Common issues and best practices in the Supportability Review data collection
Article Number: 000022303
Environment
- SUSE Rancher v2.11+
- Supportability Review App
Situation
- Supportability Reviews (SR) are remote engagements in which a SUSE Technical Specialist reviews your Rancher deployment for a supportable system configuration and compliance with current recommended practices, highlighting any potential operational or supportability concerns. It involves two primary steps: data collection and data analysis.
- Below are a few common issues and best practices while collecting data with the Supportability Review App.
Resolution
A) Security policy issues:
If your clusters use any security tools, review the required configurations:
-
Pod Security Admission/Policies
-
Sonobuoy pods require privileged access
- Collection pods need access to node information.
-
If SR data collections fail due to the PSA error below, then exempt 'sr-operator-system' and 'sonobouy' namespace from the cluster. See the document here for more information on exempting the namespace.
2. Network Policieswarnings.go:70] would violate PodSecurity "restricted:v1.31": allowPrivilegeEscalation != false (container "kube-sonobuoy" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "kube-sonobuoy" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "kube-sonobuoy" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "kube-sonobuoy" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") -
Allow egress traffic for collection pods
- Allow communication between Sonobuoy aggregator and collection pods
-
Kyverno Policies
-
Must exclude
sonobuoynamespace from restrictive policies -
If using Kyverno, add this exclusion to your policies:
4. Image Pull Policiesexclude: any: - resources: namespaces: - sonobuoy -
Verify allowed registries in your security policies
- Configure image pull secrets if required
B) Permission issues:
-
Rancher Access
-
Bearer token must be generated by cluster owner (not a member)
- Token requires full access to target clusters
- Token should not be cluster-scoped, instead having full access
- How to generate a token
-
Script Requirements
-
Docker installed and running (or nerdctl/podman)
- User must be root or in the docker group
-
Downstream Clusters must be Active
-
Please ensure that your downstream clusters are listed as Active in Rancher
- Any cluster in an Updating state or not active will NOT have data collected for review
-
SELinux
-
Please use
export ENABLE_PRIVILEGED="true", if SELinux is enabled.
C) Common Error messages:
- Permission Issues
Error: pods is forbidden: User cannot list resource "pods"
Solution: Ensure bearer token is generated by a cluster owner, not member
Info: No of clusters detected: X (less than expected)
Solution: Check if bearer token has access to all intended clusters
If the collection fails due to node taints, apply the toleration below:
tolerations:
- operator: Exists # This will ignore all taints