Debug Image Vulnerabilities #6161
Replies: 3 comments 4 replies
-
The Dockerfile is multi-stage so yes there is a single definition for all architectures and image types. The debug image is not intended for production and has a large number of tools included specifically to help debug or develop (e.g. valgrind): it is very much intended to help debug things rather than be used directly. Those vulnerabilities will likely be from the dependencies of the tools installed as the debug image is the production binaries (useful aspect of multi-stage builds) on top of a Debian image with Debian dependencies installed. There have been other requests for adding those tools in the debug image as this was required prior to the advent of debug containers in K8S for example. I know it does not help your specific case which I think is to have a debug image available internally? What's the specific need for the debug image itself and maybe we can work from there? |
Beta Was this translation helpful? Give feedback.
-
Thanks for all that info Patrick. Much appreciated. My use case is quite simple on batch/cronjobs the k8s pod gets stuck in a NotReady state due to the fluent-bit side car is still running. I've been using an older version of the debug image to run a shell command to look for the existence of a file (that is created on the completion of the main container) and once found it will kill the fluent bit process. k8s manifest looks something like this
side car
I understand this is more of a k8s issue than fluent-bit. I tried following this tutorial https://suraj.io/post/how-to-gracefully-kill-kubernetes-jobs-with-a-sidecar/ to see if I can kill the fluent-bit side car by adding shareProcessNamespace and killing the process from the main container but it didn't work for me.
|
Beta Was this translation helpful? Give feedback.
-
Perfect thanks again Pat. I was actually able to get the pod to go to a COMPELTE status after changing the script slightly to;
Job got marked as completed
I had to install procps on my image to use the above command but I did some searching on my company's repository and found someone else was doing the same without installing that package. They take advantage of the |
Beta Was this translation helpful? Give feedback.
-
Are there any plans to update the debug image with one that isn't filled with vulnerabilities?
See scan result here;
https://trivy.dev/results/?image=fluent/fluent-bit:1.9.9-debug
There are few guardrails set up in my place preventing me from pulling this image into my companies registry due to the vulnerabilities.
Also is this the debug Dockerfile https://github.com/fluent/fluent-bit/blob/master/dockerfiles/Dockerfile ?
Beta Was this translation helpful? Give feedback.
All reactions