instruction
stringlengths 172
6.32k
| output
stringlengths 88
4.06k
|
---|---|
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the network-related policies. In this case, rule applies to raw network traffic. Specifies what to do when rules match, which means relevant network activities will be logged. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
network:
matchProtocols:
- protocol: raw
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the network-related policies. In this case, rule applies to TCP network traffic. When the 'fromSource' field is defined, the action is only applied from '/usr/bin/curl' Specifies what to do when rules match, which means relevant network activities will be allowed. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
network:
matchProtocols:
- protocol: tcp
fromSource:
- path: /usr/bin/curl
action: Allow |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/apt'. '/usr/bin/apt-get'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPaths:
- path: /usr/bin/apt
- path: /usr/bin/apt-get
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source Specifies a rule that matches a specific file absolute path '/usr/bin/shred'. '/usr/bin/rm'. '/bin/mv'. '/bin/rm'. '/usr/bin/mv'. Specifies a rule that matches a specific file absolute path '/root/*_history'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/usr/bin/shred'. '/usr/bin/rm'. '/bin/rm'. '/bin/mv'. '/usr/bin/mv'. Specifies a rule that matches a specific file absolute path '/home/*/*_history'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPaths:
- fromSource:
- path: /usr/bin/shred
- path: /usr/bin/rm
- path: /bin/mv
- path: /bin/rm
- path: /usr/bin/mv
path: /root/*_history
- fromSource:
- path: /usr/bin/shred
- path: /usr/bin/rm
- path: /bin/rm
- path: /bin/mv
- path: /usr/bin/mv
path: /home/*/*_history
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/dev/shm/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchDirectories:
- dir: /dev/shm/
readOnly: true
recursive: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/run/secrets/kubernetes.io/serviceaccount/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchDirectories:
- dir: /run/secrets/kubernetes.io/serviceaccount/
recursive: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/apt'. '/usr/bin/apt-get'. '/bin/apt-get'. '/sbin/apk'. '/bin/apt'. '/usr/bin/dpkg'. '/bin/dpkg'. '/usr/bin/gdebi'. '/bin/gdebi'. '/usr/bin/make'. '/bin/make'. '/usr/bin/yum'. '/bin/yum'. '/usr/bin/rpm'. '/bin/rpm'. '/usr/bin/dnf'. '/bin/dnf'. '/usr/bin/pacman'. '/usr/sbin/pacman'. '/bin/pacman'. '/sbin/pacman'. '/usr/bin/makepkg'. '/usr/sbin/makepkg'. '/bin/makepkg'. '/sbin/makepkg'. '/usr/bin/yaourt'. '/usr/sbin/yaourt'. '/bin/yaourt'. '/sbin/yaourt'. '/usr/bin/zypper'. '/bin/zypper'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPaths:
- path: /usr/bin/apt
- path: /usr/bin/apt-get
- path: /bin/apt-get
- path: /sbin/apk
- path: /bin/apt
- path: /usr/bin/dpkg
- path: /bin/dpkg
- path: /usr/bin/gdebi
- path: /bin/gdebi
- path: /usr/bin/make
- path: /bin/make
- path: /usr/bin/yum
- path: /bin/yum
- path: /usr/bin/rpm
- path: /bin/rpm
- path: /usr/bin/dnf
- path: /bin/dnf
- path: /usr/bin/pacman
- path: /usr/sbin/pacman
- path: /bin/pacman
- path: /sbin/pacman
- path: /usr/bin/makepkg
- path: /usr/sbin/makepkg
- path: /bin/makepkg
- path: /sbin/makepkg
- path: /usr/bin/yaourt
- path: /usr/sbin/yaourt
- path: /bin/yaourt
- path: /sbin/yaourt
- path: /usr/bin/zypper
- path: /bin/zypper
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/ssl/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/etc/pki/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/usr/local/share/ca-certificates/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchDirectories:
- dir: /etc/ssl/
readOnly: true
recursive: true
- dir: /etc/pki/
readOnly: true
recursive: true
- dir: /usr/local/share/ca-certificates/
readOnly: true
recursive: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchDirectories:
- dir: /etc/
readOnly: true
recursive: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/passwd'. '/etc/shadow'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. applies the rule to processes with the '/proc/**/cmdline' pattern. '/proc/**/sched_debug' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPaths:
- path: /etc/passwd
- path: /etc/shadow
process:
matchPatterns:
- pattern: /proc/**/cmdline
- pattern: /proc/**/sched_debug
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/group'. '/etc/group-'. '/etc/passwd'. '/etc/gshadow'. '/etc/gshadow-'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/sbin/pwconv'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPaths:
- path: /usr/sbin/pwconv
file:
matchPaths:
- path: /etc/group
- path: /etc/group-
- path: /etc/passwd
- path: /etc/gshadow
- path: /etc/gshadow-
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/usr/lib64/apache2-prefork/mod_ssl.so'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPaths:
- path: /usr/lib64/apache2-prefork/mod_ssl.so
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/**/timelion/run' pattern. '/**/**/timelion/run' pattern. '/**/**/api/timelion/run' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPatterns:
- pattern: /**/timelion/run
- pattern: /**/**/timelion/run
- pattern: /**/**/api/timelion/run
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. applies the rule to files with the '/**/bower.json' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPatterns:
- pattern: /**/bower.json
readOnly: false
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/sql/sql_type.cc'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPaths:
- path: /sql/sql_type.cc
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/scp'. '/usr/bin/sftp'. '/usr/bin/rsync'. '/usr/bin/dcp'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPaths:
- path: /usr/bin/scp
- path: /usr/bin/sftp
- path: /usr/bin/rsync
- path: /usr/bin/dcp
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/mongod.conf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPaths:
- path: /etc/mongod.conf
ownerOnly: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/sbin/useradd'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/sbin/groupadd'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/sbin/userdel'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/sbin/usermod'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPaths:
- path: /usr/sbin/useradd
ownerOnly: true
- path: /usr/sbin/groupadd
ownerOnly: true
- path: /usr/sbin/userdel
ownerOnly: true
- path: /usr/sbin/usermod
ownerOnly: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. applies the rule to files with the '/**/*.log' pattern, ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPatterns:
- pattern: /**/*.log
ownerOnly: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/dev/shm/.alsp'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/dev/shm/sbin'. '/usr/bin/tshd'. '/usr/bin/kube'. '/usr/bin/bioset'. '/usr/bin/apt'. '/usr/bin/apt-get'. '/usr/bin/tar'. '/bin/tar'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPaths:
- path: /dev/shm/sbin
- path: /usr/bin/tshd
- path: /usr/bin/kube
- path: /usr/bin/bioset
- path: /usr/bin/apt
- path: /usr/bin/apt-get
- path: /usr/bin/tar
- path: /bin/tar
file:
matchPaths:
- path: /dev/shm/.alsp
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. applies the rule to files with the '/var/www/html/wp-content/uploads/**/*.php' pattern, '/var/www/html/wp-content/uploads/**/*.sh' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPatterns:
- pattern: /var/www/html/wp-content/uploads/**/*.php
- pattern: /var/www/html/wp-content/uploads/**/*.sh
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. applies the rule to files with the '/**/cache/backup/*' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPatterns:
- pattern: /**/cache/backup/*
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. applies the rule to files with the '/var/www/html/wp-content/uploads/**/*.php' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/bin/sh'. When the 'fromSource' field is defined, the action is only applied to source processes in the path '/usr/sbin/apache2'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPaths:
- path: /bin/sh
fromSource:
- path: /usr/sbin/apache2
file:
matchPatterns:
- pattern: /var/www/html/wp-content/uploads/**/*.php
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. applies the rule to files with the '/**/glpi/plugins/barcode/front/send.php' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPatterns:
- pattern: /**/glpi/plugins/barcode/front/send.php
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/hostname'. '/etc/hosts.allow'. '/etc/hosts'. '/etc/lsb-release'. '/etc/networks'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPaths:
- path: /etc/hostname
- path: /etc/hosts.allow
- path: /etc/hosts
- path: /etc/lsb-release
- path: /etc/networks
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. applies the rule to files with the '/**/.git/' pattern, '/**/.git/*' pattern, '/**/.git/*.*' pattern, '/**/.git/**/*.*' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/src/static/.git/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchDirectories:
- dir: /src/static/.git/
recursive: true
matchPatterns:
- pattern: /**/.git/
- pattern: /**/.git/*
- pattern: /**/.git/*.*
- pattern: /**/.git/**/*.*
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/secret.txt'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/bin/cat'. Specifies what to do when rules match, in which case the action 'Allow' allows access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPaths:
- path: /secret.txt
fromSource:
- path: /bin/cat
action: Allow |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/home/user1/secret_data1.txt'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/bin/cat'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPaths:
- path: /home/user1/secret_data1.txt
ownerOnly: true
fromSource:
- path: /bin/cat
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. applies the rule to files with the '/**/service.pwd' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPatterns:
- pattern: /**/service.pwd
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/passwd'. '/etc/passwd-'. '/etc/shadow'. '/etc/shadow-'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/etc'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/etc/passwd'. '/etc/passwd-'. '/etc/shadow'. '/etc/shadow-'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPaths:
- path: /etc/passwd
- path: /etc/passwd-
- path: /etc/shadow
- path: /etc/shadow-
file:
matchPaths:
- path: /etc/passwd
- path: /etc/passwd-
- path: /etc/shadow
- path: /etc/shadow-
fromSource:
- path: /etc
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/usr/bin/pg_ctlcluster'. '/var/log/postgresql'. '/usr/lib/postgresql/13/bin/pg_ctl'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/usr'. '/lib'. '/var'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/pg_ctlcluster'. '/var/log/postgresql'. '/usr/lib/postgresql/13/bin/pg_ctl'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPaths:
- path: /usr/bin/pg_ctlcluster
- path: /var/log/postgresql
- path: /usr/lib/postgresql/13/bin/pg_ctl
file:
matchPaths:
- path: /usr/bin/pg_ctlcluster
- path: /var/log/postgresql
- path: /usr/lib/postgresql/13/bin/pg_ctl
fromSource:
- path: /usr
- path: /lib
- path: /var
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/ssh/moduli'. '/etc/ssh/ssh_host_ecdsa_key'. '/etc/ssh/ssh_host_ed25519_key'. '/etc/ssh/ssh_host_rsa_key'. '/etc/ssh/ssh_import_id'. '/etc/ssh/ssh_config'. '/etc/ssh/ssh_host_ecdsa_key.pub'. '/etc/ssh/ssh_host_ed25519_key.pub'. '/etc/ssh/ssh_host_rsa_key.pub'. '/etc/ssh/sshd_config'. '/usr/lib/openssh/agent-launch'. '/usr/lib/openssh/ssh-session-cleanup'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/ssh'. '/usr/bin/ssh-add'. '/usr/bin/ssh-argv0'. '/usr/bin/ssh-copy-id'. '/usr/bin/ssh-import-id'. '/usr/bin/ssh-import-id-gh'. '/usr/bin/ssh-import-id-lp'. '/usr/bin/ssh-keygen'. '/usr/bin/ssh-keyscan'. '/usr/lib/openssh/ssh-keysign'. '/usr/lib/openssh/sftp-server'. '/usr/lib/openssh/ssh-pkcs11-helper'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPaths:
- path: /etc/ssh/moduli
- path: /etc/ssh/ssh_host_ecdsa_key
- path: /etc/ssh/ssh_host_ed25519_key
- path: /etc/ssh/ssh_host_rsa_key
- path: /etc/ssh/ssh_import_id
- path: /etc/ssh/ssh_config
- path: /etc/ssh/ssh_host_ecdsa_key.pub
- path: /etc/ssh/ssh_host_ed25519_key.pub
- path: /etc/ssh/ssh_host_rsa_key.pub
- path: /etc/ssh/sshd_config
- path: /usr/lib/openssh/agent-launch
- path: /usr/lib/openssh/ssh-session-cleanup
process:
matchPaths:
- path: /usr/bin/ssh
- path: /usr/bin/ssh-add
- path: /usr/bin/ssh-argv0
- path: /usr/bin/ssh-copy-id
- path: /usr/bin/ssh-import-id
- path: /usr/bin/ssh-import-id-gh
- path: /usr/bin/ssh-import-id-lp
- path: /usr/bin/ssh-keygen
- path: /usr/bin/ssh-keyscan
- path: /usr/lib/openssh/ssh-keysign
- path: /usr/lib/openssh/sftp-server
- path: /usr/lib/openssh/ssh-pkcs11-helper
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/audit/audit'. '/etc/audit/auditd.conf'. '/var/log/audit/audit.log'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPaths:
- path: /etc/audit/audit
- path: /etc/audit/auditd.conf
- path: /var/log/audit/audit.log
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/apt'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/apt'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/dpkg'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/dpkg'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/gdebi'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/gdebi'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/make'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/make'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/yum'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/yum'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/rpm'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/rpm'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/dnf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/dnf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/pacman'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/sbin/pacman'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/pacman'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/sbin/pacman'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/makepkg'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/sbin/makepkg'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/makepkg'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/sbin/makepkg'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/yaourt'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/sbin/yaourt'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/yaourt'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/sbin/yaourt'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/zypper'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/zypper'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPaths:
- path: /usr/bin/apt
ownerOnly: true
- path: /bin/apt
ownerOnly: true
- path: /usr/bin/dpkg
ownerOnly: true
- path: /bin/dpkg
ownerOnly: true
- path: /usr/bin/gdebi
ownerOnly: true
- path: /bin/gdebi
ownerOnly: true
- path: /usr/bin/make
ownerOnly: true
- path: /bin/make
ownerOnly: true
- path: /usr/bin/yum
ownerOnly: true
- path: /bin/yum
ownerOnly: true
- path: /usr/bin/rpm
ownerOnly: true
- path: /bin/rpm
ownerOnly: true
- path: /usr/bin/dnf
ownerOnly: true
- path: /bin/dnf
ownerOnly: true
- path: /usr/bin/pacman
ownerOnly: true
- path: /usr/sbin/pacman
ownerOnly: true
- path: /bin/pacman
ownerOnly: true
- path: /sbin/pacman
ownerOnly: true
- path: /usr/bin/makepkg
ownerOnly: true
- path: /usr/sbin/makepkg
ownerOnly: true
- path: /bin/makepkg
ownerOnly: true
- path: /sbin/makepkg
ownerOnly: true
- path: /usr/bin/yaourt
ownerOnly: true
- path: /usr/sbin/yaourt
ownerOnly: true
- path: /bin/yaourt
ownerOnly: true
- path: /sbin/yaourt
ownerOnly: true
- path: /usr/bin/zypper
ownerOnly: true
- path: /bin/zypper
ownerOnly: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/proc/bus/usb/'. '/media/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchDirectories:
- dir: /proc/bus/usb/
- dir: /media/
recursive: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/skel/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chmod'. '/usr/sbin/useradd'. '/usr/bin/chown'. '/usr/sbin/userdel'. '/usr/bin/kill'. '/usr/sbin/usermod'. '/usr/bin/passwd'. '/usr/bin/chsh'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPaths:
- path: /usr/bin/chmod
- path: /usr/sbin/useradd
- path: /usr/bin/chown
- path: /usr/sbin/userdel
- path: /usr/bin/kill
- path: /usr/sbin/usermod
- path: /usr/bin/passwd
- path: /usr/bin/chsh
file:
matchDirectories:
- dir: /etc/skel/
recursive: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/var/adm/wtmp'. '/var/adm/pacct'. '/var/adm/sulog'. '/var/log/wtmp'. '/var/log/btmp'. '/var/run/utmp'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/dpkg'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPaths:
- path: /usr/bin/dpkg
file:
matchPaths:
- path: /var/adm/wtmp
- path: /var/adm/pacct
- path: /var/adm/sulog
- path: /var/log/wtmp
- path: /var/log/btmp
- path: /var/run/utmp
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/*/apt-get install *' pattern. '/*/*/apt-get install *' pattern. '/*/apt install *' pattern. '/*/*/apt install *' pattern. '/*/apt install fwupd #new firmware installation' pattern. '/*/*/apt install fwupd' pattern. '/*/apt-get install fwupd' pattern. '/*/*/apt-get install fwupd' pattern. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/dev/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPatterns:
- pattern: /*/apt-get install *
- pattern: /*/*/apt-get install *
- pattern: /*/apt install *
- pattern: /*/*/apt install *
- pattern: /*/apt install fwupd #new firmware installation
- pattern: /*/*/apt install fwupd
- pattern: /*/apt-get install fwupd
- pattern: /*/*/apt-get install fwupd
matchDirectories:
- dir: /dev/
recursive: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/log/postgresql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/usr/bin/touch', specifies a rule that matches a specific directory path '/usr/bin/chmod', specifies a rule that matches a specific directory path '/usr/bin/nano', specifies a rule that matches a specific directory path '/usr/bin/cat', specifies a rule that matches a specific directory path '/usr/bin/vi', Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchDirectories:
- dir: /var/log/postgresql/
recursive: true
readOnly: false
fromSource:
- path: /usr/bin/touch
- path: /usr/bin/chmod
- path: /usr/bin/nano
- path: /usr/bin/cat
- path: /usr/bin/vi
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/ld.so.preload'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPaths:
- path: /etc/ld.so.preload
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/psql'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/psql'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/share/postgresql-common/pg_wrapper'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPaths:
- path: /usr/bin/psql
ownerOnly: true
- path: /bin/psql
ownerOnly: true
- path: /usr/share/postgresql-common/pg_wrapper
ownerOnly: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. applies the rule to files with the '/**/robomongo.json' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPatterns:
- pattern: /**/robomongo.json
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/**/chmod' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPatterns:
- pattern: /**/chmod
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related Linux capabilities. apply the rule to the capability name 'net_raw'. Specifies what to do when rules match, in this case, the 'Block' action blocks the matching capability behavior. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
capabilities:
matchCapabilities:
- capability: net_raw
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. applies the rule to files with the '/home/user1/secret_data*' pattern, ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPatterns:
- pattern: /home/user1/secret_data*
ownerOnly: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/credentials/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
- WARNING
file:
matchDirectories:
- dir: /credentials/
readOnly: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/apt'. '/usr/bin/apt-get'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPaths:
- path: /usr/bin/apt
- path: /usr/bin/apt-get
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. applies the rule to files with the '/**/debug/default/*' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPatterns:
- pattern: /**/debug/default/*
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/dev/random'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java'. Specifies a rule that matches a specific file absolute path '/dev/urandom'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java'. Specifies a rule that matches a specific file absolute path '/etc/gai.conf'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java'. Specifies a rule that matches a specific file absolute path '/etc/host.conf'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java'. Specifies a rule that matches a specific file absolute path '/etc/resolv.conf'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java'. Specifies a rule that matches a specific file absolute path '/lib/x86_64-linux-gnu/libcrypt.so.1'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java'. Specifies a rule that matches a specific file absolute path '/lib/x86_64-linux-gnu/libuuid.so.1'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java'. Specifies a rule that matches a specific file absolute path '/usr/lib/x86_64-linux-gnu/libapr-1.so.0'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java'. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/proc/', When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java', specifies a rule that matches a specific directory path '/sys/', When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java', specifies a rule that matches a specific directory path '/usr/lib/jvm/java-8-openjdk-amd64/jre/lib/', When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java', specifies a rule that matches a specific directory path '/usr/local/tomcat/', When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java', Specifies what to do when rules match, in which case the action 'Allow' allows access to the matching file. defines the network-related policies. In this case, rule applies to raw network traffic. When the 'fromSource' field is defined, the action is only applied from '/usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java' TCP network traffic. When the 'fromSource' field is defined, the action is only applied from '/usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java' UDP network traffic. When the 'fromSource' field is defined, the action is only applied from '/usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java' Specifies what to do when rules match, which means relevant network activities will be allowed. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPaths:
- path: /dev/random
fromSource:
- path: /usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java
- path: /dev/urandom
fromSource:
- path: /usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java
- path: /etc/gai.conf
fromSource:
- path: /usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java
- path: /etc/host.conf
fromSource:
- path: /usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java
- path: /etc/resolv.conf
fromSource:
- path: /usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java
- path: /lib/x86_64-linux-gnu/libcrypt.so.1
fromSource:
- path: /usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java
- path: /lib/x86_64-linux-gnu/libuuid.so.1
fromSource:
- path: /usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java
- path: /usr/lib/x86_64-linux-gnu/libapr-1.so.0
fromSource:
- path: /usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java
matchDirectories:
- dir: /proc/
fromSource:
- path: /usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java
- dir: /sys/
fromSource:
- path: /usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java
- dir: /usr/lib/jvm/java-8-openjdk-amd64/jre/lib/
fromSource:
- path: /usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java
- dir: /usr/local/tomcat/
fromSource:
- path: /usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java
network:
matchProtocols:
- protocol: raw
fromSource:
- path: /usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java
- protocol: tcp
fromSource:
- path: /usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java
- protocol: udp
fromSource:
- path: /usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java
action: Allow |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chmod'. '/usr/bin/chown'. '/bin/chmod'. '/bin/chown'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPaths:
- path: /usr/bin/chmod
- path: /usr/bin/chown
- path: /bin/chmod
- path: /bin/chown
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/rsync'. '/bin/rsync'. '/usr/bin/scp'. '/bin/scp'. '/usr/bin/scp'. '/bin/scp'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPaths:
- path: /usr/bin/rsync
- path: /bin/rsync
- path: /usr/bin/scp
- path: /bin/scp
- path: /usr/bin/scp
- path: /bin/scp
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/who'. '/usr/bin/w'. '/usr/bin/id'. '/usr/bin/whoami'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPaths:
- path: /usr/bin/who
- path: /usr/bin/w
- path: /usr/bin/id
- path: /usr/bin/whoami
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/ssl/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/etc/pki/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/usr/local/share/ca-certificates/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchDirectories:
- dir: /etc/ssl/
readOnly: true
recursive: true
- dir: /etc/pki/
readOnly: true
recursive: true
- dir: /usr/local/share/ca-certificates/
readOnly: true
recursive: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/bin/busybox'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPaths:
- path: /bin/busybox
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/usr/local/tomcat/conf/jaspic-providers.xml'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPaths:
- path: /usr/local/tomcat/conf/jaspic-providers.xml
ownerOnly: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/usr/local/tomcat/conf/catalina.properties'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPaths:
- path: /usr/local/tomcat/conf/catalina.properties
ownerOnly: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/modprobe.d/cramfs.conf'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/bin/false'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPaths:
- path: /etc/modprobe.d/cramfs.conf
fromSource:
- path: /bin/false
readOnly: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/lib/mysql/', specifies a rule that matches a specific directory path '/media/mysql/', Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/etc/apparmor.d/usr.sbin.mysqld'. applies the rule to processes with the 'mysqld' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchDirectories:
- dir: /var/lib/mysql/
- dir: /media/mysql/
process:
matchPaths:
- path: /etc/apparmor.d/usr.sbin.mysqld
matchPatterns:
- pattern: mysqld
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/proc/*/environ' pattern. '/*/grep MYSQL_PWD /proc/*/environ' pattern. '/*/*/grep MYSQL_PWD /proc/*/environ' pattern. '/*/*/*/grep MYSQL_PWD /proc/*/environ' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPatterns:
- pattern: /proc/*/environ
- pattern: /*/grep MYSQL_PWD /proc/*/environ
- pattern: /*/*/grep MYSQL_PWD /proc/*/environ
- pattern: /*/*/*/grep MYSQL_PWD /proc/*/environ
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/*.mysql history' pattern. '/*.mysql_history' pattern. '/*.mysqlsh/history' pattern. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPatterns:
- pattern: /*.mysql history
- pattern: /*.mysql_history
- pattern: /*.mysqlsh/history
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the network-related policies. In this case, rule applies to raw network traffic. Specifies what to do when rules match, which means relevant network activities will be logged. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
network:
matchProtocols:
- protocol: raw
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chmod'. '/usr/bin/chown'. '/bin/chmod'. '/bin/chown'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPaths:
- path: /usr/bin/chmod
- path: /usr/bin/chown
- path: /bin/chmod
- path: /bin/chown
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/bin/mount'. '/usr/bin/mount'. '/bin/umount'. '/usr/bin/umount'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPaths:
- path: /bin/mount
- path: /usr/bin/mount
- path: /bin/umount
- path: /usr/bin/umount
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/issue'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. '/etc/issue.net'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. '/etc/hosts'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. '/etc/sysconfig/network'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPaths:
- path: /etc/issue
readOnly: true
- path: /etc/issue.net
readOnly: true
- path: /etc/hosts
readOnly: true
- path: /etc/sysconfig/network
readOnly: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/dev/shm/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchDirectories:
- dir: /dev/shm/
readOnly: true
recursive: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/sbin/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/usr/bin/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/usr/lib/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/usr/sbin/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/bin/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/boot/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchDirectories:
- dir: /sbin/
readOnly: true
recursive: true
- dir: /usr/bin/
readOnly: true
recursive: true
- dir: /usr/lib/
readOnly: true
recursive: true
- dir: /usr/sbin/
readOnly: true
recursive: true
- dir: /bin/
readOnly: true
recursive: true
- dir: /boot/
readOnly: true
recursive: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/sbin/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchDirectories:
- dir: /sbin/
recursive: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/rsync'. '/bin/rsync'. '/usr/bin/scp'. '/bin/scp'. '/usr/bin/scp'. '/bin/scp'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPaths:
- path: /usr/bin/rsync
- path: /bin/rsync
- path: /usr/bin/scp
- path: /bin/scp
- path: /usr/bin/scp
- path: /bin/scp
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/sbin/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchDirectories:
- dir: /sbin/
recursive: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. applies the rule to files with the '/**/airflow.cfg' pattern, ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPatterns:
- pattern: /**/airflow.cfg
ownerOnly: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. applies the rule to files with the '/**/apc/apc.php' pattern, '/**/apc.php' pattern, ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPatterns:
- pattern: /**/apc/apc.php
- pattern: /**/apc.php
ownerOnly: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/local/mysql/data/', ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchDirectories:
- dir: /usr/local/mysql/data/
ownerOnly: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/root/.bash_profile'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. '/root/.bashrc'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. '/etc/profile'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPaths:
- path: /root/.bash_profile
readOnly: true
- path: /root/.bashrc
readOnly: true
- path: /etc/profile
readOnly: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/cassandra/jmxremote.password'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPaths:
- path: /etc/cassandra/jmxremote.password
ownerOnly: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/row/row0mysql.cc'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPaths:
- path: /row/row0mysql.cc
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/shadow'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPaths:
- path: /etc/shadow
ownerOnly: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/log/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. specifies a rule that matches a specific directory path '/dev/log/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchDirectories:
- dir: /var/log/
recursive: true
readOnly: true
- dir: /dev/log/
recursive: true
readOnly: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/pwnkit/gconv-modules'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/pkexec'. '/pwnkit/pwnkit.c'. '/pwnkit/pwnkit.so'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPaths:
- path: /usr/bin/pkexec
- path: /pwnkit/pwnkit.c
- path: /pwnkit/pwnkit.so
file:
matchPaths:
- path: /pwnkit/gconv-modules
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/passwd'. '/etc/shadow'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/src/server'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPaths:
- path: /etc/passwd
- path: /etc/shadow
fromSource:
- path: /src/server
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/mgmt/tm/util/bash'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPaths:
- path: /mgmt/tm/util/bash
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/secret.txt'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/bin/cat'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPaths:
- path: /secret.txt
fromSource:
- path: /bin/cat
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/home/user1/secret_data1.txt'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/bin/cat'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPaths:
- path: /home/user1/secret_data1.txt
ownerOnly: true
fromSource:
- path: /bin/cat
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/bin/sleep'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPaths:
- path: /bin/sleep
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/tmp/kdevtmpfsi'. '/var/tmp/kinsing'. '/tmp/zzz'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/tmp/kdevtmpfsi'. '/var/tmp/kinsing'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPaths:
- path: /tmp/kdevtmpfsi
- path: /var/tmp/kinsing
file:
matchPaths:
- path: /tmp/kdevtmpfsi
- path: /var/tmp/kinsing
- path: /tmp/zzz
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/who'. '/usr/bin/w'. '/usr/bin/id'. '/usr/bin/whoami'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPaths:
- path: /usr/bin/who
- path: /usr/bin/w
- path: /usr/bin/id
- path: /usr/bin/whoami
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/root/.bashrc'. '/root/.bash_profile'. '/root/.bash_history'. '/root/.bash_login'. '/root/.bash_logout'. '/root/.inputrc'. '/root/.profile'. '/home/*/.bashrc'. '/home/*/.bash_profile'. '/home/*/.bash_history'. '/home/*/.bash_login'. '/home/*/.bash_logout'. '/home/*/.inputrc'. '/home/*/.profile'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPaths:
- path: /root/.bashrc
- path: /root/.bash_profile
- path: /root/.bash_history
- path: /root/.bash_login
- path: /root/.bash_logout
- path: /root/.inputrc
- path: /root/.profile
- path: /home/*/.bashrc
- path: /home/*/.bash_profile
- path: /home/*/.bash_history
- path: /home/*/.bash_login
- path: /home/*/.bash_logout
- path: /home/*/.inputrc
- path: /home/*/.profile
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/bin/'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. '/sbin/'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. '/usr/bin/'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. '/usr/sbin/'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchDirectories:
- dir: /bin/
ownerOnly: true
recursive: true
- dir: /sbin/
ownerOnly: true
recursive: true
- dir: /usr/bin/
ownerOnly: true
recursive: true
- dir: /usr/sbin/
ownerOnly: true
recursive: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/var/log/auth.log'. '/var/log/daemon.log'. '/var/log/debug'. '/var/log/debug'. '/var/log/syslog'. '/var/log/faillog'. '/var/log/lastlog'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPaths:
- path: /var/log/auth.log
- path: /var/log/daemon.log
- path: /var/log/debug
- path: /var/log/debug
- path: /var/log/syslog
- path: /var/log/faillog
- path: /var/log/lastlog
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/profile'. applies the rule to files with the '/**/.bash_profile' pattern, '/**/.bash_login' pattern, '/**/.profile' pattern, '/**/.bashrc' pattern, Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPaths:
- path: /etc/profile
matchPatterns:
- pattern: /**/.bash_profile
- pattern: /**/.bash_login
- pattern: /**/.profile
- pattern: /**/.bashrc
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the network-related policies. In this case, rule applies to ICMP network traffic. Specifies what to do when rules match, which means relevant network activities will be logged. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
network:
matchProtocols:
- protocol: icmp
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/sudoers.d/', ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/etc/pam.d/', ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/etc/', ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies a rule that matches a specific file absolute path '/etc/shadow'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/etc/sudoers'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/etc/pam.conf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/etc/security/pwquality.conf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchDirectories:
- dir: /etc/sudoers.d/
ownerOnly: true
recursive: true
- dir: /etc/pam.d/
ownerOnly: true
recursive: true
- dir: /etc/
ownerOnly: true
recursive: true
matchPaths:
- path: /etc/shadow
ownerOnly: true
- path: /etc/sudoers
ownerOnly: true
- path: /etc/pam.conf
ownerOnly: true
- path: /etc/security/pwquality.conf
ownerOnly: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/apt'. '/usr/bin/wget'. '/usr/bin/curl'. '/usr/bin/http'. '/usr/bin/shell'. '/usr/bin/zypp'. '/usr/bin/yum'. '/usr/bin/zypper'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPaths:
- path: /usr/bin/apt
- path: /usr/bin/wget
- path: /usr/bin/curl
- path: /usr/bin/http
- path: /usr/bin/shell
- path: /usr/bin/zypp
- path: /usr/bin/yum
- path: /usr/bin/zypper
ownerOnly: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/mount'. '/bin/mount'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPaths:
- path: /usr/bin/mount
- path: /bin/mount
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/apt'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/apt'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/dpkg'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/dpkg'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/gdebi'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/gdebi'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/make'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/make'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/yum'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/yum'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/rpm'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/rpm'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/dnf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/dnf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/pacman'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/sbin/pacman'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/pacman'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/sbin/pacman'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/makepkg'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/sbin/makepkg'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/makepkg'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/sbin/makepkg'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/yaourt'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/sbin/yaourt'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/yaourt'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/sbin/yaourt'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/zypper'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/zypper'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPaths:
- path: /usr/bin/apt
ownerOnly: true
- path: /bin/apt
ownerOnly: true
- path: /usr/bin/dpkg
ownerOnly: true
- path: /bin/dpkg
ownerOnly: true
- path: /usr/bin/gdebi
ownerOnly: true
- path: /bin/gdebi
ownerOnly: true
- path: /usr/bin/make
ownerOnly: true
- path: /bin/make
ownerOnly: true
- path: /usr/bin/yum
ownerOnly: true
- path: /bin/yum
ownerOnly: true
- path: /usr/bin/rpm
ownerOnly: true
- path: /bin/rpm
ownerOnly: true
- path: /usr/bin/dnf
ownerOnly: true
- path: /bin/dnf
ownerOnly: true
- path: /usr/bin/pacman
ownerOnly: true
- path: /usr/sbin/pacman
ownerOnly: true
- path: /bin/pacman
ownerOnly: true
- path: /sbin/pacman
ownerOnly: true
- path: /usr/bin/makepkg
ownerOnly: true
- path: /usr/sbin/makepkg
ownerOnly: true
- path: /bin/makepkg
ownerOnly: true
- path: /sbin/makepkg
ownerOnly: true
- path: /usr/bin/yaourt
ownerOnly: true
- path: /usr/sbin/yaourt
ownerOnly: true
- path: /bin/yaourt
ownerOnly: true
- path: /sbin/yaourt
ownerOnly: true
- path: /usr/bin/zypper
ownerOnly: true
- path: /bin/zypper
ownerOnly: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/proc/bus/usb/'. '/media/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchDirectories:
- dir: /proc/bus/usb/
- dir: /media/
recursive: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/dev/lp0'. '/dev/lp1'. '/dev/lp2'. '/dev/lp3'. '/dev/usb/lp0'. '/dev/usb/lp1'. '/dev/usb/lp2'. '/dev/mixer'. '/dev/parport0'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchPaths:
- path: /dev/lp0
- path: /dev/lp1
- path: /dev/lp2
- path: /dev/lp3
- path: /dev/usb/lp0
- path: /dev/usb/lp1
- path: /dev/usb/lp2
- path: /dev/mixer
- path: /dev/parport0
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/systemd/system/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/usr/lib/systemd/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/lib/systemd/system/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchDirectories:
- dir: /etc/systemd/system/
recursive: true
readOnly: false
- dir: /usr/lib/systemd/
recursive: true
readOnly: false
- dir: /lib/systemd/system/
recursive: true
readOnly: false
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/*/*/tcpdump' pattern. '/*/tcpdump' pattern. '/*/*/nc' pattern. '/*/nc' pattern. '/*/*/ncat' pattern. '/*/ncat' pattern. '/*/*/nmap' pattern. '/*/nmap' pattern. '/*/*/dig' pattern. '/*/dig' pattern. '/*/*/tshark' pattern. '/*/tshark' pattern. '/*/*/ngrep' pattern. '/*/ngrep' pattern. '/*/*/telnet' pattern. '/*/telnet' pattern. '/*/*/mitmproxy' pattern. '/*/mitmproxy' pattern. '/*/*/socat' pattern. '/*/socat' pattern. '/*/*/zmap' pattern. '/*/zmap' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPatterns:
- pattern: /*/*/tcpdump
- pattern: /*/tcpdump
- pattern: /*/*/nc
- pattern: /*/nc
- pattern: /*/*/ncat
- pattern: /*/ncat
- pattern: /*/*/nmap
- pattern: /*/nmap
- pattern: /*/*/dig
- pattern: /*/dig
- pattern: /*/*/tshark
- pattern: /*/tshark
- pattern: /*/*/ngrep
- pattern: /*/ngrep
- pattern: /*/*/telnet
- pattern: /*/telnet
- pattern: /*/*/mitmproxy
- pattern: /*/mitmproxy
- pattern: /*/*/socat
- pattern: /*/socat
- pattern: /*/*/zmap
- pattern: /*/zmap
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/local/lib/python3.10/site-packages/pygments/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. applies the rule to processes with the '/*/*/*/python -m pip install pygments*' pattern. '/*/*/python -m pip install pygments*' pattern. '/*/python -m pip install pygments*' pattern. '/*/*/*/pip install pygments*' pattern. '/*/*/pip install pygments*' pattern. '/*/pip install pygments*' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPatterns:
- pattern: /*/*/*/python -m pip install pygments*
- pattern: /*/*/python -m pip install pygments*
- pattern: /*/python -m pip install pygments*
- pattern: /*/*/*/pip install pygments*
- pattern: /*/*/pip install pygments*
- pattern: /*/pip install pygments*
file:
matchDirectories:
- dir: /usr/local/lib/python3.10/site-packages/pygments/
recursive: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/scp'. '/usr/bin/sftp'. '/usr/bin/rsync'. '/usr/bin/ftp'. '/usr/bin/readlink'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPaths:
- path: /usr/bin/scp
- path: /usr/bin/sftp
- path: /usr/bin/rsync
- path: /usr/bin/ftp
- path: /usr/bin/readlink
action: Audit |