Skip to content

systemd with --privileged #5

@cpuguy83

Description

@cpuguy83

Noticed your hack script uses systemd with --privileged.
When doing so, systemd likes to change some things on the host.

Running systemd+dind I have had luck with:

        --security-opt seccomp:unconfined \
        --security-opt apparmor:unconfined \
        --security-opt label:disabled \
        --cap-add SYS_ADMIN \
        --cap-add NET_ADMIN \
        -e container=docker \
        --tmpfs /tmp \
        --tmpfs /run \
        --tmpfs /run/lock \
        -v /sys/fs/cgroup:/sys/fs/cgroup:ro

There doesn't seem like there's any disruptive changes on the host with this configuration.

Metadata

Metadata

Assignees

No one assigned

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions