-
Notifications
You must be signed in to change notification settings - Fork 217
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unable to initialize a scanner: {docker,containerd,podman,remote} error? #2095
Comments
@sheeeng is this image |
Thank you for the tip. I will check on it. Get back to you as soon as I have more information. |
@sheeeng checkout our private registry docs |
proxy:
image:
name: ghcr.io/linkerd/proxy I have tried to change the default container image name to use {"level":"error","ts":"2024-05-22T08:06:58Z","logger":"reconciler.scan job","msg":"Scan job container","job":"trivy/scan-vulnerabilityreport-564746fb59","container":"linkerd-proxy","status.reason":"Error","status.message":"2024-05-22T08:06:55.383Z\t\u001b[31mFATAL\u001b[0m\timage scan error: scan error: unable to initialize a scanner: unable to initialize a remote image scanner: 4 errors occurred:\n\t* docker error: unable to inspect the image (ghcr.io/linkerd/proxy:stable-2.14.10): Cannot connect to the Docker daemon at unix:///var/run/docker.sock. Is the docker daemon running?\n\t* containerd error: containerd socket not found: /run/containerd/containerd.sock\n\t* podman error: unable to initialize Podman client: no podman socket found: stat podman/podman.sock: no such file or directory\n\t* remote error: Get \"https://ghcr.io/v2/\": dial tcp 140.82.121.34:443: connect: connection refused\n\n\n","stacktrace":"github.com/aquasecurity/trivy-operator/pkg/vulnerabilityreport/controller.(*ScanJobController).completedContainers\n\t/home/runner/work/trivy-operator/trivy-operator/pkg/vulnerabilityreport/controller/scanjob.go:353\ngit.luolix.top/aquasecurity/trivy-operator/pkg/vulnerabilityreport/controller.(*ScanJobController).SetupWithManager.(*ScanJobController).reconcileJobs.func1\n\t/home/runner/work/trivy-operator/trivy-operator/pkg/vulnerabilityreport/controller/scanjob.go:80\nsigs.k8s.io/controller-runtime/pkg/reconcile.Func.Reconcile\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.17.3/pkg/reconcile/reconcile.go:113\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).Reconcile\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.17.3/pkg/internal/controller/controller.go:119\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).reconcileHandler\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.17.3/pkg/internal/controller/controller.go:316\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).processNextWorkItem\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.17.3/pkg/internal/controller/controller.go:266\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).Start.func2.2\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.17.3/pkg/internal/controller/controller.go:227"} I guess trivy-operator needs personal access token to access |
@sheeeng if it is private then yes if public no |
According to Using A Private Docker Repository | Linkerd, all of the Linkerd images are publicly available at the GitHub Container Registry. Hmm. I've changed the default container image name to use |
@sheeeng it works for other public images but for this one it fails ? |
Yes, it works for other public images. $ kubectl get vulnerabilityreports.aquasecurity.github.io --all-namespaces --output json | jq '.items[] | select(.kind=="VulnerabilityReport")' | jq --raw-output '[.report.updateTimestamp, .report.registry.server, .report.artifact.repository, .report.artifact.tag, ("Vulnerabilities:" + (.report.vulnerabilities | length | tostring)), ("CriticalVulnerabilities:" + (.report.summary.criticalCount | tostring))] | @csv' | sort | grep aquasecurity
"2024-05-22T13:11:36Z","ghcr.io","aquasecurity/trivy","0.50.2","Vulnerabilities:16","CriticalVulnerabilities:1"
"2024-05-22T13:15:25Z","ghcr.io","aquasecurity/trivy-operator","0.20.1","Vulnerabilities:12","CriticalVulnerabilities:0" |
I think the issue relate to settings, you mention that you tried to change the image name from |
Thank you for trying it on your side. I will further debug on my side. |
I was able to pull container images from both podman pull cr.l5d.io/linkerd/controller:stable-2.14.10
podman pull ghcr.io/linkerd/proxy:stable-2.14.10 It can generate $ kubectl get vulnerabilityreports.aquasecurity.github.io --all-namespaces --output json | jq '.items[] | select(.kind=="VulnerabilityReport")' | jq --raw-output '[.report.updateTimestamp, .report.registry.server, .report.artifact.repository, .report.artifact.tag, ("Vulnerabilities:" + (.report.vulnerabilities | length | tostring)), ("CriticalVulnerabilities:" + (.report.summary.criticalCount | tostring))] | @csv' | sort
"2024-05-24T07:43:21Z","index.docker.io","kindest/kindnetd","v20240202-8f1494ea","Vulnerabilities:77","CriticalVulnerabilities:1"
"2024-05-24T07:43:21Z","registry.k8s.io","etcd","3.5.12-0","Vulnerabilities:38","CriticalVulnerabilities:0"
"2024-05-24T07:43:22Z","ghcr.io","projectcontour/contour","v1.24.2","Vulnerabilities:31","CriticalVulnerabilities:2"
"2024-05-24T07:43:22Z","registry.k8s.io","kube-controller-manager","v1.30.0","Vulnerabilities:3","CriticalVulnerabilities:0"
"2024-05-24T07:43:23Z","registry.k8s.io","kube-proxy","v1.30.0","Vulnerabilities:30","CriticalVulnerabilities:0"
"2024-05-24T07:43:26Z","ghcr.io","aquasecurity/trivy-operator","0.21.1","Vulnerabilities:1","CriticalVulnerabilities:0"
"2024-05-24T07:43:26Z","registry.k8s.io","kube-apiserver","v1.30.0","Vulnerabilities:3","CriticalVulnerabilities:0"
"2024-05-24T07:43:28Z","registry.k8s.io","coredns/coredns","v1.11.1","Vulnerabilities:21","CriticalVulnerabilities:0"
"2024-05-24T07:43:35Z","ghcr.io","projectcontour/contour","v1.24.2","Vulnerabilities:31","CriticalVulnerabilities:2"
"2024-05-24T07:43:35Z","ghcr.io","projectcontour/contour","v1.24.2","Vulnerabilities:31","CriticalVulnerabilities:2"
"2024-05-24T07:43:35Z","index.docker.io","envoyproxy/envoy","v1.25.2","Vulnerabilities:89","CriticalVulnerabilities:0"
"2024-05-24T07:43:52Z","index.docker.io","kindest/local-path-provisioner","v20240202-8f1494ea","Vulnerabilities:38","CriticalVulnerabilities:0"
"2024-05-24T07:43:58Z","ghcr.io","projectcontour/contour","v1.24.2","Vulnerabilities:31","CriticalVulnerabilities:2"
"2024-05-24T07:43:58Z","registry.k8s.io","kube-scheduler","v1.30.0","Vulnerabilities:3","CriticalVulnerabilities:0"
"2024-05-24T07:44:10Z","index.docker.io","library/nginx","1.16","Vulnerabilities:471","CriticalVulnerabilities:40"
"2024-05-24T08:29:12Z","cr.l5d.io","linkerd/controller","stable-2.14.10","Vulnerabilities:19","CriticalVulnerabilities:0"
"2024-05-24T08:29:12Z","cr.l5d.io","linkerd/controller","stable-2.14.10","Vulnerabilities:19","CriticalVulnerabilities:0"
"2024-05-24T08:29:12Z","cr.l5d.io","linkerd/controller","stable-2.14.10","Vulnerabilities:19","CriticalVulnerabilities:0"
"2024-05-24T08:29:12Z","cr.l5d.io","linkerd/controller","stable-2.14.10","Vulnerabilities:19","CriticalVulnerabilities:0"
"2024-05-24T08:29:12Z","cr.l5d.io","linkerd/controller","stable-2.14.10","Vulnerabilities:19","CriticalVulnerabilities:0"
"2024-05-24T08:29:12Z","cr.l5d.io","linkerd/policy-controller","stable-2.14.10","Vulnerabilities:0","CriticalVulnerabilities:0"
"2024-05-24T08:29:12Z","cr.l5d.io","linkerd/proxy","stable-2.14.10","Vulnerabilities:40","CriticalVulnerabilities:0"
"2024-05-24T08:29:12Z","cr.l5d.io","linkerd/proxy","stable-2.14.10","Vulnerabilities:40","CriticalVulnerabilities:0"
"2024-05-24T08:29:12Z","cr.l5d.io","linkerd/proxy","stable-2.14.10","Vulnerabilities:40","CriticalVulnerabilities:0"
"2024-05-24T08:29:12Z","cr.l5d.io","linkerd/proxy-init","v2.2.3","Vulnerabilities:27","CriticalVulnerabilities:0"
"2024-05-24T08:29:12Z","cr.l5d.io","linkerd/proxy-init","v2.2.3","Vulnerabilities:27","CriticalVulnerabilities:0"
"2024-05-24T08:29:12Z","cr.l5d.io","linkerd/proxy-init","v2.2.3","Vulnerabilities:27","CriticalVulnerabilities:0"
"2024-05-24T08:30:34Z","docker.l5d.io","buoyantio/emojivoto-web","v11","Vulnerabilities:990","CriticalVulnerabilities:61"
"2024-05-24T08:32:56Z","docker.l5d.io","buoyantio/emojivoto-voting-svc","v11","Vulnerabilities:904","CriticalVulnerabilities:58"
"2024-05-24T08:32:58Z","docker.l5d.io","buoyantio/emojivoto-web","v11","Vulnerabilities:990","CriticalVulnerabilities:61"
"2024-05-24T08:33:28Z","docker.l5d.io","buoyantio/emojivoto-emoji-svc","v11","Vulnerabilities:904","CriticalVulnerabilities:58"
"2024-05-24T08:33:28Z","docker.l5d.io","buoyantio/emojivoto-web","v11","Vulnerabilities:990","CriticalVulnerabilities:61"
"2024-05-24T08:35:16Z","index.docker.io","prom/prometheus","v2.48.0","Vulnerabilities:24","CriticalVulnerabilities:0"
"2024-05-24T08:35:17Z","cr.l5d.io","linkerd/metrics-api","stable-2.14.10","Vulnerabilities:19","CriticalVulnerabilities:0"
"2024-05-24T08:35:17Z","cr.l5d.io","linkerd/tap","stable-2.14.10","Vulnerabilities:19","CriticalVulnerabilities:0"
"2024-05-24T08:35:17Z","cr.l5d.io","linkerd/tap","stable-2.14.10","Vulnerabilities:19","CriticalVulnerabilities:0"
"2024-05-24T08:35:17Z","cr.l5d.io","linkerd/web","stable-2.14.10","Vulnerabilities:19","CriticalVulnerabilities:0" |
I managed to reproduce this issue using Linkerd with CNI plugin on local Podman Desktop using following steps. The previous experiment that produces no error was using plain Linkerd only.
Generating your own mTLS root certificates$ step certificate create root.linkerd.cluster.local ca.crt ca.key \
--profile root-ca --no-password --insecure
Your certificate has been saved in ca.crt.
Your private key has been saved in ca.key.
$ step certificate create identity.linkerd.cluster.local issuer.crt issuer.key \
--profile intermediate-ca --not-after 8760h --no-password --insecure \
--ca ca.crt --ca-key ca.key
Your certificate has been saved in issuer.crt.
Your private key has been saved in issuer.key.
$ Install Linkerd CNI with Helm$ helm repo add linkerd https://helm.linkerd.io/stable
"linkerd" has been added to your repositories
$
$ helm install linkerd-cni -n linkerd-cni --create-namespace linkerd/linkerd2-cni
NAME: linkerd-cni
...
TEST SUITE: None
$
$ linkerd check --pre --linkerd-cni-enabled
...
Status check results are √
$
$ helm install linkerd-crds linkerd/linkerd-crds \
--set cniEnabled=true \
-n linkerd --create-namespace
NAME: linkerd-crds
...
Looking for more? Visit https://linkerd.io/2/getting-started/
$
$ helm install linkerd-control-plane \
--set cniEnabled=true \
-n linkerd \
--set-file identityTrustAnchorsPEM=ca.crt \
--set-file identity.issuer.tls.crtPEM=issuer.crt \
--set-file identity.issuer.tls.keyPEM=issuer.key \
linkerd/linkerd-control-plane
NAME: linkerd-control-plane
...
Looking for more? Visit https://linkerd.io/2/getting-started/
$ Install Trivy Operator with Helm$ helm repo add aqua https://aquasecurity.github.io/helm-charts/
"aqua" has been added to your repositories
$ helm repo update
Hang tight while we grab the latest from your chart repositories...
...Successfully got an update from the "aqua" chart repository
...Successfully got an update from the "linkerd" chart repository
Update Complete. ⎈Happy Helming!⎈
$
$ cat trivy-operator-values.yaml
operator:
builtInTrivyServer: true
trivy:
mode: "ClientServer"
$
$ helm install trivy-operator aqua/trivy-operator \
--namespace trivy-system \
--create-namespace \
--values trivy-operator-values.yaml
NAME: trivy-operator
...
kubectl logs -n trivy-system deployment/trivy-operator
$ $ helm list --all --all-namespaces
NAME NAMESPACE REVISION UPDATED STATUS CHART APP VERSION
linkerd-cni linkerd-cni 1 2024-06-17 10:43:53.950234 +0200 CEST deployed linkerd2-cni-30.12.2 stable-2.14.10
linkerd-control-plane linkerd 1 2024-06-17 10:44:20.04936 +0200 CEST deployed linkerd-control-plane-1.16.11 stable-2.14.10
linkerd-crds linkerd 1 2024-06-17 10:44:11.914834 +0200 CEST deployed linkerd-crds-1.8.0
trivy-operator trivy-system 1 2024-06-17 10:49:07.889866 +0200 CEST deployed trivy-operator-0.23.3 0.21.3 Get Error Logs$ kubectl logs --selector "app.kubernetes.io/name=trivy-operator" --all-containers --namespace trivy-system --context kind-kind-cluster --max-log-requests=6 --follow
{"level":"error","ts":"2024-05-27T09:34:40Z","logger":"reconciler.scan job","msg":"Scan job container","job":"trivy-system/scan-vulnerabilityreport-58dbf59895","container":"linkerd-network-validator","status.reason":"Error","status.message":"","stacktrace":"github.com/aquasecurity/trivy-operator/pkg/vulnerabilityreport/controller.(*ScanJobController).completedContainers\n\t/home/runner/work/trivy-operator/trivy-operator/pkg/vulnerabilityreport/controller/scanjob.go:353\ngit.luolix.top/aquasecurity/trivy-operator/pkg/vulnerabilityreport/controller.(*ScanJobController).SetupWithManager.(*ScanJobController).reconcileJobs.func1\n\t/home/runner/work/trivy-operator/trivy-operator/pkg/vulnerabilityreport/controller/scanjob.go:80\nsigs.k8s.io/controller-runtime/pkg/reconcile.Func.Reconcile\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/reconcile/reconcile.go:113\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).Reconcile\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:114\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).reconcileHandler\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:311\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).processNextWorkItem\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:261\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).Start.func2.2\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:222"}
{"level":"error","ts":"2024-05-27T09:34:40Z","logger":"reconciler.scan job","msg":"Scan job container","job":"trivy-system/scan-vulnerabilityreport-58dbf59895","container":"linkerd-proxy","status.reason":"Error","status.message":"","stacktrace":"github.com/aquasecurity/trivy-operator/pkg/vulnerabilityreport/controller.(*ScanJobController).completedContainers\n\t/home/runner/work/trivy-operator/trivy-operator/pkg/vulnerabilityreport/controller/scanjob.go:353\ngit.luolix.top/aquasecurity/trivy-operator/pkg/vulnerabilityreport/controller.(*ScanJobController).SetupWithManager.(*ScanJobController).reconcileJobs.func1\n\t/home/runner/work/trivy-operator/trivy-operator/pkg/vulnerabilityreport/controller/scanjob.go:80\nsigs.k8s.io/controller-runtime/pkg/reconcile.Func.Reconcile\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/reconcile/reconcile.go:113\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).Reconcile\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:114\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).reconcileHandler\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:311\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).processNextWorkItem\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:261\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).Start.func2.2\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:222"}
{"level":"error","ts":"2024-05-27T09:34:40Z","logger":"reconciler.scan job","msg":"Scan job container","job":"trivy-system/scan-vulnerabilityreport-58dbf59895","container":"policy","status.reason":"Error","status.message":"","stacktrace":"github.com/aquasecurity/trivy-operator/pkg/vulnerabilityreport/controller.(*ScanJobController).completedContainers\n\t/home/runner/work/trivy-operator/trivy-operator/pkg/vulnerabilityreport/controller/scanjob.go:353\ngit.luolix.top/aquasecurity/trivy-operator/pkg/vulnerabilityreport/controller.(*ScanJobController).SetupWithManager.(*ScanJobController).reconcileJobs.func1\n\t/home/runner/work/trivy-operator/trivy-operator/pkg/vulnerabilityreport/controller/scanjob.go:80\nsigs.k8s.io/controller-runtime/pkg/reconcile.Func.Reconcile\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/reconcile/reconcile.go:113\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).Reconcile\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:114\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).reconcileHandler\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:311\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).processNextWorkItem\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:261\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).Start.func2.2\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:222"}
{"level":"error","ts":"2024-05-27T09:34:40Z","logger":"reconciler.scan job","msg":"Scan job container","job":"trivy-system/scan-vulnerabilityreport-58dbf59895","container":"sp-validator","status.reason":"Error","status.message":"","stacktrace":"github.com/aquasecurity/trivy-operator/pkg/vulnerabilityreport/controller.(*ScanJobController).completedContainers\n\t/home/runner/work/trivy-operator/trivy-operator/pkg/vulnerabilityreport/controller/scanjob.go:353\ngit.luolix.top/aquasecurity/trivy-operator/pkg/vulnerabilityreport/controller.(*ScanJobController).SetupWithManager.(*ScanJobController).reconcileJobs.func1\n\t/home/runner/work/trivy-operator/trivy-operator/pkg/vulnerabilityreport/controller/scanjob.go:80\nsigs.k8s.io/controller-runtime/pkg/reconcile.Func.Reconcile\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/reconcile/reconcile.go:113\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).Reconcile\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:114\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).reconcileHandler\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:311\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).processNextWorkItem\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:261\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).Start.func2.2\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:222"}
{"level":"error","ts":"2024-05-27T09:34:41Z","logger":"reconciler.scan job","msg":"Scan job container","job":"trivy-system/scan-vulnerabilityreport-9fdb684cc","container":"identity","status.reason":"Error","status.message":"","stacktrace":"github.com/aquasecurity/trivy-operator/pkg/vulnerabilityreport/controller.(*ScanJobController).completedContainers\n\t/home/runner/work/trivy-operator/trivy-operator/pkg/vulnerabilityreport/controller/scanjob.go:353\ngit.luolix.top/aquasecurity/trivy-operator/pkg/vulnerabilityreport/controller.(*ScanJobController).SetupWithManager.(*ScanJobController).reconcileJobs.func1\n\t/home/runner/work/trivy-operator/trivy-operator/pkg/vulnerabilityreport/controller/scanjob.go:80\nsigs.k8s.io/controller-runtime/pkg/reconcile.Func.Reconcile\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/reconcile/reconcile.go:113\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).Reconcile\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:114\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).reconcileHandler\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:311\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).processNextWorkItem\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:261\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).Start.func2.2\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:222"}
{"level":"error","ts":"2024-05-27T09:34:41Z","logger":"reconciler.scan job","msg":"Scan job container","job":"trivy-system/scan-vulnerabilityreport-9fdb684cc","container":"linkerd-network-validator","status.reason":"Error","status.message":"","stacktrace":"github.com/aquasecurity/trivy-operator/pkg/vulnerabilityreport/controller.(*ScanJobController).completedContainers\n\t/home/runner/work/trivy-operator/trivy-operator/pkg/vulnerabilityreport/controller/scanjob.go:353\ngit.luolix.top/aquasecurity/trivy-operator/pkg/vulnerabilityreport/controller.(*ScanJobController).SetupWithManager.(*ScanJobController).reconcileJobs.func1\n\t/home/runner/work/trivy-operator/trivy-operator/pkg/vulnerabilityreport/controller/scanjob.go:80\nsigs.k8s.io/controller-runtime/pkg/reconcile.Func.Reconcile\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/reconcile/reconcile.go:113\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).Reconcile\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:114\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).reconcileHandler\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:311\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).processNextWorkItem\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:261\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).Start.func2.2\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:222"}
{"level":"error","ts":"2024-05-27T09:34:41Z","logger":"reconciler.scan job","msg":"Scan job container","job":"trivy-system/scan-vulnerabilityreport-9fdb684cc","container":"linkerd-proxy","status.reason":"Error","status.message":"","stacktrace":"github.com/aquasecurity/trivy-operator/pkg/vulnerabilityreport/controller.(*ScanJobController).completedContainers\n\t/home/runner/work/trivy-operator/trivy-operator/pkg/vulnerabilityreport/controller/scanjob.go:353\ngit.luolix.top/aquasecurity/trivy-operator/pkg/vulnerabilityreport/controller.(*ScanJobController).SetupWithManager.(*ScanJobController).reconcileJobs.func1\n\t/home/runner/work/trivy-operator/trivy-operator/pkg/vulnerabilityreport/controller/scanjob.go:80\nsigs.k8s.io/controller-runtime/pkg/reconcile.Func.Reconcile\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/reconcile/reconcile.go:113\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).Reconcile\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:114\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).reconcileHandler\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:311\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).processNextWorkItem\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:261\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).Start.func2.2\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:222"}
{"level":"error","ts":"2024-05-27T09:34:44Z","logger":"reconciler.scan job","msg":"Scan job container","job":"trivy-system/scan-vulnerabilityreport-d68d89976","container":"linkerd-network-validator","status.reason":"Error","status.message":"","stacktrace":"github.com/aquasecurity/trivy-operator/pkg/vulnerabilityreport/controller.(*ScanJobController).completedContainers\n\t/home/runner/work/trivy-operator/trivy-operator/pkg/vulnerabilityreport/controller/scanjob.go:353\ngit.luolix.top/aquasecurity/trivy-operator/pkg/vulnerabilityreport/controller.(*ScanJobController).SetupWithManager.(*ScanJobController).reconcileJobs.func1\n\t/home/runner/work/trivy-operator/trivy-operator/pkg/vulnerabilityreport/controller/scanjob.go:80\nsigs.k8s.io/controller-runtime/pkg/reconcile.Func.Reconcile\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/reconcile/reconcile.go:113\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).Reconcile\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:114\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).reconcileHandler\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:311\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).processNextWorkItem\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:261\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).Start.func2.2\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:222"}
{"level":"error","ts":"2024-05-27T09:34:44Z","logger":"reconciler.scan job","msg":"Scan job container","job":"trivy-system/scan-vulnerabilityreport-d68d89976","container":"linkerd-proxy","status.reason":"Error","status.message":"","stacktrace":"github.com/aquasecurity/trivy-operator/pkg/vulnerabilityreport/controller.(*ScanJobController).completedContainers\n\t/home/runner/work/trivy-operator/trivy-operator/pkg/vulnerabilityreport/controller/scanjob.go:353\ngit.luolix.top/aquasecurity/trivy-operator/pkg/vulnerabilityreport/controller.(*ScanJobController).SetupWithManager.(*ScanJobController).reconcileJobs.func1\n\t/home/runner/work/trivy-operator/trivy-operator/pkg/vulnerabilityreport/controller/scanjob.go:80\nsigs.k8s.io/controller-runtime/pkg/reconcile.Func.Reconcile\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/reconcile/reconcile.go:113\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).Reconcile\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:114\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).reconcileHandler\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:311\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).processNextWorkItem\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:261\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).Start.func2.2\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:222"}
{"level":"error","ts":"2024-05-27T09:34:44Z","logger":"reconciler.scan job","msg":"Scan job container","job":"trivy-system/scan-vulnerabilityreport-d68d89976","container":"proxy-injector","status.reason":"Error","status.message":"","stacktrace":"github.com/aquasecurity/trivy-operator/pkg/vulnerabilityreport/controller.(*ScanJobController).completedContainers\n\t/home/runner/work/trivy-operator/trivy-operator/pkg/vulnerabilityreport/controller/scanjob.go:353\ngit.luolix.top/aquasecurity/trivy-operator/pkg/vulnerabilityreport/controller.(*ScanJobController).SetupWithManager.(*ScanJobController).reconcileJobs.func1\n\t/home/runner/work/trivy-operator/trivy-operator/pkg/vulnerabilityreport/controller/scanjob.go:80\nsigs.k8s.io/controller-runtime/pkg/reconcile.Func.Reconcile\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/reconcile/reconcile.go:113\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).Reconcile\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:114\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).reconcileHandler\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:311\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).processNextWorkItem\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:261\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).Start.func2.2\n\t/home/runner/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.2/pkg/internal/controller/controller.go:222"} Stacktrace
|
Same stacktrace is found on #2101 (comment) too. |
@sheeeng what is the status of this issue have you found workaround |
@sheeeng the errors issue fixed by |
@chen-keinan, The issue is still reproducible with |
@sheeeng can you clarify which errors, you mean the log errors ? |
@chen-keinan, these error logs:
|
the errors appear on |
Yes, the errors appear with the given minimal example. |
This issue is stale because it has been labeled with inactivity. |
What steps did you take and what happened:
What did you expect to happen:
The error message should not appear.
Anything else you would like to add:
No.
Environment:
trivy-operator version
):0.22.1
kubectl version
):v1.28.5
macOS 14.5 (23F79)
The text was updated successfully, but these errors were encountered: