Add error handling for cri and podman engines when container events are disabled and go-channels are closed early - also add retry logic in fetcher channel to prevent missing container info due to timing issues with cri engine#900
Conversation
|
Thank you very much, doing the codereview now! :) |
Signed-off-by: Klaus Wagner <Klaus.Wagner@erstegroup.com>
…nd podman engines Signed-off-by: Klaus Wagner <Klaus.Wagner@erstegroup.com>
FedeDP
left a comment
There was a problem hiding this comment.
All in all, a bunch of great fixes and improvements to make container plugin more reliable.
I already shared my huge appreciation on falcosecurity/falco#3610, but let me share it too :) Thank you very much for your great work!
I left some suggestions/small things to improve, but all in all this is looking really good!
|
Oh and it seems that we also broke podman tests somewhere :) |
Rules files suggestions |
|
/hold |
Co-authored-by: Federico Di Pierro <nierro92@gmail.com> Signed-off-by: Klaus Wagner <nenioscio@gmail.com>
Co-authored-by: Federico Di Pierro <nierro92@gmail.com> Signed-off-by: Klaus Wagner <nenioscio@gmail.com>
Rules files suggestions |
…nt definition Signed-off-by: Klaus Wagner <Klaus.Wagner@erstegroup.com>
Rules files suggestions |
Signed-off-by: Klaus Wagner <Klaus.Wagner@erstegroup.com>
I managed to fix this - "system.Events" yields nil on successful init so I ignore it when the error side-channel is processed |
Rules files suggestions |
FedeDP
left a comment
There was a problem hiding this comment.
Changes LGTM!
We can further optimize the way we kill goroutines dynamically from workerLoop, but aside from that (that should be a corner case of a corner case btw), everything looks good!
/approve
|
LGTM label has been added. DetailsGit tree hash: a514d8f94d579725020df8709ef6abdc32923a7a |
|
/unhold |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: ekoops, FedeDP, nenioscio The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
What type of PR is this?
/kind bug
Any specific area of the project related to this PR?
/area plugins
What this PR does / why we need it:
Which issue(s) this PR fixes:
Fixes
Fixes falcosecurity/falco#3610 and falcosecurity/falco#3630
Special notes for your reviewer:
@FedeDP : this pull request is based new commit on top of already discussed commit 28cb4d4 which already include the changes you requested via inline comments