Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
This article provides troubleshooting guidance for common deployment and operational issues in Microsoft Defender for Containers across all supported environments.
- Azure Kubernetes Service (AKS)
- Amazon Elastic Kubernetes Service (EKS)
- Google Kubernetes Engine (GKE)
- Arc-enabled Kubernetes
Common deployment issues
Defender sensor installation fails
- Symptoms:
kubectl get pods -n kube-system -l app=defendershows Defender sensor pods inPending,CrashLoopBackOff, orError. - Resolution:
- Insufficient resources: Check node capacity. Use
kubectl top nodesto verify if nodes have enough CPU and memory to schedule the sensor. - Network egress: Verify your cluster firewall or NSG allows outbound traffic to the required FQDNs.
- Taints and Tolerations: Ensure node taints aren't preventing the pods from scheduling on specific node pools.
- Insufficient resources: Check node capacity. Use
- Symptoms:
Missing recommendations
- Symptoms: Clusters show as "Healthy" but specific recommendations like "AKS clusters should have Defender profile enabled" are missing.
- Resolution:
- Wait time: Assessment scans can take up to 24 hours to reflect in the dashboard.
- Exclusion tags: Check if the resource has the tag
ms_defender_container_exclude_sensors=true. - Policy Add-on: Ensure the Azure Policy add-on is installed; without it, configuration-based recommendations will not trigger.
Vulnerability scan issues
Missing vulnerability findings for images in Azure Container Registry
- Symptoms: Vulnerability findings don't appear for images stored in Azure Container Registry.
- Resolution:
- Registry scanning: Confirm that the relevant registry scanning capability is enabled for Defender for Containers. In the Azure portal, verify that Registry access is enabled for the relevant scope.
- Further investigation: If registry scanning is enabled and findings are still missing, open a support case with the registry name, image name, image digest, and expected finding details.
Missing vulnerability findings for images running on AKS clusters
- Symptoms: Vulnerability findings don't appear for images that are currently running in AKS workloads.
- Resolution:
- Vulnerability scanning: Confirm that the relevant vulnerability scanning capability is enabled for Defender for Containers. Runtime vulnerability findings depend on available scan results for the running image, such as registry scan or disk scan results.
- Pod inventory collection: Confirm that pod inventory collection is enabled for the cluster. For AKS, pod inventory can be collected by the Defender sensor or by agentless collection, depending on the deployment configuration.
- Further investigation: If vulnerability scanning and pod inventory collection are enabled but findings are still missing, open a support case with the cluster name, namespace, workload name, image name, and image digest.
Verification via alert simulation
Use the Kubernetes alerts simulation tool to verify that Defender for Containers can generate alerts for your cluster and send them to Defender for Cloud.