Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Trivy operator transfer data a lot through NAT gateway #1744

Closed
chary1112004 opened this issue Jan 5, 2024 · 25 comments
Closed

Trivy operator transfer data a lot through NAT gateway #1744

chary1112004 opened this issue Jan 5, 2024 · 25 comments
Labels
kind/bug Categorizes issue or PR as related to a bug.

Comments

@chary1112004
Copy link

chary1112004 commented Jan 5, 2024

What steps did you take and what happened:

Hi,

Currently we detect trivy operator transfer data through NAT gateway (we are using AWS) quite amount data then it really cost.

Every time pod scan-vulnerabilityreport-* is started then it download/connect to amount of docker images. Does trivy operator support cache or database to re-use without download?

Dec 29 08:17:15.201: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:56162 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query ghcr.io.trivy-system.svc.cluster.local. AAAA)
Dec 29 08:17:15.201: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:53740 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query ghcr.io.trivy-system.svc.cluster.local. A)
Dec 29 08:17:15.202: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:53740 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy ghcr.io.trivy-system.svc.cluster.local. A))
Dec 29 08:17:15.202: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:56162 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy ghcr.io.trivy-system.svc.cluster.local. AAAA))
Dec 29 08:17:15.203: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:41415 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query ghcr.io.svc.cluster.local. AAAA)
Dec 29 08:17:15.203: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:59809 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query ghcr.io.svc.cluster.local. A)
Dec 29 08:17:15.204: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:41415 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy ghcr.io.svc.cluster.local. AAAA))
Dec 29 08:17:15.204: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:59809 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy ghcr.io.svc.cluster.local. A))
Dec 29 08:17:15.205: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:35222 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query ghcr.io.cluster.local. AAAA)
Dec 29 08:17:15.205: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:34234 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query ghcr.io.cluster.local. A)
Dec 29 08:17:15.206: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:35222 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy ghcr.io.cluster.local. AAAA))
Dec 29 08:17:15.206: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:34234 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy ghcr.io.cluster.local. A))
Dec 29 08:17:15.207: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:36357 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query ghcr.io.eu-central-1.compute.internal. A)
Dec 29 08:17:15.207: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:37929 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query ghcr.io.eu-central-1.compute.internal. AAAA)
Dec 29 08:17:15.209: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:36357 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy ghcr.io.eu-central-1.compute.internal. A))
Dec 29 08:17:15.209: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:37929 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy ghcr.io.eu-central-1.compute.internal. AAAA))
Dec 29 08:17:15.210: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:45946 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query ghcr.io. AAAA)
Dec 29 08:17:15.210: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:49437 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query ghcr.io. A)
Dec 29 08:17:15.211: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:45946 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer  TTL: 4294967295 (Proxy ghcr.io. AAAA))
Dec 29 08:17:15.213: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:49437 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer "140.82.121.34" TTL: 30 (Proxy ghcr.io. A))
Dec 29 08:17:15.880: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:40574 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query pkg-containers.githubusercontent.com.trivy-system.svc.cluster.local. A)
Dec 29 08:17:15.880: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:45543 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query pkg-containers.githubusercontent.com.trivy-system.svc.cluster.local. AAAA)
Dec 29 08:17:15.880: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:45543 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy pkg-containers.githubusercontent.com.trivy-system.svc.cluster.local. AAAA))
Dec 29 08:17:15.881: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:40574 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy pkg-containers.githubusercontent.com.trivy-system.svc.cluster.local. A))
Dec 29 08:17:15.881: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:53047 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query pkg-containers.githubusercontent.com.svc.cluster.local. AAAA)
Dec 29 08:17:15.881: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:35488 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query pkg-containers.githubusercontent.com.svc.cluster.local. A)
Dec 29 08:17:15.882: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:35488 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy pkg-containers.githubusercontent.com.svc.cluster.local. A))
Dec 29 08:17:15.883: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:53047 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy pkg-containers.githubusercontent.com.svc.cluster.local. AAAA))
Dec 29 08:17:15.883: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:43756 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query pkg-containers.githubusercontent.com.cluster.local. AAAA)
Dec 29 08:17:15.883: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:42635 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query pkg-containers.githubusercontent.com.cluster.local. A)
Dec 29 08:17:15.884: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:42635 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy pkg-containers.githubusercontent.com.cluster.local. A))
Dec 29 08:17:15.884: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:43756 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy pkg-containers.githubusercontent.com.cluster.local. AAAA))
Dec 29 08:17:15.885: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:43077 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query pkg-containers.githubusercontent.com.eu-central-1.compute.internal. AAAA)
Dec 29 08:17:15.885: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:59619 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query pkg-containers.githubusercontent.com.eu-central-1.compute.internal. A)
Dec 29 08:17:15.887: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:43077 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy pkg-containers.githubusercontent.com.eu-central-1.compute.internal. AAAA))
Dec 29 08:17:15.888: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:59619 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy pkg-containers.githubusercontent.com.eu-central-1.compute.internal. A))
Dec 29 08:17:15.888: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:34757 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query pkg-containers.githubusercontent.com. A)
Dec 29 08:17:15.888: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:42171 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query pkg-containers.githubusercontent.com. AAAA)
Dec 29 08:17:15.890: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:42171 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer "2606:50c0:8003::154,2606:50c0:8000::154,2606:50c0:8001::154,2606:50c0:8002::154" TTL: 30 (Proxy pkg-containers.githubusercontent.com. AAAA))
Dec 29 08:17:15.890: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:34757 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer "185.199.111.154,185.199.110.154,185.199.109.154,185.199.108.154" TTL: 30 (Proxy pkg-containers.githubusercontent.com. A))
Dec 29 08:17:24.894: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:55147 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query index.docker.io.trivy-system.svc.cluster.local. A)
Dec 29 08:17:24.894: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:56528 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query index.docker.io.trivy-system.svc.cluster.local. AAAA)
Dec 29 08:17:24.897: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:56528 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy index.docker.io.trivy-system.svc.cluster.local. AAAA))
Dec 29 08:17:24.897: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:55147 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy index.docker.io.trivy-system.svc.cluster.local. A))
Dec 29 08:17:24.901: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:36095 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query index.docker.io.svc.cluster.local. AAAA)
Dec 29 08:17:24.902: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:35454 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query index.docker.io.svc.cluster.local. A)
Dec 29 08:17:24.902: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:35454 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy index.docker.io.svc.cluster.local. A))
Dec 29 08:17:24.903: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:36095 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy index.docker.io.svc.cluster.local. AAAA))
Dec 29 08:17:24.903: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:41281 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query index.docker.io.cluster.local. A)
Dec 29 08:17:24.904: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:53492 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query index.docker.io.cluster.local. AAAA)
Dec 29 08:17:24.904: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:53492 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy index.docker.io.cluster.local. AAAA))
Dec 29 08:17:24.905: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:41281 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy index.docker.io.cluster.local. A))
Dec 29 08:17:24.905: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:38670 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query index.docker.io.eu-central-1.compute.internal. A)
Dec 29 08:17:24.906: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:36862 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query index.docker.io.eu-central-1.compute.internal. AAAA)
Dec 29 08:17:24.911: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:36862 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy index.docker.io.eu-central-1.compute.internal. AAAA))
Dec 29 08:17:24.911: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:38670 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy index.docker.io.eu-central-1.compute.internal. A))
Dec 29 08:17:24.912: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:54567 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query index.docker.io. A)
Dec 29 08:17:24.913: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:58056 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query index.docker.io. AAAA)
Dec 29 08:17:24.915: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:54567 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer "54.196.99.49,34.226.69.105,3.219.239.5" TTL: 30 (Proxy index.docker.io. A))
Dec 29 08:17:24.915: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:58056 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer "2600:1f18:2148:bc01:20a3:9c3e:d4a7:9fb,2600:1f18:2148:bc02:2640:1b90:cea6:b6b5,2600:1f18:2148:bc00:41e1:f57f:e2e2:5e54" TTL: 30 (Proxy index.docker.io. AAAA))
Dec 29 08:17:25.217: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:38380 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query auth.docker.io.trivy-system.svc.cluster.local. AAAA)
Dec 29 08:17:25.217: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:37853 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query auth.docker.io.trivy-system.svc.cluster.local. A)
Dec 29 08:17:25.218: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:38380 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy auth.docker.io.trivy-system.svc.cluster.local. AAAA))
Dec 29 08:17:25.218: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:37853 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy auth.docker.io.trivy-system.svc.cluster.local. A))
Dec 29 08:17:25.219: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:39715 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query auth.docker.io.svc.cluster.local. AAAA)
Dec 29 08:17:25.219: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:37092 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query auth.docker.io.svc.cluster.local. A)
Dec 29 08:17:25.219: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:39715 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy auth.docker.io.svc.cluster.local. AAAA))
Dec 29 08:17:25.219: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:37092 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy auth.docker.io.svc.cluster.local. A))
Dec 29 08:17:25.220: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:51241 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query auth.docker.io.cluster.local. A)
Dec 29 08:17:25.220: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:50912 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query auth.docker.io.cluster.local. AAAA)
Dec 29 08:17:25.220: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:51241 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy auth.docker.io.cluster.local. A))
Dec 29 08:17:25.221: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:50912 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy auth.docker.io.cluster.local. AAAA))
Dec 29 08:17:25.221: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:56103 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query auth.docker.io.eu-central-1.compute.internal. AAAA)
Dec 29 08:17:25.221: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:57168 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query auth.docker.io.eu-central-1.compute.internal. A)
Dec 29 08:17:25.224: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:56103 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy auth.docker.io.eu-central-1.compute.internal. AAAA))
Dec 29 08:17:25.224: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:57168 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy auth.docker.io.eu-central-1.compute.internal. A))
Dec 29 08:17:25.224: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:43059 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query auth.docker.io. A)
Dec 29 08:17:25.225: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:39673 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query auth.docker.io. AAAA)
Dec 29 08:17:25.226: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:39673 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer "2600:1f18:2148:bc02:2640:1b90:cea6:b6b5,2600:1f18:2148:bc00:41e1:f57f:e2e2:5e54,2600:1f18:2148:bc01:20a3:9c3e:d4a7:9fb" TTL: 5 (Proxy auth.docker.io. AAAA))
Dec 29 08:17:25.227: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:43059 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer "34.226.69.105,54.196.99.49,3.219.239.5" TTL: 6 (Proxy auth.docker.io. A))
Dec 29 08:17:25.754: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:34275 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query production.cloudflare.docker.com.trivy-system.svc.cluster.local. AAAA)
Dec 29 08:17:25.754: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:39495 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query production.cloudflare.docker.com.trivy-system.svc.cluster.local. A)
Dec 29 08:17:25.757: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:34275 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy production.cloudflare.docker.com.trivy-system.svc.cluster.local. AAAA))
Dec 29 08:17:25.757: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:39495 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy production.cloudflare.docker.com.trivy-system.svc.cluster.local. A))
Dec 29 08:17:25.758: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:40695 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query production.cloudflare.docker.com.svc.cluster.local. AAAA)
Dec 29 08:17:25.758: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:35365 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query production.cloudflare.docker.com.svc.cluster.local. A)
Dec 29 08:17:25.758: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:35365 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy production.cloudflare.docker.com.svc.cluster.local. A))
Dec 29 08:17:25.758: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:40695 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy production.cloudflare.docker.com.svc.cluster.local. AAAA))
Dec 29 08:17:25.759: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:56668 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query production.cloudflare.docker.com.cluster.local. A)
Dec 29 08:17:25.759: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:47845 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query production.cloudflare.docker.com.cluster.local. AAAA)
Dec 29 08:17:25.760: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:47845 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy production.cloudflare.docker.com.cluster.local. AAAA))
Dec 29 08:17:25.760: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:56668 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy production.cloudflare.docker.com.cluster.local. A))
Dec 29 08:17:25.761: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:36329 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query production.cloudflare.docker.com.eu-central-1.compute.internal. AAAA)
Dec 29 08:17:25.761: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:51297 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query production.cloudflare.docker.com.eu-central-1.compute.internal. A)
Dec 29 08:17:25.769: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:36329 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy production.cloudflare.docker.com.eu-central-1.compute.internal. AAAA))
Dec 29 08:17:25.773: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:51297 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy production.cloudflare.docker.com.eu-central-1.compute.internal. A))
Dec 29 08:17:25.774: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:47692 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query production.cloudflare.docker.com. AAAA)
Dec 29 08:17:25.774: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:50158 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query production.cloudflare.docker.com. A)
Dec 29 08:17:25.777: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:50158 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer "104.16.101.207,104.16.104.207,104.16.102.207,104.16.103.207,104.16.100.207" TTL: 30 (Proxy production.cloudflare.docker.com. A))
Dec 29 08:17:25.777: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:47692 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer "2606:4700::6810:67cf,2606:4700::6810:64cf,2606:4700::6810:68cf,2606:4700::6810:66cf,2606:4700::6810:65cf" TTL: 30 (Proxy production.cloudflare.docker.com. AAAA))
Dec 29 08:17:25.806: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:47122 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query index.docker.io.trivy-system.svc.cluster.local. AAAA)
Dec 29 08:17:25.806: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:40585 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query index.docker.io.trivy-system.svc.cluster.local. A)
Dec 29 08:17:25.807: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:47122 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy index.docker.io.trivy-system.svc.cluster.local. AAAA))
Dec 29 08:17:25.807: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:40585 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy index.docker.io.trivy-system.svc.cluster.local. A))
Dec 29 08:17:25.808: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:48353 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query index.docker.io.svc.cluster.local. AAAA)
Dec 29 08:17:25.808: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:52108 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query index.docker.io.svc.cluster.local. A)
Dec 29 08:17:25.808: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:52108 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy index.docker.io.svc.cluster.local. A))
Dec 29 08:17:25.808: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:48353 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy index.docker.io.svc.cluster.local. AAAA))
Dec 29 08:17:25.809: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:40735 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query index.docker.io.cluster.local. A)
Dec 29 08:17:25.809: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:43068 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query index.docker.io.cluster.local. AAAA)
Dec 29 08:17:25.810: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:40735 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy index.docker.io.cluster.local. A))
Dec 29 08:17:25.811: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:43068 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy index.docker.io.cluster.local. AAAA))
Dec 29 08:17:25.811: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:52100 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query index.docker.io.eu-central-1.compute.internal. A)
Dec 29 08:17:25.811: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:47384 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query index.docker.io.eu-central-1.compute.internal. AAAA)
Dec 29 08:17:25.812: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:47384 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy index.docker.io.eu-central-1.compute.internal. AAAA))
Dec 29 08:17:25.814: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:52100 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy index.docker.io.eu-central-1.compute.internal. A))
Dec 29 08:17:25.814: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:55381 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query index.docker.io. AAAA)
Dec 29 08:17:25.815: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:55410 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query index.docker.io. A)
Dec 29 08:17:25.815: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:55381 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer "2600:1f18:2148:bc00:41e1:f57f:e2e2:5e54,2600:1f18:2148:bc01:20a3:9c3e:d4a7:9fb,2600:1f18:2148:bc02:2640:1b90:cea6:b6b5" TTL: 30 (Proxy index.docker.io. AAAA))
Dec 29 08:17:25.817: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:55410 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer "3.219.239.5,34.226.69.105,54.196.99.49" TTL: 30 (Proxy index.docker.io. A))
Dec 29 08:17:26.678: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:42091 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query search.maven.org.trivy-system.svc.cluster.local. A)
Dec 29 08:17:26.678: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:37901 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query search.maven.org.trivy-system.svc.cluster.local. AAAA)
Dec 29 08:17:26.678: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:37901 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy search.maven.org.trivy-system.svc.cluster.local. AAAA))
Dec 29 08:17:26.681: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:42091 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy search.maven.org.trivy-system.svc.cluster.local. A))
Dec 29 08:17:26.685: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:48190 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query search.maven.org.svc.cluster.local. A)
Dec 29 08:17:26.685: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:48493 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query search.maven.org.svc.cluster.local. AAAA)
Dec 29 08:17:26.687: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:48493 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy search.maven.org.svc.cluster.local. AAAA))
Dec 29 08:17:26.687: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:48190 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy search.maven.org.svc.cluster.local. A))
Dec 29 08:17:26.770: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:57465 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query search.maven.org.cluster.local. A)
Dec 29 08:17:26.770: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:53387 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query search.maven.org.cluster.local. AAAA)
Dec 29 08:17:26.773: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:53387 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy search.maven.org.cluster.local. AAAA))
Dec 29 08:17:26.774: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:57465 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy search.maven.org.cluster.local. A))
Dec 29 08:17:26.776: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:54662 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query search.maven.org.eu-central-1.compute.internal. AAAA)
Dec 29 08:17:26.776: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:32892 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query search.maven.org.eu-central-1.compute.internal. A)
Dec 29 08:17:26.779: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:32892 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy search.maven.org.eu-central-1.compute.internal. A))
Dec 29 08:17:26.782: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:54662 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy search.maven.org.eu-central-1.compute.internal. AAAA))
Dec 29 08:17:26.865: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:57150 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query search.maven.org. A)
Dec 29 08:17:26.866: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:39815 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query search.maven.org. AAAA)
Dec 29 08:17:26.870: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:57150 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer "50.17.173.55,34.195.207.172" CNAMEs: "search-aws.maven.org.,search-maven-org-prod-env.us-east-1.elasticbeanstalk.com." TTL: 12 (Proxy search.maven.org. A))
Dec 29 08:17:26.870: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:39815 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer CNAMEs: "search-aws.maven.org.,search-maven-org-prod-env.us-east-1.elasticbeanstalk.com." TTL: 5 (Proxy search.maven.org. AAAA))
Dec 29 08:17:32.477: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:44638 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query search.maven.org.trivy-system.svc.cluster.local. AAAA)
Dec 29 08:17:32.483: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:44638 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy search.maven.org.trivy-system.svc.cluster.local. AAAA))
Dec 29 08:17:32.483: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:60579 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query search.maven.org.trivy-system.svc.cluster.local. A)
Dec 29 08:17:32.489: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:60579 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy search.maven.org.trivy-system.svc.cluster.local. A))
Dec 29 08:17:32.494: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:49351 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query search.maven.org.svc.cluster.local. A)
Dec 29 08:17:32.495: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:55637 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query search.maven.org.svc.cluster.local. AAAA)
Dec 29 08:17:32.499: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:55637 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy search.maven.org.svc.cluster.local. AAAA))
Dec 29 08:17:32.499: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:49351 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy search.maven.org.svc.cluster.local. A))
Dec 29 08:17:32.509: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:40415 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query search.maven.org.cluster.local. A)
Dec 29 08:17:32.509: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:58883 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query search.maven.org.cluster.local. AAAA)
Dec 29 08:17:32.509: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:40415 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy search.maven.org.cluster.local. A))
Dec 29 08:17:32.510: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:58883 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy search.maven.org.cluster.local. AAAA))
Dec 29 08:17:32.567: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:52281 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query search.maven.org.eu-central-1.compute.internal. A)
Dec 29 08:17:32.567: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:60503 (ID:8992) -> kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-request proxy FORWARDED (DNS Query search.maven.org.eu-central-1.compute.internal. AAAA)
Dec 29 08:17:32.569: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:52281 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy search.maven.org.eu-central-1.compute.internal. A))
Dec 29 08:17:32.570: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:60503 (ID:8992) <- kube-system/coredns-cbbbbb9cb-tkv5n:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer RCode: Non-Existent Domain TTL: 4294967295 (Proxy search.maven.org.eu-central-1.compute.internal. AAAA))
Dec 29 08:17:32.572: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:43767 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query search.maven.org. A)
Dec 29 08:17:32.572: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:40816 (ID:8992) -> kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-request proxy FORWARDED (DNS Query search.maven.org. AAAA)
Dec 29 08:17:32.582: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:40816 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer CNAMEs: "search-aws.maven.org.,search-maven-org-prod-env.us-east-1.elasticbeanstalk.com." TTL: 6 (Proxy search.maven.org. AAAA))
Dec 29 08:17:32.582: trivy-system/scan-vulnerabilityreport-77ddbfcd56-xnlbp:43767 (ID:8992) <- kube-system/coredns-cbbbbb9cb-4tgpk:53 (ID:19241) dns-response proxy FORWARDED (DNS Answer "34.195.207.172,50.17.173.55" CNAMEs: "search-aws.maven.org.,search-maven-org-prod-env.us-east-1.elasticbeanstalk.com." TTL: 7 (Proxy search.maven.org. A))

Helm chart installed: https://artifacthub.io/packages/helm/trivy-operator/trivy-operator/0.3.0

Any suggestion to resolve this issue would be very much appreciated!

Thanks

Environment:

  • Trivy-Operator version (use trivy-operator version): 0.3.0
  • Kubernetes version (use kubectl version): 1.25
  • OS (macOS 10.15, Windows 10, Ubuntu 19.10 etc):
@chary1112004 chary1112004 added the kind/bug Categorizes issue or PR as related to a bug. label Jan 5, 2024
@chen-keinan
Copy link
Contributor

@chary1112004 Trivy-operator v0.18.0 use SBOM cache and reduce the amount of download of image scan.

@chary1112004
Copy link
Author

@chen-keinan thank you for suggestion. We will upgrade to v0.18.0 and verify it. Thanks!

@chary1112004
Copy link
Author

chary1112004 commented Jan 8, 2024

@chen-keinan I would like to have question, what happen for images that are already downloaded and running in kubernetes during scanning. Does trivy download image inside before it starts scanning? Thanks!

@chen-keinan
Copy link
Contributor

@chen-keinan I would like to have question, what happen for images that are already downloaded and running in kubernetes during scanning. Does trivy download image inside before it starts scanning? Thanks!

its depend on which node the images where downloaded , if its on the same node then trivy will re-use.
we added sbom cache to re-use prev. scans of trivy it should solve the images download issue.

Note: if you use filesystem scan command then images will not be downloaded however it require privileged access

@chen-keinan
Copy link
Contributor

@chary1112004 do you still want to keep this issue open ?

@chary1112004
Copy link
Author

@chen-keinan I just come back this to verify. I will keep update once it works for us so please keep it open for now! Thanks!

@aarontavio
Copy link

Hi @chen-keinan, I work with @chary1112004.

I was looking for documentation about the trivy.command setting in the context of the trivy operator. This is what I found:

If I run trivy locally then the filesystem scan command is clear to me, but if I set trivy.command to filesystem what will it happen? will it scan the pod's filesystem? and with rootfs will trivy scan the kubernetes node's filesystem?

Can you provide some clarification on this? The documentation is not clear enough I think.

Thanks in advance.

@chen-keinan
Copy link
Contributor

chen-keinan commented Jan 17, 2024

@aarontavio using trivy.command. = filesystem is scanning the same image but without downloading it.
it use the downloaded image on the node already. but it required higher privileges.

see here the differences between fs vs. rootfs support

@chary1112004
Copy link
Author

@chen-keinan could you please give us more explain about trivy.command = rootfs with filesystem and image since when we use trivy.command. = filesystem and it generates issue in #1792? Thanks!

@chen-keinan
Copy link
Contributor

@chen-keinan could you please give us more explain about trivy.command = rootfs with filesystem and image since when we use trivy.command. = filesystem and it generates issue in #1792? Thanks!

command = Image: download the image from registry
comand = filesystem is scan the local downloaded image on node

@chary1112004
Copy link
Author

@chen-keinan could you please give us more explain about trivy.command = rootfs with filesystem and image since when we use trivy.command. = filesystem and it generates issue in #1792? Thanks!

command = Image: download the image from registry comand = filesystem is scan the local downloaded image on node

Yes, you explain about image and filesystem before. I would like to ask about option rootfs.
trivy.command = rootfs

@chen-keinan
Copy link
Contributor

@aarontavio using trivy.command. = filesystem is scanning the same image but without downloading it. it use the downloaded image on the node already. but it required higher privileges.

see here the differences between fs vs. rootfs support

@chary1112004 see this comment

@chary1112004
Copy link
Author

@aarontavio using trivy.command. = filesystem is scanning the same image but without downloading it. it use the downloaded image on the node already. but it required higher privileges.
see here the differences between fs vs. rootfs support

@chary1112004 see this comment

@chen-keinan I could see the rootfs also scan the same what image scan. What I would like to ask that is rootfs download the image from registry (same as image) or scan the local downloaded image on node (same as filesystem). Thanks!

@chen-keinan
Copy link
Contributor

@aarontavio using trivy.command. = filesystem is scanning the same image but without downloading it. it use the downloaded image on the node already. but it required higher privileges.
see here the differences between fs vs. rootfs support

@chary1112004 see this comment

@chen-keinan I could see the rootfs also scan the same what image scan. What I would like to ask that is rootfs download the image from registry (same as image) or scan the local downloaded image on node (same as filesystem). Thanks!

rootfs is working the same as filesystem

@chary1112004
Copy link
Author

@aarontavio using trivy.command. = filesystem is scanning the same image but without downloading it. it use the downloaded image on the node already. but it required higher privileges.
see here the differences between fs vs. rootfs support

@chary1112004 see this comment

@chen-keinan I could see the rootfs also scan the same what image scan. What I would like to ask that is rootfs download the image from registry (same as image) or scan the local downloaded image on node (same as filesystem). Thanks!

rootfs is working the same as filesystem

yes, thanks. We will try with rootfs and see if it works for us.

@chary1112004
Copy link
Author

chary1112004 commented Feb 5, 2024

@aarontavio using trivy.command. = filesystem is scanning the same image but without downloading it. it use the downloaded image on the node already. but it required higher privileges.
see here the differences between fs vs. rootfs support

@chary1112004 see this comment

@chen-keinan I could see the rootfs also scan the same what image scan. What I would like to ask that is rootfs download the image from registry (same as image) or scan the local downloaded image on node (same as filesystem). Thanks!

rootfs is working the same as filesystem

@chen-keinan We have switched to rootfs and also upgraded trivy operator to latest version 0.20.4 and it shows error in scan job. As rootfs only scan images in nodes so it should no need to pull image. And this issue whenever new runner of gitlab runner start running and gitlab runner pull policy is already set to if-not-present

$ kubectl get pods -n trivy-system
NAME                                       READY   STATUS              RESTARTS   AGE
scan-vulnerabilityreport-59f845f5b-rcmnj   0/3     ErrImageNeverPull   0          4m27s

$ kubectl describe pod scan-vulnerabilityreport-59f845f5b-rcmnj -n trivy-system
  Warning  Failed             96s (x3 over 2m3s)  kubelet            Error: ErrImageNeverPull
  Warning  ErrImageNeverPull  96s (x3 over 2m3s)  kubelet            Container image "registry.gitlab.com/gitlab-org/ci-cd/gitlab-runner-ubi-images/gitlab-runner-helper-ocp:v16.6.1" is not present with pull policy of Never
  Warning  Failed             96s (x3 over 2m3s)  kubelet            Error: ErrImageNeverPull
  Warning  ErrImageNeverPull  96s (x3 over 2m3s)  kubelet            Container image "registry.gitlab.com/gitlab-org/ci-cd/gitlab-runner-ubi-images/gitlab-runner-helper-ocp:v16.6.1" is not present with pull policy of Never
  Warning  Failed             4m50s (x3 over 5m16s)  kubelet            Error: ErrImageNeverPull
  Warning  ErrImageNeverPull  20s (x24 over 5m16s)   kubelet            Container image "curlimages/curl" is not present with pull policy of Never

PS: We also have re-tested with filesystem then error still happens. So as we understand with these two options rootfs and filesystem, whenever there is new pod then trivy operator will trigger scan pod. If scan pod is same node of new pod then scan pod could retrieve image of new pod, otherwise it will generate error ErrImageNeverPull as two options rootfs and filesystem will set default pull policy is Never

For example:

  • new pod: locate to node ip-192-168-157-148..compute.internal
$ kubectl get pods -n gitlab-runner -o wide
runner-8sksj6xjp-project-3427-concurrent-0-2a82fpb4   2/2     Running   0          7s    192.168.146.129   ip-192-168-157-148.<region>.compute.internal   <none>           <none>
  • scan pod: locate to node ip-192-168-162-67..compute.internal
Events:
  Type     Reason             Age                From               Message
  ----     ------             ----               ----               -------
  Normal   Scheduled          50s                default-scheduler  Successfully assigned trivy-system/scan-vulnerabilityreport-6d64ffb74d-brrrv to ip-192-168-162-67.<region>.compute.internal

@chary1112004
Copy link
Author

@chen-keinan I also saw there is option value file offlineScan: false https://github.com/aquasecurity/trivy-operator/blob/main/deploy/helm/values.yaml#L373.

Could you please explain how it works for enable offlineScan:true for the case command: image?

Thanks!

@chen-keinan
Copy link
Contributor

chen-keinan commented Feb 6, 2024

@chen-keinan I also saw there is option value file offlineScan: false https://github.com/aquasecurity/trivy-operator/blob/main/deploy/helm/values.yaml#L373.

Could you please explain how it works for enable offlineScan:true for the case command: image?

Thanks!

this flag is if you want to scan pom.xml dependencies, you need to specify --offline-scan since Trivy tries to issue API requests for scanning Java applications by default.

@chary1112004
Copy link
Author

chary1112004 commented Feb 6, 2024

@chen-keinan thanks, if we use rootfs or filesystem then it is mandatory the new pod and scan pod have to same node? Is it right?
If that is right then trivy operator knows the way to locate scan pod to the node of new pod? Is it right?

Thanks!

@chen-keinan
Copy link
Contributor

@chen-keinan thanks, if we use rootfs or filesystem then it is mandatory the new pod and scan pod have to same node? Is it right? If that is right then trivy operator knows the way to locate scan pod to the node of new pod? Is it right?

Thanks!

yes , it schedule it on specific node

@chary1112004
Copy link
Author

@chen-keinan thanks, if we use rootfs or filesystem then it is mandatory the new pod and scan pod have to same node? Is it right? If that is right then trivy operator knows the way to locate scan pod to the node of new pod? Is it right?
Thanks!

yes , it schedule it on specific node

Thank you, it could probably that we have gitlab runner pod (new pod) belong to specific node group that contains taints then scan job could not locate to nodes of this node group then scan job and new pod are not same node and it is reason ErrImageNeverPull. We will try to add tolerations while use option use rootfs or filesystem.

Thanks!

@chen-keinan
Copy link
Contributor

@chary1112004 do you still want to keep this issue open ?

@aarontavio
Copy link

aarontavio commented Feb 9, 2024

Hi @chen-keinan,

thanks for the interest and the effort.

we could verify that after setting trivy.command to filesystem or rootfs the images are not being downloaded anymore. The scanner job gets imagePullPolicy: Never which avoids downloading the image for the scanning container and the pod also gets the nodeName property set to the same node where the pod to be scanned is running (which should have the image already downloaded). We also could verify in our metrics that data transfer is reduced. By the way the design_trivy_file_system_scanner.md helped me a lot understand how the local scanning works.

So I guess the data transfer problem is solved.

What we have also experienced, a couple of times already, is when the trivy.command is set to filesystem or rootfs some scanning jobs hang with status: ErrImageNeverPull. The scanning pods get blocked and neither kuberntes or the trivy-operator seem to kill the pods, so the whole scanning process is blocked.

See pod events:

Events:
   Type     Reason             Age                    From     Message
   ----     ------             ----                   ----     -------
   Normal   Pulled             5m56s                  kubelet  Container image "ghcr.io/aquasecurity/trivy:0.48.2" already present on machine
   Normal   Created            5m56s                  kubelet  Created container 083aae52-c1ad-429f-b9bb-eedd4bd058bc
   Normal   Started            5m56s                  kubelet  Started container 083aae52-c1ad-429f-b9bb-eedd4bd058bc
   Normal   Pulled             5m52s                  kubelet  Container image "ghcr.io/aquasecurity/trivy:0.48.2" already present on machine
   Normal   Created            5m52s                  kubelet  Created container 38d4fc80-6f29-4991-96b3-2e9daa699b40
   Normal   Started            5m52s                  kubelet  Started container 38d4fc80-6f29-4991-96b3-2e9daa699b40
   Warning  Failed             3m52s (x9 over 5m38s)  kubelet  Error: ErrImageNeverPull
   Warning  ErrImageNeverPull  55s (x23 over 5m38s)   kubelet  Container image "confluentinc/cp-kafka:7.5.3" is not present with pull policy of Never

This obviously happens whenever the image is not present in the node for some reason. Since the imagePullPolicy is set to Never. One possible solution could be to create a new user parameter to control the imagePullPolicy this way we could set it to IfNotPresent and this would guarantee that the scan process never gets blocked. And for us would be ok.

Another option would be that the operator notices this and kills the scanning pod so that the process can continue scanning other images.

UPDATE: I just saw that after some minutes the ErrImageNeverPull pod disappears and the scanning process continues automatically. We have to investigate why this happens but it does not seem to be a show-stopper for us.

Maybe this should be another ticket.

Do you have any idea that can help on this?

@chen-keinan
Copy link
Contributor

Maybe this should be another ticket.

Do you have any idea that can help on this?

@chary1112004 Please do open another issue (to have the discussion more accurate for community as well) for it and you can close this one if not relevant anymore

@chary1112004
Copy link
Author

Maybe this should be another ticket.
Do you have any idea that can help on this?

@chary1112004 Please do open another issue (to have the discussion more accurate for community as well) for it and you can close this one if not relevant anymore

@chen-keinan yes, I am going to open another ticket for above issue. Thanks for your support!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/bug Categorizes issue or PR as related to a bug.
Projects
None yet
Development

No branches or pull requests

3 participants