-
Notifications
You must be signed in to change notification settings - Fork 5.1k
Logviewer addon update:containerd log format support and some bugfixes #19546
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
[APPROVALNOTIFIER] This PR is NOT APPROVED
This pull-request has been approved by: ivans3
Once this PR has been reviewed and has the lgtm label, please assign spowelljr for approval. For more information see the Kubernetes Code Review Process.
The full list of commands accepted by this bot can be found here.
Approvers can indicate their approval by writing /approve
in a comment
Approvers can cancel approval by writing /approve cancel
in a comment
Hi @ivans3. Thanks for your PR.
I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test
on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.
Once the patch is verified, the new status will be reflected by the ok-to-test
label.
I understand the commands that are listed here.
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.
Can one of the admins verify this patch?
Hi @medyagh Sure sounds good. I changed the tag name to v1
and will use v2,v3,etc... for any subsequent updates
Hi @ivans3, the new image has two critical CVEs, do you think you could resolve those?
1C 6H 1M 0L 5? stdlib 1.21.6
pkg:golang/stdlib@1.21.6
✗ CRITICAL CVE-2024-24790
https://scout.docker.com/v/CVE-2024-24790
Affected range : <1.21.11
Fixed version : 1.21.11
1C 4H 18M 0L 3? openssl 3.0.7-r2
pkg:apk/alpine/openssl@3.0.7-r2?os_name=alpine&os_version=3.17
✗ CRITICAL CVE-2024-5535
https://scout.docker.com/v/CVE-2024-5535
Affected range : <3.0.14-r0
Fixed version : 3.0.14-r0
Hi @spowelljr okay i updated the packages as requested to address the CVEs. Can you give it another scan and let me know?
Thanks!
The critical ones are gone now, I still see some high for Go, would you be able to bump go to +1.22.7?
0C 4H 0M 0L 1? stdlib 1.21.11
pkg:golang/stdlib@1.21.11
✗ HIGH CVE-2024-34158
https://scout.docker.com/v/CVE-2024-34158
Affected range : <1.22.7
Fixed version : 1.22.7
✗ HIGH CVE-2024-34156
https://scout.docker.com/v/CVE-2024-34156
Affected range : <1.22.7
Fixed version : 1.22.7
✗ HIGH CVE-2024-24791
https://scout.docker.com/v/CVE-2024-24791
Affected range : <1.21.12
Fixed version : 1.21.12
✗ HIGH CVE-2022-30635
https://scout.docker.com/v/CVE-2022-30635
Affected range : <1.22.7
Fixed version : 1.22.7
✗ UNSPECIFIED CVE-2024-34155
https://scout.docker.com/v/CVE-2024-34155
Affected range : <1.22.7
Fixed version : 1.22.7
Hi @spowelljr okay i rebuilt using golang 1.22.8 and it showing now with 0 vulnerabilites for me. Can you please take a look?
Security wise it looks good @ivans3, two more things if you could:
- Could you add a small integration test for the addon, just to ensure the pods come up healthy, for reference:
minikube/test/integration/addons_test.go
Lines 753 to 761 in 9d3094c
// validateInspektorGadgetAddon tests the inspektor-gadget addon by ensuring the pod has come up and addon disablesfunc validateInspektorGadgetAddon(ctx context.Context, t *testing.T, profile string) {defer disableAddon(t, "inspektor-gadget", profile)defer PostMortemLogs(t, profile)if _, err := PodWait(ctx, t, profile, "gadget", "k8s-app=gadget", Minutes(8)); err != nil {t.Fatalf("failed waiting for inspektor-gadget pod: %v", err)}} - Would you be able to build the image for more machine architectures? arm64 would be the most important (~25% of users use arm64), less important, but if possible s390x, arm, and ppc64le would be great as well. Feel free to copy what I do for another one of the images to easily build multi-arch.
https://github.com/spowelljr/kube-registry-proxy/blob/main/Makefile
Hi @spowelljr okay i added the multi-arch (for amd64 and arm64 platforms), and a unit test. I tested both amd64 and arm64 builds, can you please take a look?
Thanks!
/ok-to-test
/retest-this-please
1 similar comment
/retest-this-please
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
minikube-pr-bot
commented
Oct 4, 2024
Here are the number of top 10 failed tests in each environments with lowest flake rate.
Besides the following environments also have failed tests:
To see the flake rates of all tests by environment, click here. |
minikube-pr-bot
commented
Oct 13, 2024
kvm2 driver with docker runtime
+----------------+----------+---------------------+
| COMMAND | MINIKUBE | MINIKUBE (PR 19546) |
+----------------+----------+---------------------+
| minikube start | 49.9s | 50.8s |
| enable ingress | 15.6s | 16.9s |
+----------------+----------+---------------------+
Times for minikube start: 48.9s 51.1s 48.5s 52.3s 48.6s
Times for minikube (PR 19546) start: 50.1s 50.4s 49.8s 51.7s 51.9s
Times for minikube ingress: 15.0s 15.0s 15.0s 18.5s 14.5s
Times for minikube (PR 19546) ingress: 15.0s 16.5s 19.0s 15.0s 19.0s
docker driver with docker runtime
+----------------+----------+---------------------+
| COMMAND | MINIKUBE | MINIKUBE (PR 19546) |
+----------------+----------+---------------------+
| minikube start | 21.6s | 21.7s |
| enable ingress | 12.9s | 12.6s |
+----------------+----------+---------------------+
Times for minikube start: 21.3s 21.4s 21.4s 21.1s 22.9s
Times for minikube (PR 19546) start: 24.7s 21.6s 20.4s 21.3s 20.7s
Times for minikube (PR 19546) ingress: 12.3s 12.3s 12.8s 12.3s 13.3s
Times for minikube ingress: 12.3s 12.8s 12.8s 13.3s 13.3s
docker driver with containerd runtime
+----------------+----------+---------------------+
| COMMAND | MINIKUBE | MINIKUBE (PR 19546) |
+----------------+----------+---------------------+
| minikube start | 21.0s | 20.1s |
| enable ingress | 37.4s | 37.3s |
+----------------+----------+---------------------+
Times for minikube (PR 19546) start: 19.9s 18.7s 22.2s 19.7s 20.1s
Times for minikube start: 19.4s 20.5s 20.0s 21.9s 23.1s
Times for minikube ingress: 38.8s 38.8s 38.8s 31.8s 38.8s
Times for minikube (PR 19546) ingress: 39.3s 39.3s 39.3s 38.8s 29.8s
k8s-triage-robot
commented
Jan 11, 2025
The Kubernetes project currently lacks enough contributors to adequately respond to all PRs.
This bot triages PRs according to the following rules:
- After 90d of inactivity,
lifecycle/stale
is applied - After 30d of inactivity since
lifecycle/stale
was applied,lifecycle/rotten
is applied - After 30d of inactivity since
lifecycle/rotten
was applied, the PR is closed
You can:
- Mark this PR as fresh with
/remove-lifecycle stale
- Close this PR with
/close
- Offer to help out with Issue Triage
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle stale
anmolsekhon590
commented
Jan 20, 2025
Hi @spowelljr @medyagh thanks for reviewing this! I'm interested in this PR.
I see most requested changes were made. Could please guide us if there are more changes needed?
/remove-lifecycle stale
anmolpayfirma
commented
Apr 22, 2025
/retest-this-please
PR needs rebase.
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.
Hi @medyagh @spowelljr I think we should remove this logviewer addon in favour of kubetail: #20345
There's no need for 2 logviewers and their project is more actively developed.
Should i close this PR, or use it to remove those addon files?
Thanks!
@ivans3 I just saw your comment from 2 months ago - thanks for the vote of confidence 🙏
@ivans3: The following test failed, say
Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
Hi,
Thank you for considering the Pull request. I have an update for the Logviewer addon.
Addon Description: Added in 2018, logviewer addon is an alternative to installing the ELK stack for log aggregation and logviewing through a web-interface. It is a light in-memory application that tails the container log files on disk.
PR Description: adding support and auto-detection of containerd log format. Also some minor fixes for formatting and browser inconsistencies. My team has been testing it for over a month and seems OK
https://github.com/ivans3/minikube-log-viewer (Unilicense)
Thanks!
ivans3