-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
NFSv3 Mounts fail unless the --nolock mount option is specified #61
Comments
This is likely an issue with the node daemonset pod permissions. This could possibly be fixed by making the communication policies between the node pods and the host more lenient, allowing for the node daemonset pods to interact with the rpcbind and rpc-statd services running on the node. I tried setting
on the node daemonset pods
|
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/kind bug
What happened?
I attempted to mount an FSx for OpenZFS file system on an application pod using NFSv3 and received this error:
Even though the rpc-statd service was running on the node.
What you expected to happen?
NFSv3 mounts succeed without needing to provide the nolock mount option.
How to reproduce it (as minimally and precisely as possible)?
Attempt to mount a file system using NFSv3
Anything else we need to know?:
Nope
Environment
kubectl version
): 1.24The text was updated successfully, but these errors were encountered: