-
Notifications
You must be signed in to change notification settings - Fork 85
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Running karmor probe on operator installation throws incorrect posture values #398
Comments
@rootxrishabh Can you check posture values in kubearmor configmap |
@rootxrishabh yes you're right, global posture should be set to |
Ok so it looks like the posture settings are working well! Result - So I guess |
One last question, Basically posture is only enforced around a policy right? For example, all posture set to block without a policy doesn't deny all processes, network and file activities. Right? |
yes default posture comes into picture with a allow based policy, ref: https://github.com/kubearmor/KubeArmor/blob/main/getting-started/default_posture.md |
Thanks @rksharma95, will be opening an issue at kubearmor-client for the probe info. |
Bug Report
General Information
Linux kubearmor-os-1 6.2.0-1019-gcp kubearmor/KubeArmor#21~22.04.1-Ubuntu SMP Thu Nov 16 18:18:34 UTC 2023 x86_64 x86_64 x86_64 GNU/Linux
To Reproduce
Set default posture settings to block.
Deploy Kubearmor using helm-based local deployment.
Confirm posture settings using
karmor probe
.Expected behavior
Karmor probe should confirm that Default Posture is set to block based for File, Capabilities, and Network but rather shows audit.
CC @rksharma95
The text was updated successfully, but these errors were encountered: