question-mark
Stuck on an issue?

Lightrun Answers was designed to reduce the constant googling that comes with debugging 3rd party libraries. It collects links to all the places you might be looking at while hunting down a tough bug.

And, if you’re still stuck at the end, we’re happy to hop on a call to see how we can help out.

cgroup permission error attempting to run pod as non-root user

See original GitHub issue

Relvant log line from microk8s.kubectl describe pod:

  Warning  Failed          8s (x2 over 21s)       kubelet, ubuntu    Error: failed to create containerd task: OCI runtime create failed: container_linux.go:345: starting container process caused "process_linux.go:424: container init caused \"process_linux.go:390: setting cgroup config for procHooks process caused \\\"failed to write 100000 to cpu.cfs_period_us: open /sys/fs/cgroup/cpu,cpuacct/kubepods/besteffort/podd3732880-bc19-46f6-877a-671add179658/kiosk-manager/cpu.cfs_period_us: permission denied\\\"\"": unknown

microk8s.inspect tarball: inspection-report-20190923_152339.tar.gz

I’m attempting to run microk8s on a Raspberry Pi 4B with 4GB RAM on Ubuntu 18.04 using a custom arm64 kernel. I’ve made a few modifications to the image since installation to get microk8s to run; however attempting to run a pod as a non-root user results in the permission error above.

Is there a workaround for this, or is this a kernel issue? If it’s a kernel issue, what flag should be set to allow non-root users permission to write to cgroupfs?

Issue Analytics

  • State:closed
  • Created 4 years ago
  • Comments:5 (1 by maintainers)

github_iconTop GitHub Comments

1reaction
bentoncommented, Apr 3, 2020

I resolved this issue by recompiling Berryboot with the following extra kernel parameter:

CONFIG_CFS_BANDWIDTH=y
0reactions
stale[bot]commented, Feb 28, 2021

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

Read more comments on GitHub >

github_iconTop Results From Across the Web

cgroup permission error attempting to run pod as non-root user
I'm attempting to run microk8s on a Raspberry Pi 4B with 4GB RAM on Ubuntu 18.04 using a custom arm64 kernel. I've made...
Read more >
Container permission denied: How to diagnose this error
You can diagnose this by telling the user to attempt to run the container as root, which would match up to the default...
Read more >
Run the Docker daemon as a non-root user (Rootless mode)
To fix the issue, run sudo apt-get install -y dbus-user-session or sudo dnf install -y dbus-daemon , and then relogin. If the error...
Read more >
Running Kubernetes Node Components as a Non-root User
This document describes how to run Kubernetes Node components such as kubelet, CRI, OCI, and CNI without root privileges, by using a user...
Read more >
Trouble with mounting /sys/fs/cgroup from host to podman ...
Hi, While trying to use podman for a current task where I am testing an ... not permitted\\\"\"": OCI runtime permission denied error...
Read more >

github_iconTop Related Medium Post

No results found

github_iconTop Related StackOverflow Question

No results found

github_iconTroubleshoot Live Code

Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free

github_iconTop Related Reddit Thread

No results found

github_iconTop Related Hackernoon Post

No results found

github_iconTop Related Tweet

No results found

github_iconTop Related Dev.to Post

No results found

github_iconTop Related Hashnode Post

No results found