-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
systemd collector blocked by AppArmor when non root under kubernetes #3117
Comments
systemd_exporter exhibits the same behavior:
|
seems like a apparmor configuration issue, not an issue in the node-exporter |
@discordianfish thanks, I thought it was unconfined, but I must have messed up my check earlier. It appears to be an AppArmor profile from containerd.
This seems to have resolved the issue prometheus-community/helm-charts#2304 (comment)
This is vanilla Ubuntu 22.04 and rke2. I've found other reports out there, e.g. m-lab/k8s-support#708 It would seem reasonable to handle this by default or at least document it. |
The node-exporter itself has nothing to do with confining or not confining a container, this needs to be handled by whatever is deploying the node-exporter |
I realize there is a desire to deprecate this for systemd_exporter. I wasn't able to test systemd_exporter yet because of limitations with it's helm chart. I will try to replicate this there and report my findings.
Host operating system: output of
uname -a
Linux dev-master-0 5.15.0-119-generic #129-Ubuntu SMP Fri Aug 2 19:25:20 UTC 2024 x86_64 x86_64 x86_64 GNU/Linux
Ubuntu 22.04.4
node_exporter version: output of
node_exporter --version
node_exporter command line flags
node_exporter log output
Non-root
root
Are you running node_exporter in Docker?
No
What did you do that produced an error?
Enabled systemd collector
What did you expect to see?
No AppArmor error, as seen when run as root.
root
What did you see instead?
non-root
The text was updated successfully, but these errors were encountered: