Skip to content

Unable to use Audit Log Profile - SecurityContext replaced by Profile Recording is namespaced when LocalHostProfile is not #2904

@jwlai

Description

@jwlai

What happened:

I installed the security-profiles-operator (both the main branch, and v0.9.1) and followed the instructions to setup audit.log monitoring. However, after enabling log-enricher in the DS, I created a pod and it gives me the following error

Error: failed to create containerd container: cannot load seccomp profile "/var/lib/kubelet/seccomp/operator/security-profiles-operator/log-enricher-trace.json": open /var/lib/kubelet/seccomp/operator/security-profiles-operator/log-enricher-trace.json: no such file or directory

The pathing seems to be off as in the generated log-enricher-trace SeccompProfile object has the LocalhostProfile as operator/log-enricher-trace.json

The status is Installed as shown below.
Image

I'm not sure what to do to remediate, I would like to use this to managed seccompProfiles as we are attempting to enable them in our cluster. The issue that was most similar is as follows #1103. The solution is not clear apart from creating a new cluster. I did not attempt to create a new cluster yet so cannot verify.

What you expected to happen:

Instructions in the example to work and allow profiles to be written out as described

How to reproduce it (as minimally and precisely as possible):

Installed application
Followed Usage guide and applied YAML manifests to cluster.

Anything else we need to know?:

Additional Logs

Log-enricher:

system_u:object_r:container_file_t:s0 tclass=sock_file permissive=1" logger="log-enricher"
I0701 17:47:51.630332 3378664 enricher.go:166] "Get container ID for PID: 1763" logger="log-enricher"
E0701 17:47:51.632938 3378664 enricher.go:179] "unable to get container ID" err="unable to find container ID in cgroup path" logger="log-enricher" processID=1763

Environment:

  • Cloud provider or hardware configuration: AWS (Running EKS 1.32)
  • Kernel (e.g. uname -a): Linux node-checker-2g7pm 6.1.132-147.221.amzn2023.x86_64 Implement minimal valuable implementation  #1 SMP PREEMPT_DYNAMIC Tue Apr 8 13:14:54 UTC 2025 x86_64 GNU/Linux

Metadata

Metadata

Assignees

No one assigned

    Labels

    kind/bugCategorizes issue or PR as related to a bug.lifecycle/rottenDenotes an issue or PR that has aged beyond stale and will be auto-closed.

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions