Occurrence 1During an upgrade of TAS 4.0.9 to TAS 4.0.13, the push-usage-service errand failed with error logs:
OUT: Cell 0f353168-b883-4fc6-bda8-38ac73182981 failed to create container for instance 1472f8e1-42d0-44cb-ad42-698801d826ea: running image plugin create: making image: creating image: applying disk limits: apply disk limit: <nil>: tardis was not found in the $PATH
OUT: : exit status 1
In this occurrence, CrowdStrike detected the tardis file as malware and deleted it.
Occurrence 2Apps configured with a
healthcheck type of either port or http would fail to restart or restage due to the healthcheck process being sent a SIGKILL. Once the healthcheck fails, a SIGTERM is sent to the app process. The following logs were observed:
# app logs
2024-01-22T16:29:54.61-0500 [HEALTH/0] ERR instance proxy failed to start: Failed to invoke process: ; instance proxy failed to start: Failed to invoke process: ; instance proxy failed to start: Failed to invoke process: ; Failed to invoke process:
2024-01-22T16:29:54.61-0500 [CELL/0] ERR Failed after 2.028s: startup health check never passed.
# garden logs
2024-01-22T18:25:31.858488104Z: guardian.api.garden-server.run.exited - {"handle":"5f42edc9-a728-4026-620d-c45a","id":"5f42edc9-a728-4026-620d-c45a-envoy-readiness-healthcheck-1","session":"1.1.114828","status":137}
2024-01-22T18:25:31.862135611Z: guardian.api.garden-server.run.exited - {"handle":"5f42edc9-a728-4026-620d-c45a","id":"5f42edc9-a728-4026-620d-c45a-envoy-readiness-healthcheck-0","session":"1.1.114829","status":137}
2024-01-22T18:25:31.865295143Z: guardian.api.garden-server.run.exited - {"handle":"5f42edc9-a728-4026-620d-c45a","id":"5f42edc9-a728-4026-620d-c45a-envoy-readiness-healthcheck-2","session":"1.1.114831","status":137}
2024-01-22T18:25:31.880903836Z: guardian.api.garden-server.run.exited - {"handle":"5f42edc9-a728-4026-620d-c45a","id":"dfa5f5f6-caa2-4b34-7d1b-3257deee8539","session":"1.1.114826","status":143}
2024-01-22T18:25:37.530642964Z: guardian.api.garden-server.run.exited - {"handle":"5f42edc9-a728-4026-620d-c45a","id":"5f42edc9-a728-4026-620d-c45a-envoy","session":"1.1.114825","status":137}
In this occurrence, CrowdStrike detected the healthcheck process as malicious and terminated it.
Occurrence 3Pipelines tasks in Concourse failing when pulling images from Docker Hub due to CrowdStrike detecting “/tmp/print-metadata” in the Docker image as a vulnerability and removing the file.
ConclusionWhen CrowdStrike is deployed within an environment and there are instances of files or processes being unexpectedly terminated or removed, it may be attributed to the security measures enforced by CrowdStrike. In such scenarios, it is advisable to examine CrowdStrike logs or consult with CrowdStrike to determine if their solution is responsible for removing these in-use items. Should it be confirmed that CrowdStrike is responsible for the deletion or termination of these files or processes, implementing a filter to exclude these items from detection might be necessary. On the other hand, if there are concerns that the affected files or processes are indeed malicious, please contact Tanzu Support.