kubearmor / KubeArmor

Runtime Security Enforcement System. Workload hardening/sandboxing and implementing least-permissive policies made easy leveraging LSMs (BPF-LSM, AppArmor).
https://kubearmor.io/
Apache License 2.0
1.5k stars 345 forks source link

KubeArmor daemonset pods failing to deploy successfully on x86 Ubuntu EKS-A Baremetal Env. #1698

Closed mikemcd3912 closed 7 months ago

mikemcd3912 commented 8 months ago

Bug Report

General Information

To Reproduce

  1. Deploy Kubearmor on EKS Anywhere baremetal environment matching the above via flux

The Kubearmor controller and relay pods start up and enter a 'ready' state, but the daemonset pods for all nodes enter a CrashLoopBackOff state shortly after deployment . The logs for the daemonset Kuberarmor container in the daemonset pods show that shortly after start the container begins to drop events due to replay timeouts. The failing deployment also causes the openebs PVC provisioner to fail to create new claims, preventing other workloads on the cluster from obtaining storage necessary to their successful function and deployment

Expected behavior

Kubearmor agent is expected to fully deploy and report ready

Screenshots 312890779-29af9155-22fb-4f0c-8afc-6d97e050837e

312889863-e22f9144-e0a1-4e43-af08-e327efaa0c9e

kubearmor.logs.txt

mikemcd3912 commented 8 months ago

Opening for tracking per the request of a member of the EKS-Anywhere Partner Addons team @daemon1024 @rksharma95

elamaran11 commented 7 months ago

@daemon1024 Is this fixed?

daemon1024 commented 7 months ago

Hey @elamaran11 , Yes this is fixed in our recent releases. Hope we can get https://github.com/aws-samples/eks-anywhere-addons/pull/235 merged to upgrade our version on EKS-A

elamaran11 commented 7 months ago

@daemon1024 Thanks for the confirmation. we will be validating this soon. Thanks!

mikemcd3912 commented 7 months ago

@daemon1024 Thanks for the attention on this issue! We've validated the updated PR and have just merged the PR that fixed the issue.