instruction
stringlengths 172
6.32k
| output
stringlengths 88
4.06k
|
---|---|
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/bin/false'. '/sbin/nologin'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
process:
matchPaths:
- path: /bin/false
- path: /sbin/nologin
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path ' /var/log/nginx/', ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
file:
matchDirectories:
- dir: /var/log/nginx/
ownerOnly: true
recursive: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. applies the rule to files with the '/home/user1/secret_data*' pattern, ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
file:
matchPatterns:
- pattern: /home/user1/secret_data*
ownerOnly: true
readOnly: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the network-related policies. In this case, rule applies to ICMP network traffic. Specifies what to do when rules match, which means relevant network activities will be logged. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
network:
matchProtocols:
- protocol: icmp
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/apt'. '/usr/bin/apt-get'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
process:
matchPaths:
- path: /usr/bin/apt
- path: /usr/bin/apt-get
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/dev/shm/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
file:
matchDirectories:
- dir: /dev/shm/
readOnly: true
recursive: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/dev/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
file:
matchDirectories:
- dir: /dev/
readOnly: true
recursive: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. applies the rule to files with the '/**/*clockwork/**' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
file:
matchPatterns:
- pattern: /**/*clockwork/**
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/apt'. '/usr/bin/apt-get'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
process:
matchPaths:
- path: /usr/bin/apt
- path: /usr/bin/apt-get
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/shadow'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
file:
matchPaths:
- path: /etc/shadow
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/local/bin/kubectl'. '/usr/bin/kubectl'. '/usr/local/bin/docker'. '/usr/bin/docker'. '/usr/local/bin/crictl'. '/usr/bin/crictl'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
process:
matchPaths:
- path: /usr/local/bin/kubectl
- path: /usr/bin/kubectl
- path: /usr/local/bin/docker
- path: /usr/bin/docker
- path: /usr/local/bin/crictl
- path: /usr/bin/crictl
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/sbin/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
process:
matchDirectories:
- dir: /sbin/
recursive: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/apt'. '/usr/bin/apt-get'. '/bin/apt-get'. '/sbin/apk'. '/bin/apt'. '/usr/bin/dpkg'. '/bin/dpkg'. '/usr/bin/gdebi'. '/bin/gdebi'. '/usr/bin/make'. '/bin/make'. '/usr/bin/yum'. '/bin/yum'. '/usr/bin/rpm'. '/bin/rpm'. '/usr/bin/dnf'. '/bin/dnf'. '/usr/bin/pacman'. '/usr/sbin/pacman'. '/bin/pacman'. '/sbin/pacman'. '/usr/bin/makepkg'. '/usr/sbin/makepkg'. '/bin/makepkg'. '/sbin/makepkg'. '/usr/bin/yaourt'. '/usr/sbin/yaourt'. '/bin/yaourt'. '/sbin/yaourt'. '/usr/bin/zypper'. '/bin/zypper'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
process:
matchPaths:
- path: /usr/bin/apt
- path: /usr/bin/apt-get
- path: /bin/apt-get
- path: /sbin/apk
- path: /bin/apt
- path: /usr/bin/dpkg
- path: /bin/dpkg
- path: /usr/bin/gdebi
- path: /bin/gdebi
- path: /usr/bin/make
- path: /bin/make
- path: /usr/bin/yum
- path: /bin/yum
- path: /usr/bin/rpm
- path: /bin/rpm
- path: /usr/bin/dnf
- path: /bin/dnf
- path: /usr/bin/pacman
- path: /usr/sbin/pacman
- path: /bin/pacman
- path: /sbin/pacman
- path: /usr/bin/makepkg
- path: /usr/sbin/makepkg
- path: /bin/makepkg
- path: /sbin/makepkg
- path: /usr/bin/yaourt
- path: /usr/sbin/yaourt
- path: /bin/yaourt
- path: /sbin/yaourt
- path: /usr/bin/zypper
- path: /bin/zypper
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/bin/bash'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies the action to take when rules match, in which case the 'Allow' action allows the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
process:
matchPaths:
- path: /bin/bash
ownerOnly: true
action: Allow |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/bin/', When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/bin/rm', specifies a rule that matches a specific directory path '/root/', When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/bin/rm', specifies a rule that matches a specific directory path '/home/', When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/bin/rm', specifies a rule that matches a specific directory path '/etc/', When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/bin/rm', Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chsh'. '/bin/chmod'. '/bin/chown'. '/bin/chgrp'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
process:
matchPaths:
- path: /usr/bin/chsh
- path: /bin/chmod
- path: /bin/chown
- path: /bin/chgrp
file:
matchDirectories:
- dir: /bin/
fromSource:
- path: /bin/rm
- dir: /root/
fromSource:
- path: /bin/rm
- dir: /home/
fromSource:
- path: /bin/rm
- dir: /etc/
fromSource:
- path: /bin/rm
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/log/cassandra/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. specifies a rule that matches a specific directory path '/storage/log/vcops/log/cassandra/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
file:
matchDirectories:
- dir: /var/log/cassandra/
recursive: true
ownerOnly: true
- dir: /storage/log/vcops/log/cassandra/
recursive: true
ownerOnly: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/log/elasticsearch/', | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
file:
matchDirectories:
- dir: /var/log/elasticsearch/
action: audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/usr/local/go/src/math/big'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
file:
matchPaths:
- path: /usr/local/go/src/math/big
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/local/go/src/cmd/go/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
file:
matchDirectories:
- dir: /usr/local/go/src/cmd/go/
recursive: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/share/zoneinfo/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/timedatectl'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/etc/timezone'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/lib/systemd/systemd-timesyncd'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
file:
matchDirectories:
- dir: /usr/share/zoneinfo/
readOnly: true
ownerOnly: true
process:
matchPaths:
- path: /usr/bin/timedatectl
ownerOnly: true
- path: /etc/timezone
ownerOnly: true
- path: /usr/lib/systemd/systemd-timesyncd
ownerOnly: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/init/control-alt-delete.conf'. '/etc/init/control-alt-delete.override'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
file:
matchPaths:
- path: /etc/init/control-alt-delete.conf
- path: /etc/init/control-alt-delete.override
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/ssl/certs/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. specifies a rule that matches a specific directory path '/etc/ssl/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
file:
matchDirectories:
- dir: /etc/ssl/certs/
recursive: true
ownerOnly: true
- dir: /etc/ssl/
recursive: true
ownerOnly: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/*.shosts'. applies the rule to files with the '/**/*.shosts' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
file:
matchPaths:
- path: /*.shosts
matchPatterns:
- pattern: /**/*.shosts
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. applies the rule to files with the '/**/*ghostdog.sh' pattern, '/*ghostdog.sh' pattern, Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chmod'. '/bin/sh'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
file:
matchPatterns:
- pattern: /**/*ghostdog.sh
- pattern: /*ghostdog.sh
process:
matchPaths:
- path: /usr/bin/chmod
- path: /bin/sh
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/sudoers'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. '/etc/passwd'. '/etc/shadow'. '/root/.bashrc'. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/log/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
file:
matchPaths:
- path: /etc/sudoers
readOnly: true
- path: /etc/passwd
- path: /etc/shadow
- path: /root/.bashrc
matchDirectories:
- dir: /var/log/
recursive: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. applies the rule to files with the '/**/usr/local/tomcat/groovy' pattern, Specifies a rule that matches a specific file absolute path '/usr/local/tomcat/lib/groovy-2.3.9.jar'. '/usr/local/tomcat/groovy.session'. '/usr/local/tomcat/bin/catalina.sh'. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/tmp/', Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
file:
matchPatterns:
- pattern: /**/usr/local/tomcat/groovy
matchPaths:
- path: /usr/local/tomcat/lib/groovy-2.3.9.jar
- path: /usr/local/tomcat/groovy.session
- path: /usr/local/tomcat/bin/catalina.sh
matchDirectories:
- dir: /tmp/
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. applies the rule to files with the '/**/WEB-INF/**/*.*' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
file:
matchPatterns:
- pattern: /**/WEB-INF/**/*.*
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/usr/local/lib/python2.7/dist-packages/pwnlib/shellcraft/templates/amd64/linux/syscalls/mprotect.asm'. '/usr/local/go/src/unsafe/unsafe.go'. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/local/lib/python2.7/dist-packages/pwnlib/', specifies a rule that matches a specific directory path '/usr/lib/go-1.10/pkg/', specifies a rule that matches a specific directory path '/usr/lib/python3/dist-packages/', specifies a rule that matches a specific directory path '/usr/local/go/', Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/readlink'. '/usr/local/go/src/unsafe/unsafe.go'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
process:
matchPaths:
- path: /usr/bin/readlink
- path: /usr/local/go/src/unsafe/unsafe.go
file:
matchPaths:
- path: /usr/local/lib/python2.7/dist-packages/pwnlib/shellcraft/templates/amd64/linux/syscalls/mprotect.asm
- path: /usr/local/go/src/unsafe/unsafe.go
matchDirectories:
- dir: /usr/local/lib/python2.7/dist-packages/pwnlib/
- dir: /usr/lib/go-1.10/pkg/
- dir: /usr/lib/python3/dist-packages/
- dir: /usr/local/go/
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/conf/defaults.ini'. '/conf/grafana.ini'. '/etc/grafana/grafana.ini'. '/etc/grafana/defaults.ini'. '/etc/passwd'. '/etc/shadow'. '/home/grafana/.bash_history'. '/home/grafana/.ssh/id_rsa'. '/root/.bash_history'. '/root/.ssh/id_rsa'. '/usr/local/etc/grafana/grafana.ini'. '/var/lib/grafana/grafana.db'. applies the rule to files with the '/**/public/plugins/alertlist/etc/passwd' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/proc/net/fib_trie'. '/proc/net/tcp'. '/proc/self/cmdline'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
file:
matchPaths:
- path: /conf/defaults.ini
- path: /conf/grafana.ini
- path: /etc/grafana/grafana.ini
- path: /etc/grafana/defaults.ini
- path: /etc/passwd
- path: /etc/shadow
- path: /home/grafana/.bash_history
- path: /home/grafana/.ssh/id_rsa
- path: /root/.bash_history
- path: /root/.ssh/id_rsa
- path: /usr/local/etc/grafana/grafana.ini
- path: /var/lib/grafana/grafana.db
matchPatterns:
- pattern: /**/public/plugins/alertlist/etc/passwd
process:
matchPaths:
- path: /proc/net/fib_trie
- path: /proc/net/tcp
- path: /proc/self/cmdline
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/passwd'. '/etc/shadow'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
file:
matchPaths:
- path: /etc/passwd
- path: /etc/shadow
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/dev/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/root/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chmod'. '/usr/bin/nc'. '/usr/bin/dig'. '/usr/bin/ncat'. '/usr/bin/nmap'. '/usr/sbin/tcpdump'. '/usr/bin/tcpdump'. '/usr/bin/tshark'. '/usr/bin/ngrep'. '/usr/bin/telnet'. '/usr/bin/mitmproxy'. '/usr/bin/socat'. '/usr/sbin/zmap'. '/usr/bin/login'. '/usr/bin/su'. '/usr/sbin/nologin'. '/usr/bin/faillog'. '/usr/bin/lastlog'. '/usr/bin/newgrp'. '/usr/bin/sg'. '/usr/sbin/shadowconfig'. '/usr/sbin/grpck'. '/usr/sbin/pwunconv'. '/usr/sbin/grpconv'. '/usr/sbin/pwck'. '/usr/sbin/groupmod'. '/usr/sbin/vipw'. '/usr/sbin/pwconv'. '/usr/sbin/useradd'. '/usr/sbin/newusers'. '/usr/sbin/cppw'. '/usr/sbin/chpasswd'. '/usr/sbin/usermod'. '/usr/sbin/groupadd'. '/usr/sbin/groupdel'. '/usr/sbin/grpunconv'. '/usr/sbin/chgpasswd'. '/usr/sbin/userdel'. '/usr/bin/chage'. '/usr/bin/chsh'. '/usr/bin/gpasswd'. '/usr/bin/chfn'. '/usr/bin/expiry'. '/usr/bin/passwd'. '/usr/sbin/vigr'. '/usr/sbin/cpgr'. '/usr/sbin/adduser'. '/usr/sbin/addgroup'. '/usr/sbin/deluser'. '/usr/sbin/delgroup'. '/usr/bin/chage'. '/usr/bin/gpasswd'. '/usr/bin/lastlog'. '/usr/bin/newgrp'. '/usr/bin/sg'. '/usr/sbin/adduser'. '/usr/sbin/deluser'. '/usr/sbin/chpasswd'. '/usr/sbin/groupadd'. '/usr/sbin/groupdel'. '/usr/sbin/addgroup'. '/usr/sbin/delgroup'. '/usr/sbin/groupmems'. '/usr/sbin/groupmod'. '/usr/sbin/grpck'. '/usr/sbin/grpconv'. '/usr/sbin/grpunconv'. '/usr/sbin/newusers'. '/usr/sbin/pwck'. '/usr/sbin/pwconv'. '/usr/sbin/pwunconv'. '/usr/sbin/useradd'. '/usr/sbin/userdel'. '/usr/sbin/usermod'. '/usr/sbin/vigr'. '/usr/sbin/vipw'. '/usr/sbin/unix_chkpwd'. '/usr/bin/openssl'. '/usr/sbin/update-ca-certificates'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
process:
matchPaths:
- path: /usr/bin/chmod
- path: /usr/bin/nc
- path: /usr/bin/dig
- path: /usr/bin/ncat
- path: /usr/bin/nmap
- path: /usr/sbin/tcpdump
- path: /usr/bin/tcpdump
- path: /usr/bin/tshark
- path: /usr/bin/ngrep
- path: /usr/bin/telnet
- path: /usr/bin/mitmproxy
- path: /usr/bin/socat
- path: /usr/sbin/zmap
- path: /usr/bin/login
- path: /usr/bin/su
- path: /usr/sbin/nologin
- path: /usr/bin/faillog
- path: /usr/bin/lastlog
- path: /usr/bin/newgrp
- path: /usr/bin/sg
- path: /usr/sbin/shadowconfig
- path: /usr/sbin/grpck
- path: /usr/sbin/pwunconv
- path: /usr/sbin/grpconv
- path: /usr/sbin/pwck
- path: /usr/sbin/groupmod
- path: /usr/sbin/vipw
- path: /usr/sbin/pwconv
- path: /usr/sbin/useradd
- path: /usr/sbin/newusers
- path: /usr/sbin/cppw
- path: /usr/sbin/chpasswd
- path: /usr/sbin/usermod
- path: /usr/sbin/groupadd
- path: /usr/sbin/groupdel
- path: /usr/sbin/grpunconv
- path: /usr/sbin/chgpasswd
- path: /usr/sbin/userdel
- path: /usr/bin/chage
- path: /usr/bin/chsh
- path: /usr/bin/gpasswd
- path: /usr/bin/chfn
- path: /usr/bin/expiry
- path: /usr/bin/passwd
- path: /usr/sbin/vigr
- path: /usr/sbin/cpgr
- path: /usr/sbin/adduser
- path: /usr/sbin/addgroup
- path: /usr/sbin/deluser
- path: /usr/sbin/delgroup
- path: /usr/bin/chage
- path: /usr/bin/gpasswd
- path: /usr/bin/lastlog
- path: /usr/bin/newgrp
- path: /usr/bin/sg
- path: /usr/sbin/adduser
- path: /usr/sbin/deluser
- path: /usr/sbin/chpasswd
- path: /usr/sbin/groupadd
- path: /usr/sbin/groupdel
- path: /usr/sbin/addgroup
- path: /usr/sbin/delgroup
- path: /usr/sbin/groupmems
- path: /usr/sbin/groupmod
- path: /usr/sbin/grpck
- path: /usr/sbin/grpconv
- path: /usr/sbin/grpunconv
- path: /usr/sbin/newusers
- path: /usr/sbin/pwck
- path: /usr/sbin/pwconv
- path: /usr/sbin/pwunconv
- path: /usr/sbin/useradd
- path: /usr/sbin/userdel
- path: /usr/sbin/usermod
- path: /usr/sbin/vigr
- path: /usr/sbin/vipw
- path: /usr/sbin/unix_chkpwd
- path: /usr/bin/openssl
- path: /usr/sbin/update-ca-certificates
file:
matchDirectories:
- dir: /dev/
recursive: true
- dir: /root/
recursive: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/dev/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/usr/bin/touch', specifies a rule that matches a specific directory path '/bin/touch', Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
file:
matchDirectories:
- dir: /dev/
recursive: true
fromSource:
- path: /usr/bin/touch
- path: /bin/touch
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. applies the rule to files with the '/etc/*hado?' pattern, Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
file:
matchPatterns:
- pattern: /etc/*hado?
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/root/.bashrc'. '/root/.bash_history'. '/dev/tty'. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/credentials/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Allow' allows access to the matching file. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/bin/'. Specifies the action to take when rules match, in which case the 'Allow' action allows the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
- WARNING
process:
matchDirectories:
- dir: /bin/
file:
matchPaths:
- path: /root/.bashrc
- path: /root/.bash_history
- path: /dev/tty
matchDirectories:
- dir: /credentials/
readOnly: true
action: Allow |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/credentials/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
- WARNING
file:
matchDirectories:
- dir: /credentials/
readOnly: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/home/user1/hello'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
process:
matchPaths:
- path: /home/user1/hello
ownerOnly: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/credentials/', Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
file:
matchDirectories:
- dir: /credentials/
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/passwd'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/bin/cat'. Specifies a rule that matches a specific file absolute path '/secret.txt'. '/credentials/password'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/bin/cat'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
file:
matchPaths:
- path: /etc/passwd
readOnly: true
fromSource:
- path: /bin/cat
- path: /secret.txt
- path: /credentials/password
readOnly: true
fromSource:
- path: /bin/cat
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/apt'. '/usr/bin/apt-get'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
process:
matchPaths:
- path: /usr/bin/apt
- path: /usr/bin/apt-get
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/local/bin/kubectl'. '/usr/bin/kubectl'. '/usr/local/bin/docker'. '/usr/bin/docker'. '/usr/local/bin/crictl'. '/usr/bin/crictl'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
process:
matchPaths:
- path: /usr/local/bin/kubectl
- path: /usr/bin/kubectl
- path: /usr/local/bin/docker
- path: /usr/bin/docker
- path: /usr/local/bin/crictl
- path: /usr/bin/crictl
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/sbin/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
process:
matchDirectories:
- dir: /sbin/
recursive: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chmod'. '/usr/bin/chown'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
process:
matchPaths:
- path: /usr/bin/chmod
- path: /usr/bin/chown
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/run/secrets/kubernetes.io/serviceaccount/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
process:
matchDirectories:
- dir: /run/secrets/kubernetes.io/serviceaccount/
recursive: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/nginx/', ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/root/', ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
file:
matchDirectories:
- dir: /etc/nginx/
ownerOnly: true
recursive: true
- dir: /root/
ownerOnly: true
recursive: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/*.mysql history' pattern. '/*.mysql_history' pattern. '/*.mysqlsh/history' pattern. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
process:
matchPatterns:
- pattern: /*.mysql history
- pattern: /*.mysql_history
- pattern: /*.mysqlsh/history
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source Specifies a rule that matches a specific file absolute path '/usr/bin/shred'. '/usr/bin/rm'. '/bin/mv'. '/bin/rm'. '/usr/bin/mv'. Specifies a rule that matches a specific file absolute path '/root/*_history'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/usr/bin/shred'. '/usr/bin/rm'. '/bin/rm'. '/bin/mv'. '/usr/bin/mv'. Specifies a rule that matches a specific file absolute path '/home/*/*_history'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
file:
matchPaths:
- fromSource:
- path: /usr/bin/shred
- path: /usr/bin/rm
- path: /bin/mv
- path: /bin/rm
- path: /usr/bin/mv
path: /root/*_history
- fromSource:
- path: /usr/bin/shred
- path: /usr/bin/rm
- path: /bin/rm
- path: /bin/mv
- path: /usr/bin/mv
path: /home/*/*_history
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/dev/shm/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
file:
matchDirectories:
- dir: /dev/shm/
readOnly: true
recursive: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/root/*_history'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/usr/bin/shred'. '/usr/bin/rm'. '/bin/mv'. '/bin/rm'. '/usr/bin/mv'. Specifies a rule that matches a specific file absolute path '/home/*/*_history'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/usr/bin/shred'. '/usr/bin/rm'. '/bin/rm'. '/bin/mv'. '/usr/bin/mv'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
file:
matchPaths:
- path: /root/*_history
- fromSource:
- path: /usr/bin/shred
- path: /usr/bin/rm
- path: /bin/mv
- path: /bin/rm
- path: /usr/bin/mv
- path: /home/*/*_history
- fromSource:
- path: /usr/bin/shred
- path: /usr/bin/rm
- path: /bin/rm
- path: /bin/mv
- path: /usr/bin/mv
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/passwd'. '/etc/shadow'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. applies the rule to processes with the '/proc/**/cmdline' pattern. '/proc/**/sched_debug' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
file:
matchPaths:
- path: /etc/passwd
- path: /etc/shadow
process:
matchPatterns:
- pattern: /proc/**/cmdline
- pattern: /proc/**/sched_debug
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/**/bulk' pattern. '/**/*bulk' pattern. '/**/**/bulk' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
process:
matchPatterns:
- pattern: /**/bulk
- pattern: /**/*bulk
- pattern: /**/**/bulk
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/fapolicyd/fapolicyd.conf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/etc/fapolicyd/fapolicyd.rules'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
file:
matchPaths:
- path: /etc/fapolicyd/fapolicyd.conf
ownerOnly: true
- path: /etc/fapolicyd/fapolicyd.rules
ownerOnly: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/**/fchmod' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
process:
matchPatterns:
- pattern: /**/fchmod
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/lib/cassandra/data/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/var/lib/cassandra/commitlog/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/var/lib/cassandra/saved_caches/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
file:
matchDirectories:
- dir: /var/lib/cassandra/data/
recursive: true
- dir: /var/lib/cassandra/commitlog/
recursive: true
- dir: /var/lib/cassandra/saved_caches/
recursive: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. applies the rule to files with the '/**/confluence/WEB-INF/lib/xwork-1.0.3-atlassian-8.jar' pattern, '/**/confluence/WEB-INF/lib/xwork-1.0.3.6.jar' pattern, '/**/confluence/WEB-INF/lib/webwork-2.1.5-atlassian-3.jar' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. applies the rule to processes with the '/**/confluence/WEB-INF/lib/xwork-1.0.3-atlassian-8.jar' pattern. '/**/confluence/WEB-INF/lib/xwork-1.0.3.6.jar' pattern. '/**/confluence/WEB-INF/lib/webwork-2.1.5-atlassian-3.jar' pattern. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
file:
matchPatterns:
- pattern: /**/confluence/WEB-INF/lib/xwork-1.0.3-atlassian-8.jar
- pattern: /**/confluence/WEB-INF/lib/xwork-1.0.3.6.jar
- pattern: /**/confluence/WEB-INF/lib/webwork-2.1.5-atlassian-3.jar
process:
matchPatterns:
- pattern: /**/confluence/WEB-INF/lib/xwork-1.0.3-atlassian-8.jar
- pattern: /**/confluence/WEB-INF/lib/xwork-1.0.3.6.jar
- pattern: /**/confluence/WEB-INF/lib/webwork-2.1.5-atlassian-3.jar
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/storage/innobase/handler/handler0alter.cc'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
file:
matchPaths:
- path: /storage/innobase/handler/handler0alter.cc
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/sql/field_conv.cc'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
file:
matchPaths:
- path: /sql/field_conv.cc
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/sql/item_cmpfunc.cc'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
file:
matchPaths:
- path: /sql/item_cmpfunc.cc
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/gdm/custom.conf'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
file:
matchPaths:
- path: /etc/gdm/custom.conf
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. applies the rule to processes with the 'dbus-daemon' pattern. 'justtryit' pattern. 'justrobot' pattern. 'justforfun' pattern. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. apply rules to the executable processes at paths '/dev/shm/kdmtmpflush'. ' /var/run/haldrund.pid'. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
process:
matchPaths:
- path: /dev/shm/kdmtmpflush
- path: /var/run/haldrund.pid
matchPatterns:
- pattern: dbus-daemon
- pattern: justtryit
- pattern: justrobot
- pattern: justforfun
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/sudoers'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. '/etc/passwd'. '/etc/shadow'. '/root/.bashrc'. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/log/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
file:
matchPaths:
- path: /etc/sudoers
readOnly: true
- path: /etc/passwd
- path: /etc/shadow
- path: /root/.bashrc
matchDirectories:
- dir: /var/log/
recursive: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/pydoc'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/pydoc'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. applies the rule to processes with the '/usr/bin/pydoc*' pattern. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/pydoc*' pattern. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
process:
matchPaths:
- path: /usr/bin/pydoc
ownerOnly: true
- path: /bin/pydoc
ownerOnly: true
matchPatterns:
- pattern: /usr/bin/pydoc*
ownerOnly: true
- pattern: /bin/pydoc*
ownerOnly: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/hostname'. '/etc/hosts.allow'. '/etc/hosts'. '/etc/lsb-release'. '/etc/networks'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
file:
matchPaths:
- path: /etc/hostname
- path: /etc/hosts.allow
- path: /etc/hosts
- path: /etc/lsb-release
- path: /etc/networks
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/*/*/*/django-admin dbshell*' pattern. '/*/*/django-admin dbshell*' pattern. '/*/django-admin dbshell*' pattern. '/django-admin dbshell*' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
process:
matchPatterns:
- pattern: /*/*/*/django-admin dbshell*
- pattern: /*/*/django-admin dbshell*
- pattern: /*/django-admin dbshell*
- pattern: /django-admin dbshell*
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/*/*/*/django-admin inspectdb*' pattern. '/*/*/django-admin inspectdb*' pattern. '/*/django-admin inspectdb*' pattern. '/django-admin inspectdb*' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
process:
matchPatterns:
- pattern: /*/*/*/django-admin inspectdb*
- pattern: /*/*/django-admin inspectdb*
- pattern: /*/django-admin inspectdb*
- pattern: /django-admin inspectdb*
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. applies the rule to files with the '/**/public/plugins/alertlist/etc/passwd' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. Specifies a rule that matches a specific file absolute path '/conf/defaults.ini'. '/conf/grafana.ini'. '/etc/grafana/grafana.ini'. '/etc/grafana/defaults.ini'. '/etc/passwd'. '/etc/shadow'. '/home/grafana/.bash_history'. '/home/grafana/.ssh/id_rsa'. '/root/.bash_history'. '/root/.ssh/id_rsa'. '/usr/local/etc/grafana/grafana.ini'. '/var/lib/grafana/grafana.db'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/proc/net/fib_trie'. '/proc/net/tcp'. '/proc/self/cmdline'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
file:
matchPaths:
- path: /conf/defaults.ini
- path: /conf/grafana.ini
- path: /etc/grafana/grafana.ini
- path: /etc/grafana/defaults.ini
- path: /etc/passwd
- path: /etc/shadow
- path: /home/grafana/.bash_history
- path: /home/grafana/.ssh/id_rsa
- path: /root/.bash_history
- path: /root/.ssh/id_rsa
- path: /usr/local/etc/grafana/grafana.ini
- path: /var/lib/grafana/grafana.db
matchPatterns:
- pattern: /**/public/plugins/alertlist/etc/passwd
process:
matchPaths:
- path: /proc/net/fib_trie
- path: /proc/net/tcp
- path: /proc/self/cmdline
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/bin/sleep'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
process:
matchPaths:
- path: /bin/sleep
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/sbin/groupdel'. '/usr/sbin/userdel'. '/usr/sbin/chgpasswd'. '/usr/sbin/groupmod0o'. '/usr/sbin/groupadd'. '/usr/sbin/newusers'. '/usr/sbin/chpasswd'. '/usr/sbin/usermod'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
process:
matchPaths:
- path: /usr/sbin/groupdel
- path: /usr/sbin/userdel
- path: /usr/sbin/chgpasswd
- path: /usr/sbin/groupmod0o
- path: /usr/sbin/groupadd
- path: /usr/sbin/newusers
- path: /usr/sbin/chpasswd
- path: /usr/sbin/usermod
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/mysql/my.cnf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
file:
matchPaths:
- path: /etc/mysql/my.cnf
ownerOnly: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/rm'. '/usr/bin/unlink'. '/usr/bin/rmdir'. applies the rule to processes with the '/**/rm' pattern. '/**/rmdir' pattern. '/**/unlink' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
process:
matchPaths:
- path: /usr/bin/rm
- path: /usr/bin/unlink
- path: /usr/bin/rmdir
matchPatterns:
- pattern: /**/rm
- pattern: /**/rmdir
- pattern: /**/unlink
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/sbin/insmod'. '/usr/sbin/modprobe'. '/usr/sbin/rmmod'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
process:
matchPaths:
- path: /usr/sbin/insmod
- path: /usr/sbin/modprobe
- path: /usr/sbin/rmmod
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/var/spool/cron/atjobs'. '/var/spool/cron/atspool'. '/proc/loadavg'. '/var/run/utmp'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
process:
matchPaths:
- path: /var/spool/cron/atjobs
- path: /var/spool/cron/atspool
- path: /proc/loadavg
- path: /var/run/utmp
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/log/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
file:
matchDirectories:
- dir: /var/log/
recursive: true
readOnly: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/*/*/*/*/nginx -s reload*' pattern. '/*/*/*/nginx -s reload*' pattern. '/*/*/nginx -s reload*' pattern. '/*/nginx -s reload*' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
process:
matchPatterns:
- pattern: /*/*/*/*/nginx -s reload*
- pattern: /*/*/*/nginx -s reload*
- pattern: /*/*/nginx -s reload*
- pattern: /*/nginx -s reload*
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/*/*/*/*/nginx -s stop*' pattern. '/*/*/*/nginx -s stop*' pattern. '/*/*/nginx -s stop*' pattern. '/*/nginx -s stop*' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
process:
matchPatterns:
- pattern: /*/*/*/*/nginx -s stop*
- pattern: /*/*/*/nginx -s stop*
- pattern: /*/*/nginx -s stop*
- pattern: /*/nginx -s stop*
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/my.cnf'. '/etc/profile'. '/etc/X11/xorg.conf'. '/etc/sudoers'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
file:
matchPaths:
- path: /etc/my.cnf
- path: /etc/profile
- path: /etc/X11/xorg.conf
- path: /etc/sudoers
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/resolv.conf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/root/.ssh/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. applies the rule to files with the '/home/*/.ssh/**' pattern, Specifies what to do when rules match, in which case the action 'Allow' allows access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chmod'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/chmod'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/getfacl'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/setfacl'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies the action to take when rules match, in which case the 'Allow' action allows the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
process:
matchPaths:
- path: /usr/bin/chmod
ownerOnly: true
- path: /bin/chmod
ownerOnly: true
- path: /usr/bin/getfacl
ownerOnly: true
- path: /usr/bin/setfacl
ownerOnly: true
file:
matchPaths:
- path: /etc/resolv.conf
ownerOnly: true
matchDirectories:
- dir: /root/.ssh/
recursive: true
matchPatterns:
- pattern: /home/*/.ssh/**
action: Allow |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/var/log/audispd.log'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. '/etc/audit/audit.rules'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. '/var/log/auth.log'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
file:
matchPaths:
- path: /var/log/audispd.log
readOnly: true
- path: /etc/audit/audit.rules
readOnly: true
- path: /var/log/auth.log
readOnly: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/apt'. '/usr/bin/wget'. '/usr/bin/curl'. '/usr/bin/http'. '/usr/bin/shell'. '/usr/bin/zypp'. '/usr/bin/yum'. '/usr/bin/zypper'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
process:
matchPaths:
- path: /usr/bin/apt
- path: /usr/bin/wget
- path: /usr/bin/curl
- path: /usr/bin/http
- path: /usr/bin/shell
- path: /usr/bin/zypp
- path: /usr/bin/yum
- path: /usr/bin/zypper
ownerOnly: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/proc/bus/usb/'. '/media/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
process:
matchDirectories:
- dir: /proc/bus/usb/
- dir: /media/
recursive: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/usr/bin/md5sum'. '/dev/zero'. '/usr/bin/sha1sum'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. applies the rule to processes with the '/etc/systemd/system/*.service' pattern. '/etc/systemd/system/*.service.d/*CPUShares.conf' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
process:
matchPatterns:
- pattern: /etc/systemd/system/*.service
- pattern: /etc/systemd/system/*.service.d/*CPUShares.conf
file:
matchPaths:
- path: /usr/bin/md5sum
- path: /dev/zero
- path: /usr/bin/sha1sum
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/var/adm/wtmp'. '/var/adm/pacct'. '/var/adm/sulog'. '/var/log/wtmp'. '/var/log/btmp'. '/var/run/utmp'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/dpkg'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
process:
matchPaths:
- path: /usr/bin/dpkg
file:
matchPaths:
- path: /var/adm/wtmp
- path: /var/adm/pacct
- path: /var/adm/sulog
- path: /var/log/wtmp
- path: /var/log/btmp
- path: /var/run/utmp
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/*/apt-get install *' pattern. '/*/*/apt-get install *' pattern. '/*/apt install *' pattern. '/*/*/apt install *' pattern. '/*/apt install fwupd #new firmware installation' pattern. '/*/*/apt install fwupd' pattern. '/*/apt-get install fwupd' pattern. '/*/*/apt-get install fwupd' pattern. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/dev/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
process:
matchPatterns:
- pattern: /*/apt-get install *
- pattern: /*/*/apt-get install *
- pattern: /*/apt install *
- pattern: /*/*/apt install *
- pattern: /*/apt install fwupd #new firmware installation
- pattern: /*/*/apt install fwupd
- pattern: /*/apt-get install fwupd
- pattern: /*/*/apt-get install fwupd
matchDirectories:
- dir: /dev/
recursive: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/lib/mysql/mysql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
file:
matchDirectories:
- dir: /var/lib/mysql/mysql/
recursive: true
readOnly: false
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/var/log/mysql.log'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/usr/bin/rm'. '/usr/bin/touch'. '/usr/bin/cat'. '/usr/bin/nano'. '/usr/bin/vi'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
file:
matchPaths:
- path: /var/log/mysql.log
fromSource:
- path: /usr/bin/rm
- path: /usr/bin/touch
- path: /usr/bin/cat
- path: /usr/bin/nano
- path: /usr/bin/vi
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/rc.local'. '/lib/systemd/system/rc-local.service'. '/lib/systemd/system/rc.service'. '/usr/lib/systemd/system/rc-local.service'. '/usr/lib/systemd/system/rc.service'. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/lib/systemd/system/rc-local.service.d/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/usr/lib/systemd/system/rc-local.service.d/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/etc/rc.local'. '/lib/systemd/system/rc-local.service'. '/lib/systemd/system/rc.service'. '/usr/lib/systemd/system/rc-local.service'. '/usr/lib/systemd/system/rc.service'. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/lib/systemd/system/rc-local.service.d/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. '/usr/lib/systemd/system/rc-local.service.d/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
process:
matchPaths:
- path: /etc/rc.local
- path: /lib/systemd/system/rc-local.service
- path: /lib/systemd/system/rc.service
- path: /usr/lib/systemd/system/rc-local.service
- path: /usr/lib/systemd/system/rc.service
matchDirectories:
- dir: /lib/systemd/system/rc-local.service.d/
recursive: true
- dir: /usr/lib/systemd/system/rc-local.service.d/
recursive: true
file:
matchPaths:
- path: /etc/rc.local
- path: /lib/systemd/system/rc-local.service
- path: /lib/systemd/system/rc.service
- path: /usr/lib/systemd/system/rc-local.service
- path: /usr/lib/systemd/system/rc.service
matchDirectories:
- dir: /lib/systemd/system/rc-local.service.d/
recursive: true
readOnly: false
- dir: /usr/lib/systemd/system/rc-local.service.d/
recursive: true
readOnly: false
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/postgresql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/etc/postgresql-common/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
file:
matchDirectories:
- dir: /etc/postgresql/
recursive: true
readOnly: false
- dir: /etc/postgresql-common/
recursive: true
readOnly: false
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/local/lib/python3.10/site-packages/pygments/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. applies the rule to processes with the '/*/*/*/python -m pip install pygments*' pattern. '/*/*/python -m pip install pygments*' pattern. '/*/python -m pip install pygments*' pattern. '/*/*/*/pip install pygments*' pattern. '/*/*/pip install pygments*' pattern. '/*/pip install pygments*' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
process:
matchPatterns:
- pattern: /*/*/*/python -m pip install pygments*
- pattern: /*/*/python -m pip install pygments*
- pattern: /*/python -m pip install pygments*
- pattern: /*/*/*/pip install pygments*
- pattern: /*/*/pip install pygments*
- pattern: /*/pip install pygments*
file:
matchDirectories:
- dir: /usr/local/lib/python3.10/site-packages/pygments/
recursive: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/scp'. '/usr/bin/sftp'. '/usr/bin/rsync'. '/usr/bin/ftp'. '/usr/bin/readlink'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
process:
matchPaths:
- path: /usr/bin/scp
- path: /usr/bin/sftp
- path: /usr/bin/rsync
- path: /usr/bin/ftp
- path: /usr/bin/readlink
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/lib/postgresql/data/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/bin/rm', specifies a rule that matches a specific directory path '/bin/rmdir', specifies a rule that matches a specific directory path '/bin/mv', Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
file:
matchDirectories:
- dir: /var/lib/postgresql/data/
recursive: true
readOnly: false
fromSource:
- path: /bin/rm
- path: /bin/rmdir
- path: /bin/mv
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/root/.bashrc'. '/root/.bash_history'. '/home/user1/.profile'. '/home/user1/.bashrc'. '/run/utmp'. '/dev/tty'. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/home/user1/', ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. specifies a rule that matches a specific directory path '/etc/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/proc/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Allow' allows access to the matching file. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/bin/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. '/usr/bin/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Allow' action allows the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
process:
matchDirectories:
- dir: /bin/
recursive: true
- dir: /usr/bin/
recursive: true
file:
matchPaths:
- path: /root/.bashrc
- path: /root/.bash_history
- path: /home/user1/.profile
- path: /home/user1/.bashrc
- path: /run/utmp
- path: /dev/tty
matchDirectories:
- dir: /home/user1/
ownerOnly: true
- dir: /etc/
recursive: true
- dir: /proc/
recursive: true
action: Allow |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/home/user1/', ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
file:
matchDirectories:
- dir: /home/user1/
ownerOnly: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/credentials/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/bin/cat', Specifies what to do when rules match, in which case the action 'Allow' allows access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
- WARNING
file:
matchDirectories:
- dir: /credentials/
recursive: true
fromSource:
- path: /bin/cat
action: Allow |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/home/user1/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
file:
matchDirectories:
- dir: /home/user1/
recursive: true
ownerOnly: true
readOnly: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/root/.bashrc'. '/root/.bash_history'. '/home/user1/.profile'. '/home/user1/.bashrc'. '/run/utmp'. '/dev/tty'. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/proc/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/lib/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/sys/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/pts/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Allow' allows access to the matching file. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/bin/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. '/usr/bin/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Allow' action allows the execution of the matching process. apply rules to the executable processes at paths '/home/user1/hello'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
process:
matchPaths:
- path: /home/user1/hello
ownerOnly: true
matchDirectories:
- dir: /bin/
recursive: true
- dir: /usr/bin/
recursive: true
file:
matchPaths:
- path: /root/.bashrc
- path: /root/.bash_history
- path: /home/user1/.profile
- path: /home/user1/.bashrc
- path: /run/utmp
- path: /dev/tty
matchDirectories:
- dir: /etc/
recursive: true
- dir: /proc/
recursive: true
- dir: /lib/
recursive: true
- dir: /sys/
recursive: true
- dir: /pts/
recursive: true
action: Allow |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/root/.bashrc'. '/root/.bash_history'. '/dev/tty'. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/credentials/', specifies a rule that matches a specific directory path '/etc/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/proc/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Allow' allows access to the matching file. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/bin/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. '/usr/bin/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Allow' action allows the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
process:
matchDirectories:
- dir: /bin/
recursive: true
- dir: /usr/bin/
recursive: true
file:
matchPaths:
- path: /root/.bashrc
- path: /root/.bash_history
- path: /dev/tty
matchDirectories:
- dir: /credentials/
- dir: /etc/
recursive: true
- dir: /proc/
recursive: true
action: Allow |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/credentials/password'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/readwrite'. Specifies what to do when rules match, in which case the action 'Allow' allows access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
file:
matchPaths:
- path: /credentials/password
readOnly: true
fromSource:
- path: /readwrite
action: Allow |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/credentials/password'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/readwrite'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
file:
matchPaths:
- path: /credentials/password
readOnly: true
fromSource:
- path: /readwrite
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/home/user1/secret_data1.txt'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/readwrite'. Specifies what to do when rules match, in which case the action 'Allow' allows access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
file:
matchPaths:
- path: /home/user1/secret_data1.txt
readOnly: true
ownerOnly: true
fromSource:
- path: /readwrite
action: Allow |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/usr/local/tomcat/conf/web.xml'. '/usr/local/tomcat/webapps.dist/ROOT/WEB-INF/web.xml'. '/usr/local/tomcat/webapps.dist/docs/WEB-INF/web.xml'. '/usr/local/tomcat/webapps.dist/docs/appdev/sample/web/WEB-INF/web.xml'. '/usr/local/tomcat/webapps.dist/examples/jsp/security/protected/error.jsp'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchPaths:
- path: /usr/local/tomcat/conf/web.xml
- path: /usr/local/tomcat/webapps.dist/ROOT/WEB-INF/web.xml
- path: /usr/local/tomcat/webapps.dist/docs/WEB-INF/web.xml
- path: /usr/local/tomcat/webapps.dist/docs/appdev/sample/web/WEB-INF/web.xml
- path: /usr/local/tomcat/webapps.dist/examples/jsp/security/protected/error.jsp
action: Audit |