Replies: 1 comment
-
That's an interesting use-case. The latest versions of Austin should have support for inspecting processes running in a container from the host (however there has been reports that this might not always work #210). What you describe shouldn't be too different from this scenario. I believe that, even if permissions are set, one would still have to invoke |
Beta Was this translation helpful? Give feedback.
-
I was trying to prototype running profiling on a long-running process by attaching a debug container (with
austin
pre-installed) to a running pod inside Kubernetes withPermissions, including SYS_PTRACE, seem OK, albeit the errors indicate clearly that not much seems to be working here
One thing is correct - containers still work in different filesystems, even though target container filesystem can be accessed under
/proc/$PID/root
. Debugging container lives in the same IPC and PID namespace as target, so I'm still surprised memory is not being read. It should be OK, right?What would be necessary (if even possible) to get
austin
to work in this setting?Beta Was this translation helpful? Give feedback.
All reactions