Hi all,
we have an issue concerning the restricted-v2 fsGroup assignment in OpenShift. Following error message is displayed when Installing Camunda on OpenShift with Helm Chart Version 8.1.6 (following Running Camunda 8 on OpenShift | Camunda:
create Pod elasticsearch-master-0 in StatefulSet elasticsearch-master failed error: pods "elasticsearch-master-0" is forbidden: unable to validate against any security context constraint: [provider "anyuid": Forbidden: not usable by user or serviceaccount, provider restricted-v2: .spec.securityContext.fsGroup: Invalid value: []int64{1000}: 1000 is not an allowed group, provider restricted-v2: .containers[0].runAsUser: Invalid value: 1000: must be in the ranges: [1001120000, 1001129999], provider restricted: .spec.securityContext.fsGroup: Invalid value: []int64{1000}: 1000 is not an allowed group, provider restricted: .containers[0].runAsUser: Invalid value: 1000: must be in the ranges: [1001120000, 1001129999], provider "nonroot-v2": Forbidden: not usable by user or serviceaccount, provider "nonroot": Forbidden: not usable by user or serviceaccount, provider "pcap-dedicated-admins": Forbidden: not usable by user or serviceaccount, provider "hostmount-anyuid": Forbidden: not usable by user or serviceaccount, provider "elasticsearch-scc": Forbidden: not usable by user or serviceaccount, provider "machine-api-termination-handler": Forbidden: not usable by user or serviceaccount, provider "nginx-ingress-admin": Forbidden: not usable by user or serviceaccount, provider "hostnetwork-v2": Forbidden: not usable by user or serviceaccount, provider "hostnetwork": Forbidden: not usable by user or serviceaccount, provider "hostaccess": Forbidden: not usable by user or serviceaccount, provider "splunkforwarder": Forbidden: not usable by user or serviceaccount, provider "node-exporter": Forbidden: not usable by user or serviceaccount, provider "privileged": Forbidden: not usable by user or serviceaccount]
Concerning the Documentation for Camunda on Openshift with the setting “compatibility.openshift.adaptSecurityContext: force”, setting fsGroup to null should make OpenShift assign correct fsGroup with default SCC of restricted-v2 ( [Red Hat OpenShift | Camunda 8 Docs](Red Hat OpenShift | Camunda 8 Docs and helm-charts/elasticsearch/examples/openshift/values.yaml at 7.10 · elastic/helm-charts · GitHub
we minimized the Helm Chart Installation to the pure elasticsearch installation to isolate the issue:
# Global configuration for variables which can be accessed by all sub charts
global:
annotations: {}
labels:
app: camunda-platform
compatibility:
openshift:
adaptSecurityContext: force
tasklist:
enabled: false
operate:
enabled: false
optimize:
enabled: false
identity:
enabled: false
zeebe:
enabled: false
zeebe-gateway:
enabled: false
elasticsearch:
podSecurityContext:
runAsUser: null
fsGroup: null # <----------------------- This is causing the exception
replicas: 1
volumeClaimTemplate:
accessModes: ["ReadWriteOnce"]
resources:
requests:
storage: 1Gi
sysctlInitContainer:
enabled: false
image: "elasticsearch"
imageTag: 7.17.10
securityContext:
runAsUser: null
fsGroup: null
can you please help?