Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

K8s workload attestor can't parse cgroups for containerd k8s CRI #1580

Closed
scotte opened this issue May 22, 2020 · 0 comments · Fixed by #1649
Closed

K8s workload attestor can't parse cgroups for containerd k8s CRI #1580

scotte opened this issue May 22, 2020 · 0 comments · Fixed by #1649

Comments

@scotte
Copy link
Contributor

scotte commented May 22, 2020

I ran into an issue when running SPIRE on a Kubernetes cluster using the containerd CRI where the k8s workload attestor in spire-agent is unable to parse container cgroups.

The logs from spire-agent (containing the cgroup names) look like:

2020/05/21 18:12:43 Kube pod entry found, but without container id:
/kubepods-besteffort-pod72f7f152_440c_66ac_9084_e0fc1d8a910c.slice:
cri-containerd:b2a102854b4969b2ce98dc329c86b4fb2b06e4ad2cc8da9d8a7578c9cd2004a2

Where : is used as delimiters in the cgroup name, confounding the current regexp. @azdagron gave me a quick patch to replace the containerIDRe regexp for a workaround.

Based on the number of similar issues in the past, perhaps a more flexible configuration method for the cgroup expression might be nice to have - this is likely to come around for any container implementation that names cgroups in a different way than spire expects.

@azdagron azdagron changed the title Docker workload attestor can't parse cgroups for containerd k8s CRI K8s workload attestor can't parse cgroups for containerd k8s CRI May 29, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant