Skip to main content
Version: latest

Using advise seccomp-profile

The seccomp profile advisor gadget records syscalls that are issued in a specified pod, and then uses this information to generate the corresponding seccomp profile. It can integrate with the Kubernetes Security Profile Operator, directly generating the necessary seccompprofile resource.

On Kubernetes

Basic usage

For this demo, we will use a sample Python workload that uses uwsgi, flask and nginx. The deployment is split in two pieces, the basic.yaml file that has the infrastructure, and the unconfined.yaml file that has the pod definition, with no seccomp profile applied.

$ kubectl apply -f https://raw.githubusercontent.com/inspektor-gadget/inspektor-gadget/main/docs/examples/seccomp/basic.yaml
namespace/seccomp-demo created
configmap/app-script created
service/hello-python-service created
$ kubectl apply -f https://raw.githubusercontent.com/inspektor-gadget/inspektor-gadget/main/docs/examples/seccomp/unconfined.yaml
pod/hello-python created

It is now time to monitor system calls made by our pod:

$ kubectl gadget advise seccomp-profile start -n seccomp-demo -p hello-python
jMzhur2dQjZJxDCI

The string we receive is the identifier that we will use to refer to the running operation when we want to stop it.

While the advisor is running, we need to interact with the workload, to get it to generate system calls. In our example, it's a simple webservice, and we can interact with it by forwarding the service port and then querying the service

$ kubectl port-forward service/hello-python-service -n seccomp-demo 8080:6000 &
[1] 23574
Forwarding from 127.0.0.1:8080 -> 80
Forwarding from [::1]:8080 -> 80

$ curl localhost:8080
Handling connection for 8080
Hello World!

$ kill %1
[1]+ Terminated kubectl port-forward service/hello-python-service -n seccomp-demo 8080:6000

Once we have captured the syscalls, we can ask the gadget to generate the corresponding profile, by stopping the operation with the identifier we had received before.

$ kubectl gadget advise seccomp-profile stop jMzhur2dQjZJxDCI
{
"defaultAction": "SCMP_ACT_ERRNO",
"architectures": [
"SCMP_ARCH_X86_64",
"SCMP_ARCH_X86",
"SCMP_ARCH_X32"
],
"syscalls": [
{
"names": [
"accept4",
"close",
"connect",
"epoll_ctl",
"epoll_wait",
"fstat",
"getsockname",
"getsockopt",
"ioctl",
"poll",
"read",
"recvfrom",
"setsockopt",
"socket",
"stat",
"wait4",
"write",
"writev"
],
"action": "SCMP_ACT_ALLOW"
}
]
}

Capturing all syscalls needed to bring up the pod

That sample policy contains only the syscalls executed for that one single request that we made. If we want to apply a policy to our pod, we need to also include all the calls needed to bring the pod up. To do that, we need to start the trace before the pod is up, then bring up the pod and generate traffic.

We can delete the current pod, so that we can start a fresh new trace.

$ kubectl delete -f https://raw.githubusercontent.com/inspektor-gadget/inspektor-gadget/main/docs/examples/seccomp/unconfined.yaml
pod "hello-python" deleted

Now we can create a new trace, and then create the pod again.

$ kubectl gadget advise seccomp-profile start -n seccomp-demo -p hello-python
TAyR9BXes6GU04rG
$ kubectl apply -f https://raw.githubusercontent.com/inspektor-gadget/inspektor-gadget/main/docs/examples/seccomp/unconfined.yaml
pod/hello-python created

Once the pod is up, we can once again generate some traffic, like before.

$ kubectl port-forward service/hello-python-service -n seccomp-demo 8080:6000 &
[1] 28318
Forwarding from 127.0.0.1:8080 -> 80
Forwarding from [::1]:8080 -> 80

$ curl localhost:8080
Handling connection for 8080
Hello World!

$ kill %1
[1]+ Terminated kubectl port-forward service/hello-python-service -n seccomp-demo 8080:6000

And now generate the policy again:

$ kubectl gadget advise seccomp-profile stop TAyR9BXes6GU04rG
{
...
}

This time, the output field will contain a lot more syscalls, as a lot of operations need to take place to bring up the pod.

Integration with Kubernetes Security Profiles Operator

We can use the output stored in the trace to create the seccomp policy for our pod. But instead of copying it manually, we can also use the integration with the Kubernetes Security Profiles Operator (SPO). Notice the seccomp gadget uses the seccomp profile API v1beta1, so at least SPO v0.4.0 is required. Check the SPO documentation for details about installation. Once the SPO is installed, the seccomp gadget can generate seccompprofile resources that can be used directly by our pods.

We need to use the --output-mode (or simply -m) option to create the SeccompProfile resource instead of printing the policy in the terminal (default behaviour). Consider that using the option --profile-prefix, we can specify the namespace and the prefix-name of the resource: namespace/prefix-name. Notice the namespace is not mandatory. If the option --profile-prefix is not used, the resource will be automatically named using the pod name, and it will be created in the trace's namespace (gadget if kubectl-gadget CLI was used).

# Delete the pod.
$ kubectl delete -f https://raw.githubusercontent.com/inspektor-gadget/inspektor-gadget/main/docs/examples/seccomp/unconfined.yaml
pod "hello-python" deleted

# Create the pod and start a new trace again
$ kubectl gadget advise seccomp-profile start -m seccomp-profile -n seccomp-demo -p hello-python
TAyR9BXes6GU04rG
$ kubectl apply -f https://raw.githubusercontent.com/inspektor-gadget/inspektor-gadget/main/docs/examples/seccomp/unconfined.yaml
pod/hello-python created

# Generate traffic once again
$ kubectl port-forward service/hello-python-service -n seccomp-demo 8080:6000 &
[1] 33679
Forwarding from 127.0.0.1:8080 -> 80
Forwarding from [::1]:8080 -> 80
$ curl localhost:8080
Handling connection for 8080
Hello World!
$ kill %1
[1]+ Terminated kubectl port-forward service/hello-python-service -n seccomp-demo 8080:6000

# Now stop the gadget to generate the seccomp profile.
$ kubectl gadget advise seccomp-profile stop TAyR9BXes6GU04rG
$ kubectl get seccompprofile -n gadget
NAME STATUS AGE
hello-python Installed 9s

This profile can now be used as the seccomp profile for our pod. To do that, we need to edit the configuration and replace the Unconfined setting in our profile type, set it to Localhost, and add a localhostProfile entry that points to the profile we just generated.

spec:
securityContext:
seccompProfile:
type: Localhost
localhostProfile: operator/gadget/hello-python.json

We have this change already applied in the confined.yaml file. To apply this change, we need to delete the current pod and create a new one with the new configuration:

$ kubectl delete -f https://raw.githubusercontent.com/inspektor-gadget/inspektor-gadget/main/docs/examples/seccomp/unconfined.yaml
pod "hello-python" deleted
$ kubectl apply -f https://raw.githubusercontent.com/inspektor-gadget/inspektor-gadget/main/docs/examples/seccomp/confined.yaml
pod/hello-python created

Our workload is now running with the seccomp profile. We can verify that it's running correctly by querying it once again like before:

$ kubectl port-forward service/hello-python-service -n seccomp-demo 8080:6000 &
[1] 41643
$ Forwarding from 127.0.0.1:8080 -> 80
Forwarding from [::1]:8080 -> 80

$ curl localhost:8080
Handling connection for 8080
Hello World!

The request is allowed (as expected), but processes that require additional syscalls will be blocked. For example, if we try to execute a shell in our pod:

$ kubectl exec -it -n seccomp-demo hello-python -- /bin/bash
bash: initialize_job_control: getpgrp failed: Success
command terminated with exit code 1

We see that the seccomp profile is preventing this execution, and it will prevent any other execution that requires syscalls that were not part of the captured calls.

Cleanup

Once we're done with the demo, we can delete all the resources that we've used by deleting the seccomp-demo namespace:

$ kubectl delete ns seccomp-demo
namespace "seccomp-demo" deleted

With ig

TODO!

Troubleshooting

  1. If the annotations don't do anything, check that the node field is set correctly. You can also look at the Status field of the Trace for other possible errors.

  2. If the confined pod fails to start with this error: cannot load seccomp profile "/var/lib/kubelet/seccomp/operator/seccomp-demo/hello-profile.json", check that the operator is correctly installed and all pods involved are running.