-
Notifications
You must be signed in to change notification settings - Fork 733
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
track user names from inside container, not host #954
Labels
Comments
mstemm
added a commit
to falcosecurity/falco
that referenced
this issue
Oct 9, 2017
Work around draios/sysdig#954, which relates to not always knowing the proper user name in containers, by not running the rule when in a container and the user name is "<NA>". This won't address cases where the uid from inside the container maps to a user name outside the container that is different than the user inside the container, but it will help a bit.
leogr
pushed a commit
to falcosecurity/rules
that referenced
this issue
Dec 21, 2022
Work around draios/sysdig#954, which relates to not always knowing the proper user name in containers, by not running the rule when in a container and the user name is "<NA>". This won't address cases where the uid from inside the container maps to a user name outside the container that is different than the user inside the container, but it will help a bit.
leogr
pushed a commit
to falcosecurity/rules
that referenced
this issue
Dec 21, 2022
Work around draios/sysdig#954, which relates to not always knowing the proper user name in containers, by not running the rule when in a container and the user name is "<NA>". This won't address cases where the uid from inside the container maps to a user name outside the container that is different than the user inside the container, but it will help a bit.
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
If you create a user inside a container, sysdig still uses the uids from the host in order to populate %user.name. A way to reproduce is:
While doing this and running sysdig with
sudo sysdig container.id!=host and evt.type=execve -p "*%evt.num %evt.outputtime %evt.cpu %proc.name (%thread.tid) %evt.dir %evt.type %evt.info user=%user.name uid=%user.uid"
, you end up with this output:Note that although the user inside the container is "testme", sysdig reports the user as
deploy
, because uid 1000 within the container is being interpreted from the view of the host.To fix this, we should keep track of uids from the container using something like user.vuid/user.vname.
The text was updated successfully, but these errors were encountered: