etcdserver: request is too large #2570
Replies: 17 comments 3 replies
-
|
@chen-keinan we also see the issue in the log. Do you have any update to resolve this issue? |
Beta Was this translation helpful? Give feedback.
-
|
not really , its not an easy one, the only workaround I can think of is increasing the the request limit in etcd |
Beta Was this translation helpful? Give feedback.
-
For increasing the request limit in etcd, I think it only works for kubernetes installed self nodes, not kubernetes provided by cloud provider since master nodes are managed by cloud provider. |
Beta Was this translation helpful? Give feedback.
-
|
@chen-keinan Hi! I have the same problem. We use AWS EKS and can't change request limit in etcd. Do you have any update to resolve this issue? We use: |
Beta Was this translation helpful? Give feedback.
-
|
@chen-keinan Its a breaking change, but perhaps there can be a Vulnerability resource that trivy-operator maintains for each unique discovered vulnerability. That VulnerabilityReport references and includes some key details. This way fields that take up a lot of space like the extra links are kept to their own resource. |
Beta Was this translation helpful? Give feedback.
-
|
@lindsaygrace could be , another option is to compress the reported data and encode it (save it to crd body), but it will not be human readable. |
Beta Was this translation helpful? Give feedback.
-
We have our own Kubernetes Cluster but increasing the request limit could create another bunch of problems. The increased lag would compromise the stability of the cluster. Therefore we need to decrease the amount of information in the the report. I like the idea of @lindsaygrace to store each found vulnerability seperataly. We have multiple identical CVEs in os and library (java) |
Beta Was this translation helpful? Give feedback.
-
|
@chen-keinan We have the Trivy Operator deployed on a handful of GKE clusters and are encountering this issue as well. Ideally we would love to see a way to persist the data outside of the cluster to avoid etcd size limits entirely, but we are open to any other suggestions for a workaround. |
Beta Was this translation helpful? Give feedback.
-
If there is a way to hook into the serializer, we could enable a config flag for this and just encode the data in base64 (encryption does not seem necessary). If you could point me in the right direction, I could take a look at it. |
Beta Was this translation helpful? Give feedback.
-
|
this issue still appeares in tests: https://github.com/aquasecurity/trivy-operator/actions/runs/12045796081/job/33585312426?pr=2305 |
Beta Was this translation helpful? Give feedback.
-
|
Issue went stale, but are policyreports still considered? |
Beta Was this translation helpful? Give feedback.
-
I've reopened the issue |
Beta Was this translation helpful? Give feedback.
-
|
a slightly messy solution is to clone the project and modify the vulnerability report before saving it in order to reduce the size by removing the vulnerabilities from the lowest to the highest, for example add the following code: and call this function in “pkg/vulnerabilityreport/io.go” at the beginning of the function “createOrUpdate”, after which simply compile the code and build the image and use it in the helm chart "image" |
Beta Was this translation helpful? Give feedback.
-
|
converting this to a discussino as this isn't actionable right now |
Beta Was this translation helpful? Give feedback.
-
|
Hi, |
Beta Was this translation helpful? Give feedback.
-
|
@chen-keinan I was wondering if it was possible to configure etcd location to store reports? |
Beta Was this translation helpful? Give feedback.
-
|
can confirm the issue for AKS (Azure Kubernetes service) with no possibility to increase etcd request size. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
It has been observed that in some cases the report produced by
trivy-operatoris hitting the default etcd request limit and fails.The reason for report getting too big is due to amount of vulnerabilities (found in image) and it associated data stored in the report.
Workaround for this issue is to tune
etcd request limitThere are three potential solution for this issue:
Beta Was this translation helpful? Give feedback.
All reactions