-
Notifications
You must be signed in to change notification settings - Fork 733
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
support for systemd-nspawn and runc #385
Comments
FWIW, one can filter for processes in such containers today using cgroup-based filtering. |
+1 |
+1 - the CoreOS rkt container engine uses systemd-nspawn |
Any plans to support parsing runc container metadata? |
We have an old branch that parses runc. By the way I'm not pretty sure what's the usecase of |
@luca3m: my team is looking into using sysdig to monitor containers managed by cloudfoundry, which uses https://github.com/cloudfoundry/guardian to set up runc containers. |
@jmcarp I am on the product team at Sysdig and we are looking at supporting runc in the near future. |
Thanks @payalc5! Do you have a rough estimate of when runc support might land? |
+1 As CRI-O is becoming the standard interface to talk with OCI runtimes like runc |
What is the current status of runc support? Container for testing
Container visible with podman ps
Container sort of visible with lscontainers chisels (not with the csysdig container view)
Filtering by name given at podman run -does not collect any events (as expected, given the chisels output)
Filtering based on the container.id does work to a certain level:
BUT it seems to be missing at least some events (tested with evt.type=execve), probably as it fails assigning the collected events to the respective container (here starting "uptime" inside the container).
-> collects nothing. However if not combined with the container.id the collection itself works, but is sadly far from usable in a container environment.
System Details:
FIY: currently running the traditional non-eBPF way, as I am affected by the issue #1611 After patching the fillers.h as described the eBPF driver compiles and is usable. However the behavior described above regarding runc containers remains the same when using the -B switch. |
EDIT 2022-11-17: Added crun version. Using crun instead of runc does not help with this issue. Updated Fedora and utilities version. Hello there, I'm chiming in to ask if there has been progress with this issue. I am currently using Sysdig on two systems (Ubuntu 22.04 and Fedora 36 Cloud Edition) with Podman and it seems like Sysdig does not catch any activity on a running Podman container (using filters like container.id or container.name) or knows about it's existence at all (using lscontainers) - unlike @holgrrr and his small "success" of having sysdig -c lscontainers recognizing the container or having any output when filtering for the container ID. Running a Docker container works just fine with Sysdig as expected. The versions I'm currently using are: # Ubuntu 22.04.1 LTS
sysdig version 0.27.1
podman version 3.4.4
runc version 1.1.0-0ubuntu1.1
spec: 1.0.2-dev
crun version 0.17
commit: 0e9229ae34caaebcb86f1fde18de3acaf18c6d9a
spec: 1.0.0
+SYSTEMD +SELINUX +APPARMOR +CAP +SECCOMP +EBPF +YAJL and # Fedora 36 Cloud Edition
sysdig version 0.30.2
podman version 4.3.0
runc version 1.1.4
spec: 1.0.2-dev
go: go1.19.2
libseccomp: 2.5.3
crun version 1.7
commit: 40d996ea8a827981895ce22886a9bac367f87264
rundir: /run/user/1000/crun
spec: 1.0.0
+SYSTEMD +SELINUX +APPARMOR +CAP +SECCOMP +EBPF +CRIU +LIBKRUN +WASM:wasmedge +YAJL Thank you in advance |
Hi @hashkeks! I took a quick look and it seems that the problem is more related to podman: if I start a runc/crun container with docker I can record event correctly but, doing the same thing with podman, results in no event collected. Maybe you could open an issue on https://github.com/falcosecurity/libs 😄 In the meantime I'll investigate 👀 |
Hi @InformatiQ! The runc runtime is supported by libs; so sysdig is capable to capture events 😄 Meanwhile the systemd-nspawn is not yet supported. If you are interested you could open an issue on https://github.com/falcosecurity/libs and start a discussion to bring the support on libs. 😄 |
there is no support for systemd-nspawn and runc containers
The text was updated successfully, but these errors were encountered: