This repository contains tools to be used for K8S nodes.
googlecloudplatform / k8s-node-tools Goto Github PK
View Code? Open in Web Editor NEWK8S Node Tools
License: Apache License 2.0
K8S Node Tools
License: Apache License 2.0
The bash
image used in the DaemonSet is based on Alpine and is not able to mount as in the step linked below:
It results in
mount: mounting /dev/sda12 on $"dir" failed: invalid argument
The image requires cifs-utils
to properly mount and continue the next steps.
The cos-auditd daemonset deploys 2 images.
The cos-auditd-fluent-bit image comes from gke.gcr.io
, which is internal to GCP.
spec:
template:
spec:
containers:
- name: cos-auditd-fluent-bit
image: gke.gcr.io/fluent-bit@sha256:436f3b7a38522314dd3db22ae8187192d928763c29e94d04c0900b34f0ca0779 # v1.8.12-gke.16
However, the cos-auditd-setup init container pulls its ubuntu image from docker.io
spec:
template:
spec:
initContainers:
- name: cos-auditd-setup
image: ubuntu
Inside a VPC Service Perimeter that routes traffic through a PSC, docker.io
pulls fail with an x509 error:
Failed to pull image "ubuntu": rpc error: code = Unknown desc = failed to pull and unpack image "docker.io/library/ubuntu/latest": failed to resolve reference "docker.io/library/ubuntu:latest": failed to do request: Head "https://registry-1.docker.io/v2/library/ubuntu/manifests/latest": x509: certificate signed by unknown authority
Additionally, I believe if the cluster could successfully reach docker.io
, that the pull would still fail to due binary authorization attestation policies.
If possible, can the init container's image be hosted on a repository that is included in GCP's default binary authorization whitelist (preferably gke.gcr.io
)? This would resolve both issues.
admissionWhitelistPatterns:
- namePattern: gcr.io/google_containers/*
- namePattern: gcr.io/google-containers/*
- namePattern: k8s.gcr.io/**
- namePattern: gke.gcr.io/**
- namePattern: gcr.io/stackdriver-agents/*
https://cloud.google.com/kubernetes-engine/docs/how-to/sandbox-pods#regular-pod
IIUC, in order to have the audit logging mechanism work when also using the GKE Sandbox is to add an additional toleration:
tolerations:
- effect: NoSchedule
key: sandbox.gke.io/runtime
operator: Equal
value: gvisor
Otherwise, the DaemonSet will not schedule the audit logging pods on the gVisor nodes, and we lose visibility on what happens there.
This refers to
Per @tallclair's comment below
A declarative, efficient, and flexible JavaScript library for building user interfaces.
๐ Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. ๐๐๐
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google โค๏ธ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.