This Steadybit extension provides a container discovery and the various actions for container targets.
Learn about the capabilities of this extension in our Reliability Hub.
Environment Variable | Helm value | Meaning | Required | Default |
---|---|---|---|---|
STEADYBIT_EXTENSION_CONTAINER_RUNTIME |
container.runtime |
The container runtime to user either docker , containerd or cri-o . Will be automatically configured if not specified. |
yes | (auto) |
STEADYBIT_EXTENSION_CONTAINER_SOCKET |
containerRuntimes.(docker/containerd/cri-o).socket |
The socket used to connect to the container runtime. Will be automatically configured if not specified. | yes | (auto) |
STEADYBIT_EXTENSION_CONTAINERD_NAMESPACE |
The containerd namespace to use. | yes | k8s.io | |
STEADYBIT_EXTENSION_RUNC_ROOT |
containerRuntimes.(docker/containerd/cri-o).runcRoot |
The runc root to use. | yes | (auto) |
STEADYBIT_EXTENSION_RUNC_DEBUG |
Activate debug mode for runc. | yes | k8s.io | |
STEADYBIT_EXTENSION_RUNC_ROOTLESS |
Set value for runc --rootless parameter | yes | k8s.io | |
STEADYBIT_EXTENSION_RUNC_SYSTEMD_CGROUP |
Set value for runc --systemd-cgroup parameter | yes | k8s.io | |
STEADYBIT_EXTENSION_DISCOVERY_CALL_INTERVAL |
Interval for container discovery | false | 30s |
|
STEADYBIT_EXTENSION_DISABLE_DISCOVERY_EXCLUDES |
discovery.disableExcludes |
Ignore discovery excludes specified by steadybit.com/discovery-disabled |
false | false |
STEADYBIT_EXTENSION_DISCOVERY_ATTRIBUTES_EXCLUDES |
discovery.attributes.excludes |
List of Target Attributes which will be excluded during discovery. Checked by key equality and supporting trailing "*" | false | |
STEADYBIT_EXTENSION_HOSTNAME |
Optional hostname for the targets to be reported. If not given will be read from the UTS namespace of the init process | false |
The extension supports all environment variables provided by steadybit/extension-kit.
When installed as linux package this configuration is in/etc/steadybit/extension-container
.
The capabilities needed by this extension are: (which are provided by the helm chart)
SYS_ADMIN
SYS_CHROOT
SYS_PTRACE
NET_ADMIN
NET_BIND_SERVICE
DAC_OVERRIDE
SETUID
SETGID
KILL
AUDIT_WRITE
Optional:
SYS_RESOURCE
Detailed information about agent and extension installation in kubernetes can also be found in our documentation.
All extensions provide a helm chart that is also integrated in the helm-chart of the agent.
The extension is installed by default when you install the agent.
You can provide additional values to configure this extension.
--set extension-container.container.runtime=containerd \
Additional configuration options can be found in the helm-chart of the extension.
If you need more control, you can install the extension via its dedicated helm-chart.
helm repo add steadybit-extension-container https://steadybit.github.io/extension-container
helm repo update
helm upgrade steadybit-extension-container \
--install \
--wait \
--timeout 5m0s \
--create-namespace \
--namespace steadybit-agent \
--set container.runtime=docker \
steadybit-extension-container/steadybit-extension-container
Please use our agent-linux.sh script to install the extension on your Linux machine. The script will download the latest version of the extension and install it using the package manager.
After installing, configure the extension by editing /etc/steadybit/extension-container
and then restart the service.
Make sure that the extension is registered with the agent. In most cases this is done automatically. Please refer to the documentation for more information about extension registration and how to verify.
We try to limit the access needed for the extension to the absolute minimum. So the extension itself can run as a non-root user on a read-only root file-system and will, by default, if deployed using the provided helm chart.
In order to execute certain actions the extension needs extended capabilities, see details below.
For discovery and executing state attacks, such as stop or pause container, the extension needs access to the container runtime socket.
Resource attacks start stress-ng
processes, and network attacks start ip
or tc
processes, as runc container (sidecar)
using the root user (uid=0
, gid=0
) and reusing the target container's linux namespace(s) and control group(s). These
processes are short-lived and terminated after the attack is finished.
This requires the following capabilities:
CAP_SYS_CHROOT
, CAP_SYS_ADMIN
, CAP_SYS_PTRACE
, CAP_NET_ADMIN
, CAP_NET_BIND_SERVICE
CAP_DAC_OVERRIDE
, CAP_SETUID
, CAP_SETGID
, CAP_AUDIT_WRITE
, CAP_KILL
.
The CAP_SYS_RESOURCE
is optional. We'd recommend it to be used, otherwise the resource attacks are more likely to be
oomkilled by the kernel and fail to carry out the attack.
The needed binaries are included in the extension container image.
to exclude container from discovery you can add the label LABEL "steadybit.com.discovery-disabled"="true"
to the
container Dockerfile.
Using cgroups v2 on the host and nsdelegate
to mount the cgroup filesystem will prevent
the action from running processes in other cgroups (e.g. stress cpu/memory, disk fill).
In this case you need to remount the cgroup filesystem without the nsdelegate
option.
sudo mount -o remount,rw,nosuid,nodev,noexec,relatime -t cgroup2 none /sys/fs/cgroup