-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ziti-router: introduced health checks fail #226
Comments
Yes, I think the read only root might have prevented placing the IPC socket used by the probe. It will be more elegant to use the controller and router HTTP health checks, but there's a little work needed to template those on a separate web listener's binding. That way they'll be published to the kubelet but not to all IP addresses, especially avoiding publishing them with the client API, because they could represent a vector for DoS. |
What is the path to the IPC socket? We could mount a tmpfs for the IPC to have an initial solution before migrating to the HTTP checks. |
That might work. I've only observed the IPC socket in paths like this: |
That was it. I just added additionalVolumes:
- name: tmp
volumeType: emptyDir
mountPath: /tmp and the health checks started working. What do you think? Should we add an emptyDir to /tmp by default or should we keep it this way? At least I would extend it to limit the size of the emptyDir |
It seems reasonable for us chart maintainers to define a non root emptyDir volume for temp, or to find a way to influence the socket path and ensure a writable volume is available there. I'll support using /tmp until we have a reason not to. |
Hi,
I tried to upgrade to the latest helm charts. For my router the deployment never became active and was restarting. After some investigation I noticed the health checks introduced in this commit 3c2afc5 fialed to succeed. After manually removing them from the deplyment it became active and everything worked as expected.
I tried to execute them manually in the pod and it seems
ziti agent stats
fails to find the ziti router process:Hint: I'm using security contexts as additional security layer on my containers:
might this prevent
ziti agent stats
to find its process?bye,
Chris
The text was updated successfully, but these errors were encountered: