You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Add background check that inspects all resources in cluster and flags those violating currently enforced policies.
For more info, see audit checks RFC and PolicyReport RFC.
For helm charts, kwctl, policy-server, kubewarden-controller(crds), e2e tests, we may want to work against a feature branch instead of merging to main.
Figure out how to distribute PolicyReport CRDs
Should the PolicyReport CRDs be shipped by our CRD helm chart?
Is there some helm chart already done by the community?
Acceptance criteria:
- We know how PolicyReport CRDs are going to be installed on the target cluster
Add background check that inspects all resources in cluster and flags those violating currently enforced policies.
For more info, see audit checks RFC and PolicyReport RFC.
For helm charts,
kwctl
,policy-server
,kubewarden-controller
(crds), e2e tests, we may want to work against a feature branch instead of merging tomain
.Task list:
New audit-scanner CLI program and image, in go, that runs the audit algorithm:
Create new https://github.com/kubewarden/audit-scanner repo #316
audit-scanner - MVP Stage 1 - find relevant Policies for a given Namespace audit-scanner#1
audit-scanner - CI/CD audit-scanner#5
audit-scanner - MVP Stage 2 - find relevant Kubernetes resources defined inside of the given Namespace #336
audit-scanner - MVP Stage 3 - perform evaluations audit-scanner#10
audit-scanner - MVP Stage 4 - create PolicyReport audit-scanner#36
audit-scanner - MVP Stage 5.1 - inspect cluster wide resources audit-scanner#43
audit-scanner - MVP Stage 5.2 - reuse results from previous evaluations audit-scanner#44
audit-scanner: AdmissionPolicies annotation changes #461
audit-scanner - MVP Stage 6 - inspect the whole cluster audit-scanner#52
audit-scanner: Check ObjectSelector/LabelSelector audit-scanner#54
Audit scanner add policy modes to PolicyReportsResult properties audit-scanner#60: Postponed
Support policies that check
DELETE
requests audit-scanner#63: PostponedConsume policy-server endpoint certs in audit-scanner audit-scanner#64
policy-server changes:
/audit
#337audit/
endpoint policy-server#490Add spec.backgroundAudit to policy CRDs #318
kwctl:
Helm charts:
Should the PolicyReport CRDs be shipped by our CRD helm chart?
Is there some helm chart already done by the community?
Acceptance criteria:
- We know how PolicyReport CRDs are going to be installed on the target cluster
Update all policies with new spec.backgroundAudit as needed #479
Update all policy templates with new
spec.backgroundAudit
as needed. #480Add e2e tests for the audit feature #478
Write docs on audit feature docs#198
Add audit scanner in the CI to keep Kubewarden stack version in sync #484
Release Kubewarden stack
Acceptance criteria:
feat-audit
branches into main where needed.Write blogpost about new compliance audit checks feature. kubewarden.io#193
Investigate if or how to embed policy-reporter in Kubewarden UI - Integrate policy-reporter rancher/kubewarden-ui#447
The text was updated successfully, but these errors were encountered: