-
Notifications
You must be signed in to change notification settings - Fork 321
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Fargate] [request]: Allow privileged mode #1000
Comments
We are interested in this since we are using Gitlab Kubernetes Runners for our CI/CD pipelines and using Docker-in-Docker to build application containers and push them to ECR. Currently we have larger ec2 nodes that are tainted to only run Gitlab runner pods to avoid resource contention with other applications/service on the EKS clusters. These nodes are only used when CI/CD jobs are in us, and are idle for periods of time. Autoscaling them is also a challenge when many jobs are running at once since cold-starts of EC2 instances can take 2-3 minutes to join the cluster. By using Fargate Profiles, we would like to setup the We can do some of our jobs in Fargate like this, but a large majority of our jobs are using |
All the steps are dockerized in my company, so there is no way to use fargate as the CI/CD agent. |
Bump so this not being forgotten. I need to get priv mode working on our current AWS EKS Fargate CI/CD GitLab PoC. |
+1 For EKS Fargate. We'd like more capabilities to be supported (specifically SYS_PTRACE, DAC_READ_SEARCH) to a container's securityContext. So far it looks like these work:
There's an open request for SYS_PTRACE: #1102. |
+1 - Open Distro requires Privileged containers to run on EKS. |
s3fs requires privileged also to sync folders: |
+1 for supporting |
+1 |
Required for any container using s3fs-fuse. |
Looking at running OpenVSCode in Fargate but need this to be able to run containers inside so docker-in-docker. https://github.com/gitpod-io/openvscode-server |
I need the privileged mode on fargate with ECS so that I can install and run a docker daemon. At this time, docker daemon cannot be started unless the task is being run with the --privileged mode. |
+1 for this. |
I would like to be able to use docker-forticlient as a base image for a Fargate task so that my task can reach private resources behind a VPN without a 24/7 IPSec tunnel on a VPC. https://github.com/HybirdCorp/docker-forticlient |
Need this for DinD to run Github self hosted runners on Fargate |
+1 to use nsjail inside Fargate |
Can this help? Would Kaniko be a viable alternative for you? https://aws.amazon.com/blogs/containers/building-container-images-on-amazon-ecs-on-aws-fargate/ |
I think the main use case for this request is not to build containers with Fargate, but to be able to mount a file system via FUSE in fargate task. From the first comment:
|
Fair enough. I am not sure I'd characterize that as the "main use case" but definitely it was the initial theme of this issue and we should respect that (even though people added additional reasons for needing privileged access, including builds, so it diluted a bit the initial intent). |
Kaniko is a no-go for us as it adds additional complexity into our Gitlab CI/CD pipelines.
Our main request is to build container images using Fargate. We've raised this with AWS Enterprise Support as well, specifically for running Gitlab Runners in Fargate and building and pushing container images to ECR. |
@andymac4182 Were you able to find a solution for this? If yes, could you please share your approach. |
+1 |
@anjalichaudhary Ended up just using Gitpod online. Would of preferred Fargate but it doesn't work :( |
Did you find any solution? I'm having the same problem. |
@nicodp-leap I haven't found a solution, so I'm running Chromium on EC2 instead of Fargate. I would still love to be able to switch it over to Fargate, though. |
+1 for this, need to use s3fuse |
It's been almost 3 years since this was opened. Is it at least being considered? |
Hi +1 for this -- many images wants to be run in privileged mode true or either tell us better solution for this |
+1 for this to use juicefs in containers, which turns S3 into a shared disk but requires FUSE. |
Any solution for this? |
+1 We need to use Rancher, that requires --privileged |
+1 for building docker images |
+1 also for building docker images. We applied Kaniko as a makeshift, but now we need to build multi-arch docker images which Kaniko can't do. |
Doesn't privileged mode basically mean root access to the host machine? On a cloud resource you don't "own" or manage directly? Maybe I'm missing something but I can't see how we'll ever get root level access to a Fargate machine. |
@ClaytonOlleyNutrien The host machine in question for Fargate containers is a virtual machine, not the underlying physical hardware that runs the VM. |
Those who are interested in running jails or sandbox processes (ping @tekknolagi, @jimmybergman) you might not actually need privileged containers but just an ability to create user namespaces which normally do not require any extra permissions. Unprivileged user namespaces are the canonical way to create rootless sandboxes in Linux. See this issue for details: #2102 Unprivileged user namespaces could also allow to run rootless Docker or Podman in Fargate. |
+1 For rust.. when rust invokes an error it uses usys/unix/time.rs and that requires privileged mode (sudo) to run correctly T_T |
We're interested in this capability as well. In our case, we use iptables and ipset from our container to dynamically block offending IP addresses, and without the privileged mode, we get these errors:
Unless there is a (simple) solution to this, this is a deal breaker for us. We can't move to Fargate. We also use BTW I'm sure there are very good reasons why this is not (yet) possible, and we have no idea if it would even be possible to allow this mode. Thanks to the AWS team for all the awesome services they provide. :) |
+1 for accessing XFRM in kernel and creating IPSec SAs. |
+1 We need to use Rancher, that requires --privileged |
Just curious whether we might get this ability someday, or does the AWS team knows already that it won’t happen? |
Most likely isn't happening. Apparently it's a security vulnerability of some sort |
You'll still get root access to the VM which could be running Fargate containers for who knows how many customers. I'm guessing they cannot or will not add VM tenancy per account to Fargate. |
This is would be very beneficial to the capability of Fargate. I'm guessing this has already been considered but I would want to emphasize that if/when this is allowed, the idea of a hop limit configuration for Fargate tasks is now relevant. I would want containers inside a Fargate container to be able to use the AWS permissions attached to the Fargate container. I hope this is considered in the implementation. |
Community Note
Tell us about your request
I want to be able to mount filesystems within my containers, and for that I need to be able to use privileged mode or add capabilities to the docker container.
Which service(s) is this request for?
Fargate
Tell us about the problem you're trying to solve. What are you trying to do, and why is it hard?
Specifically, I am trying to mount an overlay in a container. This requires the container be run in privileged mode.
Are you currently working around this issue?
No, there does not appear to be a workaround.
The text was updated successfully, but these errors were encountered: