中的elasticsearch数据目录上chown时权限被拒绝

时间:2017-09-21 18:39:02

标签: docker elasticsearch kubernetes

希望有人可以帮我解决看似权限错误的问题。我正在尝试使用官方的elasticsearch docker图像启动一个3节点的elasticsearch集群。当容器启动时,我从/ usr / share / elasticsearch / data / nodes上的elasticsearch收到“拒绝访问”错误,所以我尝试添加命令使elasticsearch成为/ usr / share / elasticsearch / data的所有者...但是当我包含chown命令时,我收到了这些错误:

chown: cannot read directory '/usr/share/elasticsearch/data/lost+found': Permission denied
chown: changing ownership of '/usr/share/elasticsearch/data': Operation not permitted

这是我的有状态yaml文件:

apiVersion: apps/v1beta1
kind: StatefulSet
metadata:
  name: esnode
spec:
  serviceName: elasticsearch-transport
  replicas: 3
  template:
    metadata:
      labels:
        app: evo-pro-cluster
    spec:
      initContainers:
      - name: init-sysctl
        image: busybox
        imagePullPolicy: IfNotPresent
        command: ["sysctl", "-w", "vm.max_map_count=262144"]
        securityContext:
          privileged: true
      containers:
      - name: elasticsearch
        securityContext:
          privileged: true
          capabilities:
            add:
            - IPC_LOCK
            - SYS_RESOURCE
        command: ["/bin/sh"]
        args: ["-c", "chown -R elasticsearch:elasticsearch /usr/share/elasticsearch/data"]
        image: docker.elastic.co/elasticsearch/elasticsearch:5.6.1
        imagePullPolicy: Always
        env:
        - name: "ES_JAVA_OPTS"
          value: "-Xms6g -Xmx6g"
        ports:
        - containerPort: 9200
          name: http
          protocol: TCP
        - containerPort: 9300
          name: transport
          protocol: TCP
        volumeMounts:
        - name: storage
          mountPath: /usr/share/elasticsearch/data
        - name: config
          mountPath: /usr/share/elasticsearch/config/elasticsearch.yml
          subPath: elasticsearch.yml
      volumes:
        - name: config
          configMap:
            name: elasticsearch-config
  volumeClaimTemplates:
  - metadata:
      name: storage
      annotations:
        storageClassName: standard
    spec:
      accessModes: [ "ReadWriteOnce" ]
      resources:
        requests:
          storage: 110Gi

1 个答案:

答案 0 :(得分:4)

此特定的docker镜像期望数据目录可由uid 2000写入。您可以通过添加.spec.securityContext.fsGroup告诉Kubernetes为您的pod的挂载点(类似):

apiVersion: apps/v1beta1
kind: StatefulSet
metadata:
  name: esnode
spec:
  ...
  securityContext:
    fsGroup: 2000

(当然你可以摆脱chown hack或initContainer)

  

fsGroup:integer:一个特殊的补充组,适用于pod中的所有容器。某些卷类型允许Kubelet更改该pod拥有的卷的所有权:1。拥有的GID将是FSGroup 2. setgid位已设置(卷中创建的新文件将由FSGroup拥有)3 。权限位与rw-rw进行OR运算----如果未设置,Kubelet将不会修改任何卷的所有权和权限。