-
Notifications
You must be signed in to change notification settings - Fork 169
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Improve k8s.
fields retrieved from container runtime socket robustness + expose full container id and pod ids
#1550
Comments
/milestone 0.15.0 /assign |
In addition, another question @leogr: We continue having confusing around "missing" container fields for host processes. Adopters appear to commonly overlook the |
Although I agree with the intent, I'm not sure returning Likely, we need a different way to clearly indicate whether we are in a container context or not. Perhaps another field (eg. |
Hmmm maybe just replace Furthermore, once we have all PRs merged that are tagged with libs 0.14.0 milestone will go ahead and open this cleanup PR from the libs repo (not my fork). Plus we should also expose |
And what if a container image is just named Anyway, I agree we have to improve this, still I'm thinking about an alternative solution to solve the problem, but I haven't found one yet.
👍
Can you elaborate more on this please? |
@leogr we can defer the possible @leogr and @Andreagit97 PR is up. Since we likely won't release 0.15.0 for Falco 0.37.0 I reduced this PR to the essential changes, deferring any major container engine refactor for now. @Andreagit97 re labels refactor, up to you to decide when to implement it. |
/milestone 0.14.0 A new issue will be used to track outstanding improvements. |
Follow up to #1540 (comment)
Enhancements:
container.full_id
(or similar naming)k8s.pod.full_id
(or similar naming)k8s.pod.id
(reflects actual sandbox id truncated to 12 chars not the wrong pod uid which is something entirely different)k8s.ns.name
andk8s.pod.*
as right now we rely solely on labels from the container status response, but we also have the pod status response readily available since we make that request already anyways.CC @Andreagit97 @leogr @gnosek happy to take care of these minor enhancements if you all agree
The text was updated successfully, but these errors were encountered: