-
Notifications
You must be signed in to change notification settings - Fork 350
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
policy matching with relative path access has issues with telemetry/alerts #750
Comments
@nyrahul has this been fixed? I'm getting the correct PolicyName with the latest changes. |
Closing this issue since this does not seem to be a problem anymore based on test results. |
nyrahul
added a commit
to nyrahul/KubeArmor
that referenced
this issue
Aug 28, 2022
One of the test was disabled because of kubearmor#750. Since the issue is resolved, the test is enabled. Signed-off-by: Rahul Jadhav <nyrahul@gmail.com>
achrefbensaad
pushed a commit
to achrefbensaad/KubeArmor
that referenced
this issue
Aug 30, 2022
One of the test was disabled because of kubearmor#750. Since the issue is resolved, the test is enabled. Signed-off-by: Rahul Jadhav <nyrahul@gmail.com>
achrefbensaad
pushed a commit
to achrefbensaad/KubeArmor
that referenced
this issue
Aug 30, 2022
One of the test was disabled because of kubearmor#750. Since the issue is resolved, the test is enabled. Signed-off-by: Rahul Jadhav <nyrahul@gmail.com>
achrefbensaad
pushed a commit
to achrefbensaad/KubeArmor
that referenced
this issue
Aug 31, 2022
One of the test was disabled because of kubearmor#750. Since the issue is resolved, the test is enabled. Signed-off-by: Rahul Jadhav <nyrahul@gmail.com>
achrefbensaad
pushed a commit
to achrefbensaad/KubeArmor
that referenced
this issue
Sep 2, 2022
One of the test was disabled because of kubearmor#750. Since the issue is resolved, the test is enabled. Signed-off-by: Rahul Jadhav <nyrahul@gmail.com>
7 tasks
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Bug Report
KubeArmor requires that you specify an absolute path in the policy rules. However, when the actual access happens with the relative path, the action is honored, but the policy name/severity/message is not populated with appropriate policy details (
defaultPosture
is specified as the policy name).General Information
Environment description (GKE, VM-Kubeadm, vagrant-dev-env, minikube, microk8s, ...)
I tried with k3s
Kernel version (run
uname -a
)Linux ubuntu2004-vagrants 5.4.0-120-generic #136-Ubuntu SMP Fri Jun 10 13:40:48 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux
Orchestration system version in use (e.g.
kubectl version
, ...)Link to relevant artifacts (policies, deployments scripts, ...)
Target containers/pods
kubectl apply -f https://raw.githubusercontent.com/kubearmor/KubeArmor/main/examples/wordpress-mysql/wordpress-mysql-deployment.yaml
To Reproduce
kubectl apply -f https://raw.githubusercontent.com/kubearmor/KubeArmor/main/examples/wordpress-mysql/wordpress-mysql-deployment.yaml
kubectl exec -it -n wordpress-mysql wordpress-XXXXXXXX -- bash -c "cat wp-config.php"
kubectl exec -it -n wordpress-mysql wordpress-XXXXXXXX -- bash -c "cat /var/www/html/wp-config.php"
Actual vs Expected behavior
Actual Behavior
wp-config.php
should be denied. (This is working)PolicyName: ksp-wordpress-block-config
.DefaultPosture
Expected Behavior
The PolicyName should be correctly set to
ksp-wordpress-block-config
in both the cases where absolute or relative path accesses are made.The text was updated successfully, but these errors were encountered: