-
Notifications
You must be signed in to change notification settings - Fork 290
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
falco: when leastPrivileged is true, set the apparmor profile to … #769
Conversation
Welcome @doublez13! It looks like this is your first PR to falcosecurity/charts 🎉 |
Hey @doublez13 Thank you for this. I haven't dug into it, but it seems to be the correct approach. I'll do some tests. |
also, can you bump the chart version? so the test will run 🙏 |
Hey @doublez13 I'm ok with this fix, so we can go ahead. To merge this PR, we just need to:
Let me know if you can do that; otherwise, I will do it for you. Thank you |
I'm away from my computer for awhile (just phone). You're welcome to rebase and merge, or I can do it later. |
I'm rebasing right now. |
…unconfined It appears that when setting leastPrivileged: true, apparmor does not not allow falco to ptrace, which appears to leave the container fields null. If leastPrivileged: true, set the apparmor profile to unconfined. Oct 24 09:52:57 hostname kernel: audit: type=1400 audit(1729785177.339:404624): apparmor="DENIED" operation="ptrace" profile="cri-containerd.apparmor.d" pid=2389102 comm="falco" requested_mask="read" denied_mask="read" peer="unconfined" Signed-off-by: doublez13 <[email protected]>
Signed-off-by: doublez13 <[email protected]>
Signed-off-by: doublez13 <[email protected]>
Signed-off-by: Leonardo Grasso <[email protected]>
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: doublez13, leogr The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
LGTM label has been added. Git tree hash: cc294e786fb73dc8a2b6eb8368e8f7a1eafe810b
|
What type of PR is this?
/kind bug
/kind chart-release
What this PR does / why we need it:
It appears that when setting
leastPrivileged: true
, apparmor does not not allow falco to ptrace, which appears to leave the container fields null.If
leastPrivileged: true
, set the apparmor profile tounconfined
.@leogr
This just a request for comments, as I'm not sure if this if the best way to solve the issue.
Or perhaps there should be an optional field in the helm file that allows specifying a apparmor profile (custom or unconfined.)
Which issue(s) this PR fixes:
falcosecurity/falco#3345
Checklist