-
Notifications
You must be signed in to change notification settings - Fork 1.7k
Description
What happened:
I could not create a cluster using kind's rootless podman driver, the command simply fails with the healthcheck on apiserver after 4mins of timeout.
I looked into the journals of the control plane container and it seems that it failed to start the nested containers for the control plane services with a failure message that reads "stat /pause: operation not supported"
Full logs attached below
What you expected to happen:
Cluster creation succeeds
How to reproduce it (as minimally and precisely as possible):
$ KIND_EXPERIMENTAL_PROVIDER=podman kind create cluster --retainAnything else we need to know?:
It seems that this is strictly related to rootless podman on my system, since rootful cluster creation is just fine:
$ sudo env KIND_EXPERIMENTAL_PROVIDER=podman kind create cluster --retain
[sudo] password for hkj:
using podman due to KIND_EXPERIMENTAL_PROVIDER
enabling experimental podman provider
Creating cluster "kind" ...
✓ Ensuring node image (kindest/node:v1.34.0) 🖼
✓ Preparing nodes 📦
✓ Writing configuration 📜
✓ Starting control-plane 🕹️
✓ Installing CNI 🔌
✓ Installing StorageClass 💾
Set kubectl context to "kind-kind"
You can now use your cluster with:
kubectl cluster-info --context kind-kind
Thanks for using kind! 😊
So I feel this might have something to do with my system setup, and some unwanted interactions with seccomp and other security sandbox features.
Environment:
- kind version: (use
kind version):kind v0.30.0 go1.24.6 linux/amd64 - Runtime info: (use
docker info,podman infoornerdctl info):
host:
arch: amd64
buildahVersion: 1.41.3
cgroupControllers:
- cpuset
- cpu
- io
- memory
- pids
cgroupManager: systemd
cgroupVersion: v2
conmon:
package: conmon-1:2.1.13-1
path: /usr/bin/conmon
version: 'conmon version 2.1.13, commit: 82de887596ed8ee6d9b2ee85e4f167f307bb569b'
cpuUtilization:
idlePercent: 90.5
systemPercent: 1.35
userPercent: 8.14
cpus: 16
databaseBackend: boltdb
distribution:
distribution: arch
version: unknown
eventLogger: journald
freeLocks: 2011
hostname: hkj-desktop
idMappings:
gidmap:
- container_id: 0
host_id: 1000
size: 1
- container_id: 1
host_id: 100000
size: 131073
uidmap:
- container_id: 0
host_id: 1000
size: 1
- container_id: 1
host_id: 100000
size: 131073
kernel: 6.16.4-zen1-1-zen
linkmode: dynamic
logDriver: journald
memFree: 14882959360
memTotal: 67327676416
networkBackend: netavark
networkBackendInfo:
backend: netavark
dns:
package: aardvark-dns-1.16.0-1
path: /usr/lib/podman/aardvark-dns
version: aardvark-dns 1.16.0
package: netavark-1.16.1-1
path: /usr/lib/podman/netavark
version: netavark 1.16.1
ociRuntime:
name: crun
package: crun-1.23.1-1
path: /usr/bin/crun
version: |-
crun version 1.23.1
commit: d20b23dba05e822b93b82f2f34fd5dada433e0c2
rundir: /run/user/1000/crun
spec: 1.0.0
+SYSTEMD +SELINUX +APPARMOR +CAP +SECCOMP +EBPF +CRIU +YAJL
os: linux
pasta:
executable: /usr/bin/pasta
package: passt-2025_08_05.309eefd-1
version: |
pasta 2025_08_05.309eefd
Copyright Red Hat
GNU General Public License, version 2 or later
<https://www.gnu.org/licenses/old-licenses/gpl-2.0.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
remoteSocket:
exists: true
path: /run/user/1000/podman/podman.sock
rootlessNetworkCmd: pasta
security:
apparmorEnabled: false
capabilities: CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FOWNER,CAP_FSETID,CAP_KILL,CAP_NET_BIND_SERVICE,CAP_SETFCAP,CAP_SETGID,CAP_SETPCAP,CAP_SETUID,CAP_SYS_CHROOT
rootless: true
seccompEnabled: true
seccompProfilePath: /etc/containers/seccomp.json
selinuxEnabled: false
serviceIsRemote: false
slirp4netns:
executable: /usr/bin/slirp4netns
package: slirp4netns-1.3.3-1
version: |-
slirp4netns version 1.3.3
commit: 944fa94090e1fd1312232cbc0e6b43585553d824
libslirp: 4.9.1
SLIRP_CONFIG_VERSION_MAX: 6
libseccomp: 2.5.6
swapFree: 0
swapTotal: 0
uptime: 734h 20m 48.00s (Approximately 30.58 days)
variant: ""
plugins:
authorization: null
log:
- k8s-file
- none
- passthrough
- journald
network:
- bridge
- macvlan
- ipvlan
volume:
- local
registries:
search:
- docker.io
store:
configFile: /home/hkj/.config/containers/storage.conf
containerStore:
number: 12
paused: 0
running: 5
stopped: 7
graphDriverName: overlay
graphOptions: {}
graphRoot: /home/hkj/.local/share/containers/storage
graphRootAllocated: 1624816222208
graphRootUsed: 423147208704
graphStatus:
Backing Filesystem: zfs
Native Overlay Diff: "false"
Supports d_type: "true"
Supports shifting: "true"
Supports volatile: "true"
Using metacopy: "false"
imageCopyTmpDir: /var/tmp
imageStore:
number: 432
runRoot: /run/user/1000/containers
transientStore: false
volumePath: /home/hkj/.local/share/containers/storage/volumes
version:
APIVersion: 5.6.0
Built: 1755376297
BuiltTime: Sat Aug 16 16:31:37 2025
GitCommit: da671ef6cfa3fc9ac6225c18f1dd0a70a951e43f
GoVersion: go1.25.0
Os: linux
OsArch: linux/amd64
Version: 5.6.0
- OS (e.g. from
/etc/os-release):
NAME="Arch Linux"
PRETTY_NAME="Arch Linux"
ID=arch
BUILD_ID=rolling
ANSI_COLOR="38;2;23;147;209"
HOME_URL="https://archlinux.org/"
DOCUMENTATION_URL="https://wiki.archlinux.org/"
SUPPORT_URL="https://bbs.archlinux.org/"
BUG_REPORT_URL="https://gitlab.archlinux.org/groups/archlinux/-/issues"
PRIVACY_POLICY_URL="https://terms.archlinux.org/docs/privacy-policy/"
LOGO=archlinux-logo
- Kubernetes version: (use
kubectl version):
Client Version: v1.33.4
Kustomize Version: v5.6.0
The connection to the server localhost:8080 was refused - did you specify the right host or port?
- Any proxies or other special environment settings?: N/A