You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
If Helm Chart, Kubernetes Cluster and version (RKE1, RKE2, k3s, EKS, etc):
Proxy/Cert Details:
Information about the Cluster
Kubernetes version: v1.26.11+k3s1
Cluster Type (Local/Downstream): Downstream
If downstream, what type of cluster? (Custom/Imported or specify provider for Hosted/Infrastructure Provider): Infrastructure Provider, Amazon EC2
User Information
What is the role of the user logged in? (Admin/Cluster Owner/Cluster Member/Project Owner/Project Member/Custom): Admin
If custom, define the set of permissions:
Describe the bug
installed cis-benchmark chart 5.1.0-rc4 and ran scan on a k3s v1.26.11+k3s1 cluster with k3s-cis-1.8-permissive.
It was observed that the scans 4.x.x are only running on control plane and etcd nodes whereas those should be running on all the nodes. Which is the same case with rke1 and rke2 profiles.
To Reproduce
provision a k3s v1.26.11+k3s1 cluster on amazon ec2.
install cis-benchmark-chart 5.1.0-rc4 on the cluster.
run scan with k3s-cis-1.8-permissive profile.
Result
Observe that the tests 4.x.x are only running on control plane and etcd nodes.
Expected Result
4.x.x tests should run on all the nodes.
Screenshots
Additional context
there are some other failures as well with the chart on k3s clusters.
On K3S hardened cluster
k3s-cis-1.8-permissive is failing:
Fail
4.1.9 Ensure that the kubelet --config configuration file has permissions set to 600 or more restrictive (Automated)
Fail
4.1.10 Ensure that the kubelet --config configuration file ownership is set to root:root (Automated)
where as same checks passed on 1.8-hardened profile:
Pass
4.1.9 Ensure that the kubelet --config configuration file has permissions set to 600 or more restrictive (Automated)
Pass
4.1.10 Ensure that the kubelet --config configuration file ownership is set to root:root (Automated)
The text was updated successfully, but these errors were encountered:
Tested the CIS scan with k3s-cis-1.8-permissive profile on k3s cluster with chart v6.0.0-rc2. 4.1.9 and 4.1.10 scans are passing on cluster. Hence closing the issue.
forwardPort for: #254
Rancher Server Setup
Information about the Cluster
User Information
Describe the bug
installed cis-benchmark chart 5.1.0-rc4 and ran scan on a k3s v1.26.11+k3s1 cluster with k3s-cis-1.8-permissive.
It was observed that the scans 4.x.x are only running on control plane and etcd nodes whereas those should be running on all the nodes. Which is the same case with rke1 and rke2 profiles.
To Reproduce
Result
Observe that the tests 4.x.x are only running on control plane and etcd nodes.
Expected Result
4.x.x tests should run on all the nodes.
Screenshots
Additional context
there are some other failures as well with the chart on k3s clusters.
On K3S hardened cluster
k3s-cis-1.8-permissive is failing:
where as same checks passed on 1.8-hardened profile:
The text was updated successfully, but these errors were encountered: