-
Notifications
You must be signed in to change notification settings - Fork 521
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow rootless containers to bind privileged ports and ping #2466
Comments
Hi, The workaround works and we could also use a different port, but that means changing the manifests. More context: We have to switch to containerd in the future and we can do this without breaking changes to our clients with AL2. But we cannot with Bottlerocket unless we can change the sysctl |
Thanks for the extra context! Another option here is to set these sysctls with Based on your example above, it would look something like:
|
From the admin container:
From a pod:
|
Good point. There is an issue in the Perhaps we can look into enabling these by default. |
The comments on the related |
What I'd like:
Add config options to allow containers to bind privileged ports (<1024) and open icmp echo sockets without being root. (This the defaults with dockerd)
It can be enabled within containerd config (/etc/containerd/config.toml).
For kubernetes:
Any alternatives you've considered:
This can be worked around with kubernetes (>1.22) with a SecurityContext on pods:
It can also be configured within a bootstrap container but I'm not sure how to restart containerd from there.
The text was updated successfully, but these errors were encountered: