You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Cloud providers may have specific quirks and restrictions which could result in surprising behaviors of coreos-metadata or which could require workarounds in the codebase. Those should be documented in the repository, so that we have an explicit note to reference.
The first example of this has been reported at coreos/bugs#2468 (comment).
Azure may (or may not, depending on agent version and settings) prevent non-root users to reach the metadata endpoint for security reasons. This affects how the coreos-metadata service can be run.
The text was updated successfully, but these errors were encountered:
As Openstack is not an homogeneous platform and the metadata component is only optional, the static Ignition platform ID is not useful there (i.e. it can't signal whether the metadata endpoint exists or not).
Thus, there is a more specific openstack-metadata provider ID for that, which is usually not baked into images kernel arguments (but can be opted-in manually).
For the same reason, [email protected] does not automatically work on OpenStack, but requires a custom drop-in setting ${AFTERBURN_OPT_PROVIDER} and ConditionKernelCommandLine.
Cloud providers may have specific quirks and restrictions which could result in surprising behaviors of
coreos-metadata
or which could require workarounds in the codebase. Those should be documented in the repository, so that we have an explicit note to reference.The first example of this has been reported at coreos/bugs#2468 (comment).
Azure may (or may not, depending on agent version and settings) prevent non-root users to reach the metadata endpoint for security reasons. This affects how the
coreos-metadata
service can be run.The text was updated successfully, but these errors were encountered: