Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Falcosidekick: Unable to receive alerts on teams #1101

Open
afzaalmd opened this issue Jan 24, 2025 · 11 comments
Open

Falcosidekick: Unable to receive alerts on teams #1101

afzaalmd opened this issue Jan 24, 2025 · 11 comments
Assignees
Labels
kind/bug Something isn't working
Milestone

Comments

@afzaalmd
Copy link

Describe the bug

I have installed falco and falcosidekick on kubernetes namespace using helm with webhook config pods are running successfully but I am unable to receive the alert.

helm upgrade falco falcosecurity/falco --namespace falco
--set falcosidekick.enabled=true
--set falcosidekick.config.teams.webhookurl=https://webhookurl
--set falcosidekick.config.teams.activityimage=image url
--set falcosidekick.config.teams.outputformat=all
--set falcosidekick.fullfqdn=true
--set falcosidekick.config.teams.minimumpriority=debug

Image

@afzaalmd afzaalmd added the kind/bug Something isn't working label Jan 24, 2025
@Issif
Copy link
Member

Issif commented Jan 27, 2025

Hi,

Have you tried by disabling --set falcosidekick.fullfqdn=false?

@Issif Issif added this to the 2.x milestone Jan 27, 2025
@Issif Issif self-assigned this Jan 27, 2025
@afzaalmd
Copy link
Author

afzaalmd commented Jan 27, 2025

Hello Issif,

I Just tried but getting same error message...
It is using driver modernEbpf.
Image

@Issif
Copy link
Member

Issif commented Jan 27, 2025

Can you list the services you have in the falco namespace and check the value configured for the http output of falco in its configmap, please

@afzaalmd
Copy link
Author

I checked it and value configure for http_output is enabled:true

Image

@afzaalmd
Copy link
Author

afzaalmd commented Jan 27, 2025

Can this we related with this issue falcosecurity/charts#793 but this was applicable for driver type gVisor.

@Issif
Copy link
Member

Issif commented Jan 27, 2025

Can this we related with this issue falcosecurity/charts#793 but this was applicable for driver type gVisor.

This one was related to gVisor which create another level of abstraction.

Can you check the svc for falcosidekick is correctly created too.

Do you have any particular DNS and/or Network configuration in your cluster?

@afzaalmd
Copy link
Author

afzaalmd commented Jan 28, 2025

Hello Issif,

Here is the list of service in falco namespace:

Image

we also have Ingress and egress network policy in each namespace which restrict to and from non whitelisted connection for other than falco namespace, only core cluster namespaces.

@Issif
Copy link
Member

Issif commented Jan 28, 2025

It seems good to me, the issue is at the DNS level. If you create a pod with curl inside and try to curl -sI http://falco-falcosidekick.falco.svc.cluster.local:2801, does it work?

@afzaalmd
Copy link
Author

afzaalmd commented Jan 31, 2025

Hello Issif,

I tried to run curl -sI http://falco-falcosidekick.falco.svc.cluster.local:2801 in side pod but curl was not supported because of OPA policy, any way I tried to use the same deployment steps in higher tenant cluster and some how alerts are working now. Thanks for your support.
Hence I am closing this issue.

@afzaalmd
Copy link
Author

Notice Setuid or setgid bit is set via chmod (fd= filename=/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs/snapshots/10369/fs/home/falcosidekick mode=S_IXOTH|S_IROTH|S_IXGRP|S_IRGRP|S_IXUSR|S_IWUSR|S_IRUSR|S_ISGID evt_type=fchmodat user=root user_uid=0 user_loginuid=-1 process=containerd proc_exepath=/usr/bin/containerd parent=systemd command=containerd --config=/etc/containerd/config.toml terminal=0 container_id=host container_image= container_image_tag= container_name=host k8s_ns= k8s_pod_name=)
file mentioned in the log (/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs/snapshots/10369/fs/home/falcosidekick). Is it necessary for this file to have setuid/setgid permissions?

@Issif
Copy link
Member

Issif commented Jan 31, 2025

My proposal was to test with a debian pod or else, to check the DNS resolution.

For the Setuid, Falcosidekick runs with a user other than root (uid/gid 1234/1234) for security reasons. See the Dockerfile:

USER 1234

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/bug Something isn't working
Projects
Status: To do
Development

No branches or pull requests

2 participants