Uploaded image for project: 'OpenShift Node'
  1. OpenShift Node
  2. OCPNODE-874

Find a way to tell that seccomp stopped a container

XMLWordPrintable

    • Icon: Story Story
    • Resolution: Done
    • Icon: Normal Normal
    • None
    • None
    • None
    • None
    • False
    • None
    • False
    • 8
    • None
    • None
    • OCPNODE Sprint 215

      In v1.25, we plan to graduate the SeccompDefault feature of Kubernetes to beta, which means that is would be enabled by default. By using this feature, the container runtimes would choose the RuntimeDefault profile rather than running unconfined by default.

      Part of enabling this feature would be a migration strategy of existing workloads. Right now there is no indication available for end users to understand that a blocked syscall is the reason that their application does not work with RuntimeDefault. It is mostly guessed by evaluating the logs of the container for something like "permission denied".

      User Story

      As an end user, I'd like to know that my workload stopped because of a blocked syscall when using the RuntimeDefault seccomp profile, so that I can add the syscall to a custom profile based on RuntimeDefault.

              sgrunert@redhat.com Sascha Grunert
              sgrunert@redhat.com Sascha Grunert
              None
              None
              None
              None
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

                Created:
                Updated:
                Resolved: