Skip to content

Commit 5b21528

Browse files
Fix PMM-14125: Add SCC permissions for PMM deployment on OpenShift
- Grant anyuid Security Context Constraint to default service account - PMM requires UID 1000 which is outside OpenShift's default range - This fixes the 'unable to validate against any security context constraint' error - Added detailed comments explaining why this is necessary Without this, PMM pods fail to schedule due to OpenShift's strict security policies
1 parent 1f4e1ba commit 5b21528

File tree

1 file changed

+7
-0
lines changed

1 file changed

+7
-0
lines changed

pmm/v3/pmm3-openshift-helm-tests.groovy

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -380,6 +380,13 @@ pipeline {
380380
# Create namespace if it doesn't exist
381381
oc create namespace ${params.NAMESPACE} --dry-run=client -o yaml | oc apply -f -
382382
383+
# Grant necessary Security Context Constraints for PMM to run
384+
# PMM requires specific UIDs (1000) which are outside OpenShift's default range
385+
# The anyuid SCC allows the container to run with its required user ID
386+
echo "Granting Security Context Constraints..."
387+
oc adm policy add-scc-to-user anyuid -z default -n ${params.NAMESPACE} || true
388+
echo "✓ SCC permissions granted"
389+
383390
# Add Percona Helm repository
384391
helm repo add percona https://percona.github.io/percona-helm-charts/
385392
helm repo update

0 commit comments

Comments
 (0)