Audit, namespaces, and containers
Audit, namespaces, and containers
Posted Sep 13, 2016 9:37 UTC (Tue) by Aravinda (guest, #76790)Parent article: Audit, namespaces, and containers
Adding a "container ID" would also help to enable container-aware tracing support.
We are working on filtering container specific events when perf tool is executed inside a container [1]. One of the challenges is that the kernel has no concept of a container. This makes it difficult to identify whether an event was triggered inside a container or not. We have attempted two solutions for this. The first solution adds a new perf namespace [1] and the second uses the existing cgroup namespace as the container identifier in the kernel [2]. However, we think setting the "container ID" by the orchestration system is a clean solution.
+1 for the above suggestion of adding a "container ID".
[1] https://lwn.net/Articles/691298/
[2] https://lkml.org/lkml/2016/8/25/404
Posted Oct 19, 2016 13:24 UTC (Wed)
by roqscheer (guest, #111841)
[Link] (2 responses)
Any process can easily become a new session leader, but these events should be being logged. Thus one analysing the audit log might need to backtrace a session ID's ancestry to link it to its respective container, if that is the case. Another solution would be to restrict setsid inside containers (using seccomp, for instance) so the ID would remain constant for all processes inside the same container.
Posted Nov 6, 2016 20:54 UTC (Sun)
by Wajih (guest, #112198)
[Link] (1 responses)
Posted Nov 6, 2016 20:56 UTC (Sun)
by Wajih (guest, #112198)
[Link]
Audit, namespaces, and containers
Audit, namespaces, and containers
Audit, namespaces, and containers
