K3s and Antivirus
Antivirus software adds an unknown variable to the existing complexity of Kubernetes. Most of them have not yet kept up with newer technologies such as Kubernetes and have not reached a CNCF certified status. In environments where antivirus software had been enabled, there has seen issues stemming from interfering actions from such software. As an example, there have been incidents where the antivirus software had pruned files in the ContainerD filesystem incorrectly, causing the ContainerD mounts to go corrupt and causing data loss.
Issues resulting from third-party tools, such as antivirus and intrusion detection software, interfering with ContainerD or other necessary system calls are deemed resolved should disabling such tools restore functionality.
The key challenge remains balancing comprehensive security with minimal performance overhead. Whitelisting critical paths and understanding container runtime interactions becomes crucial. Administrators must carefully configure security agents to prevent unnecessary scanning of system-critical directories, which can cause significant resource contention and potentially destabilize cluster operations:
/var
/run/k3s/
/run/containerd/
/var/lib/rancher
/var/lib/kubelet
/run/k3s/
/etc/rancher/
/usr/local/bin/k3s
Lastly, where a customer environment is running additional 3rd party software please increase the system resources to account for overhead.
Related content
Classified as Getvisibility - Partner/Customer Confidential