From 8642ede4629c72c1d799d75e7ad9b1ec96219efe Mon Sep 17 00:00:00 2001 From: liu <62530004+xeonliu@users.noreply.github.com> Date: Mon, 2 Feb 2026 17:51:42 +0800 Subject: [PATCH] katib: Add guide to handle with PSS Errors Signed-off-by: liu <62530004+xeonliu@users.noreply.github.com> --- content/en/docs/components/katib/getting-started.md | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/content/en/docs/components/katib/getting-started.md b/content/en/docs/components/katib/getting-started.md index fc42e48f51..818ffd3659 100644 --- a/content/en/docs/components/katib/getting-started.md +++ b/content/en/docs/components/katib/getting-started.md @@ -44,6 +44,16 @@ namespace: `KatibClient(namespace="kubeflow-user-example-com")`. in other namespaces, you can attach this label following the instructions in the [Metrics Collector](/docs/components/katib/user-guides/metrics-collector/#prerequisites). +**Note**. If you are running Katib on a Kubernetes cluster with strict [Pod Security Standards](https://kubernetes.io/docs/concepts/security/pod-security-standards/) (PSS) enabled (which is common in K8s v1.25+ or Kind environments), the Katib Controller might fail to create Suggestion pods or Trial pods due to security context violations. + +If your Experiment gets stuck in the Created state, check the controller logs. You may need to relax the security policy for your experiment's namespace by running: + +```bash +# Allow Katib components to run with required privileges +# In this example, the namespace is `kubeflow` +kubectl label namespace pod-security.kubernetes.io/enforce=privileged --overwrite +``` + ```python # [1] Create an objective function. def objective(parameters):