-
Notifications
You must be signed in to change notification settings - Fork 911
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Missing container and k8s details except container.id in case of least privileged falco #3256
Comments
@LucaGuerra @Andreagit97 re implications of running Falco as least privileged, could you help? |
Issues go stale after 90d of inactivity. Mark the issue as fresh with Stale issues rot after an additional 30d of inactivity and eventually close. If this issue is safe to close now please do so with Provide feedback via https://github.com/falcosecurity/community. /lifecycle stale |
/remove-lifecycle stale |
Do you confirm it works as expected with fully privileged mode? It might be just a permission issue on the container socket. |
Issues go stale after 90d of inactivity. Mark the issue as fresh with Stale issues rot after an additional 30d of inactivity and eventually close. If this issue is safe to close now please do so with Provide feedback via https://github.com/falcosecurity/community. /lifecycle stale |
Is this still an issue with the latest Falco and Helm chart versions? May this problem be related to the issue addressed by falcosecurity/charts#769 (more context in this comment? 🤔 |
Hello Falco team,
During evaluating Falco on different managed k8s clusters, my team and I observed some unexpected behaviour.
Describe the bug
On AKS k8s cluster, generated alerts are randomly fulfilled with container and k8s information. Only
container.id
is listed, but details regarding container's name, image and k8s pod's name, namespace are missing.The behaviour is not related to k8s namespace where target k8s pod is running, but most often the above mentioned details are missing for some containers deployed in
kube-system
namespace.How to reproduce it
kube-proxy-*
in k8s namespacekube-system
container.name
,container.image.repository
,k8s.pod.name
,k8s.ns.name
are set tonull
.crictl
to check if container runtime socket could provide the container and k8s related information.curl
by runningapk add curl
crictl
by following the instruction to install-crictlcrictl -r /host/run/containerd/containerd.sock inspect {container.id}
, replace the {container.id} placeholder with a valid container's identifier.crictl inspect
command in evidences section below.Expected behaviour
All container and k8s related information should be reflected in the alert generated by Falco rule to guarantee the accurate traceability of affected k8s pods and containers.
Evidences
Environment
Falco deployed on AKS cluster using Falco Helm Chart version 4.4.2.
Falco version:
Falco version: 0.38.0 (x86_64)
System info:
Linux falco-8b7db 5.15.0-1064-azure #73-Ubuntu SMP Tue Apr 30 14:24:24 UTC 2024 x86_64 GNU/Linux
Deploy to k8s cluster as DaemonSet by using Helm Chart version 4.4.2 using the custom values YAML file
The text was updated successfully, but these errors were encountered: