Troubleshooting
Common issues and solutions for Garnet deployment and operation.Installation Issues
Kubernetes: Pods Stuck in Pending
Symptoms:Insufficient node resources
Insufficient node resources
Error:
0/10 nodes available: insufficient cpu/memoryFix:Pod Security Policy blocking privileged pods
Pod Security Policy blocking privileged pods
Error:
pods "jibril-xyz" is forbidden: unable to validate against any pod security policyFix: Enable privileged pods in your PSP or use Pod Security Standards:Node selectors not matching
Node selectors not matching
Error: Update nodeSelector in values.yaml or remove it:
0/10 nodes available: node(s) didn't match node selectorFix: Check your node labels:GitHub Actions: Step Fails
Symptoms:1
Verify Secret Exists
GARNET_API_TOKEN.2
Test Token
{"status":"ok"}.3
Regenerate Token
If invalid, generate new token at dashboard.garnet.ai and update secret.
Connectivity Issues
No Events Appearing in Dashboard
Symptoms:- Agent shows “Connected” in logs
- But no events in Dashboard → Events
- Kubernetes
- GitHub Actions
API token has no permissions
API token has no permissions
Fix: Regenerate token with correct project permissions.Dashboard → Settings → API Tokens → Create new token
Network egress blocked
Network egress blocked
Test connectivity:Fix: Update firewall rules to allow outbound HTTPS to
api.garnet.ai.No actual network activity
No actual network activity
Cause: Workload isn’t making outbound connections.Fix: Trigger test traffic:Check Dashboard → Events for the curl request.
Detection Issues
Too Many False Positives
Symptoms:- Many Issues for legitimate traffic
- False positive rate >5%
- Same domain flagged repeatedly?
- Specific micro-context generating noise?
1
Extend Baseline Period
Dashboard → Settings → Baselining → Period: 14 days (from 7)Gives more time to learn normal behavior.
2
Create Allow Policy
For known-good domains that vary frequently:
3
Review Micro-Context Granularity
For GitHub Actions, very granular contexts (workflow+job+step) can cause FPs if steps vary.Workaround: Use broader policies for CI/CD environments.
No Detections (Expected Malicious Traffic Not Caught)
Symptoms:- Manually triggered unknown egress not appearing as Issue
1
Check if Domain is in Baseline
Dashboard → Events → Filter by domainIf domain appears in past events, it’s already baseline.
2
Verify Enforce Mode
If in detect-only, connections are allowed but should still create Issues.Check: Dashboard → Agents → Mode column
3
Check Policy Overrides
Dashboard → Policies → Check if an allow policy matches the domain.Policies override baseline.
Performance Issues
High CPU Usage
Symptoms:Very high network activity on node
Very high network activity on node
Diagnosis:Fix: Increase CPU limits or reduce monitoring scope:
eBPF programs inefficient
eBPF programs inefficient
Fix: Upgrade to latest agent version:Each version includes eBPF optimizations.
High Memory Usage
Symptoms:Event buffer overflow
Event buffer overflow
Fix: Increase memory limits and buffer size:
Memory leak (rare)
Memory leak (rare)
Diagnosis: Memory usage increases steadily over days.Fix: Restart pods:If issue persists, contact support@garnet.ai with pod logs.
Enforce Mode Issues
Legitimate Traffic Being Blocked
Symptoms:- Application errors like
ConnectionErrororEPERM - Dashboard shows Issue with verdict=blocked
- Review why domain wasn’t in baseline
- Add to corporate allowlist if recurring
- Extend baseline period if too short
Enforce Mode Not Blocking
Symptoms:- Mode set to enforce
- Unknown egress detected (Issue created)
- But connection NOT blocked (verdict=detected)
- Kubernetes
- GitHub Actions
GARNET_MODE: enforce is set.Common Error Messages
eBPF program failed to load
Error in logs:
Not running as privileged
Not running as privileged
Fix:
Kernel too old
Kernel too old
Check kernel version:Must be >=5.8. If older, upgrade node OS.
SELinux blocking
SELinux blocking
Temporary fix:Permanent fix: Create SELinux policy for Garnet (contact support).
Connection refused to api.garnet.ai
Error in logs:
Network policy blocking egress
Network policy blocking egress
Test:Fix: Update network policy:
Proxy not configured
Proxy not configured
Fix: Set proxy environment variables:
Getting Help
Still stuck? Contact support with:- Platform: GitHub Actions or Kubernetes
- Agent version:
helm list -n garnetor workflow logs - Error logs: Last 100 lines
- Issue ID: If related to a specific Issue