-
Notifications
You must be signed in to change notification settings - Fork 380
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
tetragon: Add debug interface to track cgroups to workload/ns mappings #2540
Conversation
✅ Deploy Preview for tetragon ready!
To edit notification comments on pull requests, go to your Netlify site configuration. |
82304ad
to
24f0d6a
Compare
03b7cd5
to
e03fed9
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, just one nit.
Also needs to be run though |
e03fed9
to
490f4fb
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
So really quick review, but if you intent to raw print cgroup IDs or have them in logs somewhere better add more context if that makes sense.
2fb5314
to
5e3a860
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks, please find some comments below.
I think the title might be outdated because the final patch changes things to track workloads rather than namespaces.
1811474
to
f90fcd2
Compare
We will need to use execObj() from the policyfilter pkg, but this will cause a circular dependency. So lets just pull this out into a new pkg that we can import. Signed-off-by: John Fastabend <[email protected]>
Debugging BPF and some kernel functions I want to understand cgroup to namespace/workload/kind mappings at event side. This patch maintains a stable mapping between cgroups and human readable namespaces. The end goal is to filter out noisy namespaces from execs which will be follow up series. This is minimally useful as is. To support this just extend the use of namespace filters from kprobe and tracepoints into a more general space where we can hook selectors. Next steps we can push namespace filters into other sensor types e.g. loader. Signed-off-by: John Fastabend <[email protected]>
Its sometimes useful when debugging policy statements to be able to dump the cgroup IDs to their namespace human readable names. This helps ensure (a) the policy maps are correctly updated and (b) if we are debugging kernel we can map cgroups to kubernetes names. Signed-off-by: John Fastabend <[email protected]>
f90fcd2
to
d061804
Compare
Debugging BPF and some kernel functions I want to understand cgroup to namespace mappings at event side. This patch maintains a stable mapping between cgroups and human readable namespaces. The end goal is to filter out noisy namespaces from execs which will be follow up series. This is minimally useful as is.
To support this just extend the use of namespace filters from kprobe and tracepoints into a more general space where we can hook selectors.