-
Notifications
You must be signed in to change notification settings - Fork 14.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow airflow standard images to run in openshift utilising the official helm chart #18136
Comments
Thanks for opening your first issue here! Be sure to follow the issue template! |
Good Idea. While the Airflow Official Image supports Open-Shift arbitrary user, the Charts might indeed need some modifications to be able to support it out-of-the-box cc: @jedcunningham ? |
Happy to help with review @nwalens ! |
@nwalens, I'm also happy to help! Ping us on slack in #helm-chart-official if you get stuck or want/need to chat about this 👍. |
Hi @jedcunningham and @potiuk, thanks for the support! I have just create a pull request (#18147) addressing this issue. Thanks a lot! |
…ial helm chart #18136 (#18147) This pull request adds the parameter rbac.createSCCRoleBinding. When enabled, a new RoleBinding object will be created targeting the various serviceAccounts utilised by deployments and pods. The roleBinding will target the system:openshift:scc:anyuid cluster role which allows for pods to start with any arbitrary uid. The ideal solution would also add the possibility of removing the security contexts altogether, however this would not be possible due to a number of pod templates setting different uids. I will investigate the possibility to add the option of removing the security contexts so that openshift can then set its own uid as intended. As it is, the pods will start and work as expected, utilising the predefined uids set in values file or the default image uid as set during build. The change is not intrusive and should work in the current workflow as is. The option is also set to false by default in order to not impact any existing setups.
Description
Airflow helm chart is very powerful and configurable, however in order to run it in a on-premises openshift 4 environment, one must manually create security context constraints or extra RBAC rules in order to permit the pods to start with arbitrary user ids.
Use case/motivation
I would like to be able to run Airflow using the provided helmchart in a on-premises Openshift 4 installation.
Related issues
No response
Are you willing to submit a PR?
Code of Conduct
The text was updated successfully, but these errors were encountered: