instruction
stringlengths
172
6.32k
output
stringlengths
88
4.06k
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: nginx-2'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/home/user1/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: nginx-2 file: matchDirectories: - dir: /home/user1/ recursive: true ownerOnly: true readOnly: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: nginx-2'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/home/user1/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: nginx-2 file: matchDirectories: - dir: /home/user1/ recursive: true ownerOnly: true readOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: nginx-2'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/credentials/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/readwrite', Specifies what to do when rules match, in which case the action 'Allow' allows access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: nginx-2 - WARNING file: matchDirectories: - dir: /credentials/ readOnly: true fromSource: - path: /readwrite action: Allow
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: nginx-2'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/credentials/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/readwrite', Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: nginx-2 - WARNING file: matchDirectories: - dir: /credentials/ readOnly: true fromSource: - path: /readwrite action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: nginx-2'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/home/user1/secret_data1.txt'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: nginx-2 file: matchPaths: - path: /home/user1/secret_data1.txt ownerOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: nginx-2'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/credentials/', Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: nginx-2 file: matchDirectories: - dir: /credentials/ action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: nginx-2'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/apt'. '/usr/bin/apt-get'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: nginx-2 process: matchPaths: - path: /usr/bin/apt - path: /usr/bin/apt-get action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: nginx-2'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/var/www/html/wp-config.php'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/bin/cat'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: nginx-2 file: matchPaths: - path: /var/www/html/wp-config.php fromSource: - path: /bin/cat action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: nginx-2'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chmod'. '/usr/bin/chown'. '/bin/chmod'. '/bin/chown'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: nginx-2 process: matchPaths: - path: /usr/bin/chmod - path: /usr/bin/chown - path: /bin/chmod - path: /bin/chown action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: nginx-2'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/issue'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. '/etc/issue.net'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. '/etc/hosts'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. '/etc/sysconfig/network'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: nginx-2 file: matchPaths: - path: /etc/issue readOnly: true - path: /etc/issue.net readOnly: true - path: /etc/hosts readOnly: true - path: /etc/sysconfig/network readOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: nginx-2'. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/bin/'. '/usr/bin/'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: nginx-2 process: matchDirectories: - dir: /bin/ - dir: /usr/bin/ action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/usr/local/tomcat/conf/jaspic-providers.xml'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns file: matchPaths: - path: /usr/local/tomcat/conf/jaspic-providers.xml ownerOnly: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/modprobe.d/cramfs.conf'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/bin/false'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns file: matchPaths: - path: /etc/modprobe.d/cramfs.conf fromSource: - path: /bin/false readOnly: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/modprobe.d/udf.conf'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/bin/false'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns file: matchPaths: - path: /etc/modprobe.d/udf.conf fromSource: - path: /bin/false readOnly: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/fstab'. '/usr/lib/systemd/system/tmp.mount'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns file: matchPaths: - path: /etc/fstab - path: /usr/lib/systemd/system/tmp.mount action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/nginx/', ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/root/', ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns file: matchDirectories: - dir: /etc/nginx/ ownerOnly: true recursive: true - dir: /root/ ownerOnly: true recursive: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/*.mysql history' pattern. '/*.mysql_history' pattern. '/*.mysqlsh/history' pattern. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns process: matchPatterns: - pattern: /*.mysql history - pattern: /*.mysql_history - pattern: /*.mysqlsh/history action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related Linux capabilities. apply the rule to the capability name 'net_raw'. Specifies what to do when rules match, in this case, the 'Block' action blocks the matching capability behavior.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns capabilities: matchCapabilities: - capability: net_raw action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/secret.txt'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/bin/cat'. Specifies what to do when rules match, in which case the action 'Allow' allows access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns file: matchPaths: - path: /secret.txt fromSource: - path: /bin/cat action: Allow
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. applies the rule to files with the '/home/user1/secret_data*' pattern, ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns file: matchPatterns: - pattern: /home/user1/secret_data* ownerOnly: true readOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the network-related policies. In this case, rule applies to raw network traffic. Specifies what to do when rules match, which means relevant network activities will be blocked.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns network: matchProtocols: - protocol: raw action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/local/bin/kubectl'. '/usr/bin/kubectl'. '/usr/local/bin/docker'. '/usr/bin/docker'. '/usr/local/bin/crictl'. '/usr/bin/crictl'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns process: matchPaths: - path: /usr/local/bin/kubectl - path: /usr/bin/kubectl - path: /usr/local/bin/docker - path: /usr/bin/docker - path: /usr/local/bin/crictl - path: /usr/bin/crictl action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/sbin/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns process: matchDirectories: - dir: /sbin/ recursive: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/apt'. '/usr/bin/apt-get'. '/bin/apt-get'. '/sbin/apk'. '/bin/apt'. '/usr/bin/dpkg'. '/bin/dpkg'. '/usr/bin/gdebi'. '/bin/gdebi'. '/usr/bin/make'. '/bin/make'. '/usr/bin/yum'. '/bin/yum'. '/usr/bin/rpm'. '/bin/rpm'. '/usr/bin/dnf'. '/bin/dnf'. '/usr/bin/pacman'. '/usr/sbin/pacman'. '/bin/pacman'. '/sbin/pacman'. '/usr/bin/makepkg'. '/usr/sbin/makepkg'. '/bin/makepkg'. '/sbin/makepkg'. '/usr/bin/yaourt'. '/usr/sbin/yaourt'. '/bin/yaourt'. '/sbin/yaourt'. '/usr/bin/zypper'. '/bin/zypper'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns process: matchPaths: - path: /usr/bin/apt - path: /usr/bin/apt-get - path: /bin/apt-get - path: /sbin/apk - path: /bin/apt - path: /usr/bin/dpkg - path: /bin/dpkg - path: /usr/bin/gdebi - path: /bin/gdebi - path: /usr/bin/make - path: /bin/make - path: /usr/bin/yum - path: /bin/yum - path: /usr/bin/rpm - path: /bin/rpm - path: /usr/bin/dnf - path: /bin/dnf - path: /usr/bin/pacman - path: /usr/sbin/pacman - path: /bin/pacman - path: /sbin/pacman - path: /usr/bin/makepkg - path: /usr/sbin/makepkg - path: /bin/makepkg - path: /sbin/makepkg - path: /usr/bin/yaourt - path: /usr/sbin/yaourt - path: /bin/yaourt - path: /sbin/yaourt - path: /usr/bin/zypper - path: /bin/zypper action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/ssl/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/etc/pki/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/usr/local/share/ca-certificates/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns file: matchDirectories: - dir: /etc/ssl/ readOnly: true recursive: true - dir: /etc/pki/ readOnly: true recursive: true - dir: /usr/local/share/ca-certificates/ readOnly: true recursive: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/local/bin/kubectl'. '/usr/bin/kubectl'. '/usr/local/bin/docker'. '/usr/bin/docker'. '/usr/local/bin/crictl'. '/usr/bin/crictl'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns process: matchPaths: - path: /usr/local/bin/kubectl - path: /usr/bin/kubectl - path: /usr/local/bin/docker - path: /usr/bin/docker - path: /usr/local/bin/crictl - path: /usr/bin/crictl action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/dev/shm/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns file: matchDirectories: - dir: /dev/shm/ readOnly: true recursive: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/passwd'. '/etc/shadow'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. applies the rule to processes with the '/proc/**/cmdline' pattern. '/proc/**/sched_debug' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns file: matchPaths: - path: /etc/passwd - path: /etc/shadow process: matchPatterns: - pattern: /proc/**/cmdline - pattern: /proc/**/sched_debug action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/passwd'. '/etc/shadow'. '/etc/group'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/bin/useradd'. '/usr/sbin/useradd'. '/bin/adduser'. '/usr/sbin/adduser'. '/usr/sbin/userdel'. '/bin/userdel'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns file: matchPaths: - path: /etc/passwd - path: /etc/shadow - path: /etc/group process: matchPaths: - path: /bin/useradd - path: /usr/sbin/useradd - path: /bin/adduser - path: /usr/sbin/adduser - path: /usr/sbin/userdel - path: /bin/userdel action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/passwd'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Allow' allows access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns file: matchPaths: - path: /etc/passwd ownerOnly: true action: Allow
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/bin/bash'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies the action to take when rules match, in which case the 'Allow' action allows the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns process: matchPaths: - path: /bin/bash ownerOnly: true action: Allow
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/share/elasticsearch/data/nodes/0/indices/', Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns file: matchDirectories: - dir: /usr/share/elasticsearch/data/nodes/0/indices/ action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/bin/bash'. '/bin/sh'. '/usr/bin/bash'. '/usr/bin/env'. '/usr/bin/shell'. '/bin/ksh'. '/etc/init.d'. '/dev/tty'. '/bin/zsh'. '/bin/tcsh'. '/bin/csh'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/bin/bash'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/bin/bash'. '/bin/sh'. '/usr/bin/bash'. '/usr/bin/env'. '/usr/bin/shell'. '/bin/ksh'. '/etc/init.d'. '/dev/tty'. '/bin/zsh'. '/bin/tcsh'. '/bin/csh'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns process: matchPaths: - path: /bin/bash - path: /bin/sh - path: /usr/bin/bash - path: /usr/bin/env - path: /usr/bin/shell - path: /bin/ksh - path: /etc/init.d - path: /dev/tty - path: /bin/zsh - path: /bin/tcsh - path: /bin/csh ownerOnly: true file: matchPaths: - path: /bin/bash - path: /bin/sh - path: /usr/bin/bash - path: /usr/bin/env - path: /usr/bin/shell - path: /bin/ksh - path: /etc/init.d - path: /dev/tty - path: /bin/zsh - path: /bin/tcsh - path: /bin/csh fromSource: - path: /bin/bash action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/**/fchmodat' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns process: matchPatterns: - pattern: /**/fchmodat action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/mysql/my.cnf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/etc/mysql/mariadb.conf.d'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/etc/mysql/conf.d'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/etc/mysql/debian-start'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/etc/mysql/debian.cnf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/etc/mysql/mariadb.cnf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/mysqld.pid'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/tmp/mysql.sock'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/lib/systemd/system/mysql.service'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/lib/systemd/system/mysqld.service'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns file: matchPaths: - path: /etc/mysql/my.cnf ownerOnly: true - path: /etc/mysql/mariadb.conf.d ownerOnly: true - path: /etc/mysql/conf.d ownerOnly: true - path: /etc/mysql/debian-start ownerOnly: true - path: /etc/mysql/debian.cnf ownerOnly: true - path: /etc/mysql/mariadb.cnf ownerOnly: true - path: /mysqld.pid ownerOnly: true - path: /tmp/mysql.sock ownerOnly: true - path: /usr/lib/systemd/system/mysql.service ownerOnly: true - path: /usr/lib/systemd/system/mysqld.service ownerOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/mongod.conf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns file: matchPaths: - path: /etc/mongod.conf ownerOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. applies the rule to files with the '/**/shosts.equiv' pattern, Specifies a rule that matches a specific file absolute path '/shosts.equiv'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns file: matchPatterns: - pattern: /**/shosts.equiv matchPaths: - path: /shosts.equiv action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/**/chown' pattern. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns process: matchPatterns: - pattern: /**/chown ownerOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. applies the rule to files with the '/**/*.conf' pattern, ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns file: matchPatterns: - pattern: /**/*.conf ownerOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. applies the rule to files with the '/**/*ghostdog.sh' pattern, '/*ghostdog.sh' pattern, Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chmod'. '/bin/sh'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns file: matchPatterns: - pattern: /**/*ghostdog.sh - pattern: /*ghostdog.sh process: matchPaths: - path: /usr/bin/chmod - path: /bin/sh action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/log/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. specifies a rule that matches a specific directory path '/dev/log/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns file: matchDirectories: - dir: /var/log/ recursive: true readOnly: true - dir: /dev/log/ recursive: true readOnly: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/lib/mysql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/var/lib/postgresql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/etc/mysql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/etc/postgres/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/var/log/mysql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/var/log/postgresql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns file: matchDirectories: - dir: /var/lib/mysql/ recursive: true - dir: /var/lib/postgresql/ recursive: true - dir: /etc/mysql/ recursive: true - dir: /etc/postgres/ recursive: true - dir: /var/log/mysql/ recursive: true - dir: /var/log/postgresql/ recursive: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/**/qtp*' pattern. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/bin/'. '/usr/local/bin/'. '/bin/'. When the 'fromSource' field is defined, the action is only applied to source processes in the path '/usr/bin/mvn'.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns process: matchDirectories: - dir: /usr/bin/ - dir: /usr/local/bin/ - dir: /bin/ fromSource: - path: /usr/bin/mvn matchPatterns: - pattern: /**/qtp* action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. applies the rule to files with the '/var/www/html/wp-content/uploads/**/*.php' pattern, '/var/www/html/wp-content/uploads/**/*.sh' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns file: matchPatterns: - pattern: /var/www/html/wp-content/uploads/**/*.php - pattern: /var/www/html/wp-content/uploads/**/*.sh action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/pwnkit/gconv-modules'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/pkexec'. '/pwnkit/pwnkit.c'. '/pwnkit/pwnkit.so'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns process: matchPaths: - path: /usr/bin/pkexec - path: /pwnkit/pwnkit.c - path: /pwnkit/pwnkit.so file: matchPaths: - path: /pwnkit/gconv-modules action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. applies the rule to files with the '/**/databases.yml' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns file: matchPatterns: - pattern: /**/databases.yml action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/*/*/*/django-admin inspectdb*' pattern. '/*/*/django-admin inspectdb*' pattern. '/*/django-admin inspectdb*' pattern. '/django-admin inspectdb*' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns process: matchPatterns: - pattern: /*/*/*/django-admin inspectdb* - pattern: /*/*/django-admin inspectdb* - pattern: /*/django-admin inspectdb* - pattern: /django-admin inspectdb* action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/root/.cache/pip/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns file: matchDirectories: - dir: /root/.cache/pip/ recursive: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/usr/local/lib/python2.7/dist-packages/pwnlib/shellcraft/templates/amd64/linux/syscalls/mprotect.asm'. '/usr/local/go/src/unsafe/unsafe.go'. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/local/lib/python2.7/dist-packages/pwnlib/', specifies a rule that matches a specific directory path '/usr/lib/go-1.10/pkg/', specifies a rule that matches a specific directory path '/usr/lib/python3/dist-packages/', specifies a rule that matches a specific directory path '/usr/local/go/', Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/readlink'. '/usr/local/go/src/unsafe/unsafe.go'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns process: matchPaths: - path: /usr/bin/readlink - path: /usr/local/go/src/unsafe/unsafe.go file: matchPaths: - path: /usr/local/lib/python2.7/dist-packages/pwnlib/shellcraft/templates/amd64/linux/syscalls/mprotect.asm - path: /usr/local/go/src/unsafe/unsafe.go matchDirectories: - dir: /usr/local/lib/python2.7/dist-packages/pwnlib/ - dir: /usr/lib/go-1.10/pkg/ - dir: /usr/lib/python3/dist-packages/ - dir: /usr/local/go/ action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. applies the rule to files with the '/**/httpd.conf' pattern, '/**/apache2.conf' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns file: matchPatterns: - pattern: /**/httpd.conf readOnly: false - pattern: /**/apache2.conf readOnly: false action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. applies the rule to files with the '/**/app.yaml' pattern, '/**/app.yml' pattern, '/**/application.yaml' pattern, '/**/application.yml' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns file: matchPatterns: - pattern: /**/app.yaml - pattern: /**/app.yml - pattern: /**/application.yaml - pattern: /**/application.yml action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/var/spool/cron/atjobs'. '/var/spool/cron/atspool'. '/proc/loadavg'. '/var/run/utmp'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns process: matchPaths: - path: /var/spool/cron/atjobs - path: /var/spool/cron/atspool - path: /proc/loadavg - path: /var/run/utmp action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/*/*/*/*/nginx -s reload*' pattern. '/*/*/*/nginx -s reload*' pattern. '/*/*/nginx -s reload*' pattern. '/*/nginx -s reload*' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns process: matchPatterns: - pattern: /*/*/*/*/nginx -s reload* - pattern: /*/*/*/nginx -s reload* - pattern: /*/*/nginx -s reload* - pattern: /*/nginx -s reload* action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/profile'. applies the rule to files with the '/**/.bash_profile' pattern, '/**/.bash_login' pattern, '/**/.profile' pattern, '/**/.bashrc' pattern, Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns file: matchPaths: - path: /etc/profile matchPatterns: - pattern: /**/.bash_profile - pattern: /**/.bash_login - pattern: /**/.profile - pattern: /**/.bashrc action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/log/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns file: matchDirectories: - dir: /var/log/ recursive: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the network-related policies. In this case, rule applies to UDP network traffic. Specifies what to do when rules match, which means relevant network activities will be logged.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns network: matchProtocols: - protocol: udp action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/apt'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/apt'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/dpkg'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/dpkg'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/gdebi'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/gdebi'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/make'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/make'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/yum'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/yum'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/rpm'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/rpm'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/dnf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/dnf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/pacman'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/sbin/pacman'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/pacman'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/sbin/pacman'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/makepkg'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/sbin/makepkg'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/makepkg'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/sbin/makepkg'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/yaourt'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/sbin/yaourt'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/yaourt'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/sbin/yaourt'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/zypper'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/zypper'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns process: matchPaths: - path: /usr/bin/apt ownerOnly: true - path: /bin/apt ownerOnly: true - path: /usr/bin/dpkg ownerOnly: true - path: /bin/dpkg ownerOnly: true - path: /usr/bin/gdebi ownerOnly: true - path: /bin/gdebi ownerOnly: true - path: /usr/bin/make ownerOnly: true - path: /bin/make ownerOnly: true - path: /usr/bin/yum ownerOnly: true - path: /bin/yum ownerOnly: true - path: /usr/bin/rpm ownerOnly: true - path: /bin/rpm ownerOnly: true - path: /usr/bin/dnf ownerOnly: true - path: /bin/dnf ownerOnly: true - path: /usr/bin/pacman ownerOnly: true - path: /usr/sbin/pacman ownerOnly: true - path: /bin/pacman ownerOnly: true - path: /sbin/pacman ownerOnly: true - path: /usr/bin/makepkg ownerOnly: true - path: /usr/sbin/makepkg ownerOnly: true - path: /bin/makepkg ownerOnly: true - path: /sbin/makepkg ownerOnly: true - path: /usr/bin/yaourt ownerOnly: true - path: /usr/sbin/yaourt ownerOnly: true - path: /bin/yaourt ownerOnly: true - path: /sbin/yaourt ownerOnly: true - path: /usr/bin/zypper ownerOnly: true - path: /bin/zypper ownerOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/pam.conf'. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/pam.d/', recursive is disenabled, so the coverage will not extend. specifies a rule that matches a specific directory path '/var/lib/pam/', recursive is disenabled, so the coverage will not extend. specifies a rule that matches a specific directory path '/usr/lib/pam.d/', recursive is disenabled, so the coverage will not extend. specifies a rule that matches a specific directory path '/usr/lib/x86_64-linux-gnu/security/', recursive is disenabled, so the coverage will not extend. specifies a rule that matches a specific directory path '/usr/share/pam/', recursive is disenabled, so the coverage will not extend. specifies a rule that matches a specific directory path '/usr/share/pam-configs/', recursive is disenabled, so the coverage will not extend. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/pamfile'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns process: matchPaths: - path: /usr/bin/pamfile file: matchPaths: - path: /etc/pam.conf readOnly: false matchDirectories: - dir: /etc/pam.d/ recursive: false readOnly: false - dir: /var/lib/pam/ recursive: false readOnly: false - dir: /usr/lib/pam.d/ recursive: false readOnly: false - dir: /usr/lib/x86_64-linux-gnu/security/ recursive: false readOnly: false - dir: /usr/share/pam/ recursive: false readOnly: false - dir: /usr/share/pam-configs/ recursive: false readOnly: false action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/*/*/tcpdump' pattern. '/*/tcpdump' pattern. '/*/*/nc' pattern. '/*/nc' pattern. '/*/*/ncat' pattern. '/*/ncat' pattern. '/*/*/nmap' pattern. '/*/nmap' pattern. '/*/*/dig' pattern. '/*/dig' pattern. '/*/*/tshark' pattern. '/*/tshark' pattern. '/*/*/ngrep' pattern. '/*/ngrep' pattern. '/*/*/telnet' pattern. '/*/telnet' pattern. '/*/*/mitmproxy' pattern. '/*/mitmproxy' pattern. '/*/*/socat' pattern. '/*/socat' pattern. '/*/*/zmap' pattern. '/*/zmap' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns process: matchPatterns: - pattern: /*/*/tcpdump - pattern: /*/tcpdump - pattern: /*/*/nc - pattern: /*/nc - pattern: /*/*/ncat - pattern: /*/ncat - pattern: /*/*/nmap - pattern: /*/nmap - pattern: /*/*/dig - pattern: /*/dig - pattern: /*/*/tshark - pattern: /*/tshark - pattern: /*/*/ngrep - pattern: /*/ngrep - pattern: /*/*/telnet - pattern: /*/telnet - pattern: /*/*/mitmproxy - pattern: /*/mitmproxy - pattern: /*/*/socat - pattern: /*/socat - pattern: /*/*/zmap - pattern: /*/zmap action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/lib/mysql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns file: matchDirectories: - dir: /var/lib/mysql/ recursive: true readOnly: false action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/usr/bin/pg_dump'. '/usr/bin/pg_upgrade'. '/usr/bin/pg_dumpall'. '/usr/bin/pg_upgradecluster'. '/usr/lib/postgresql/13/bin/pg_dump'. '/usr/lib/postgresql/13/bin/pg_upgrade'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/pg_dump'. '/usr/bin/pg_dumpall'. '/usr/bin/pg_upgradecluster'. '/usr/bin/pg_upgrade'. '/usr/lib/postgresql/13/bin/pg_dump'. '/usr/lib/postgresql/13/bin/pg_upgrade'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns process: matchPaths: - path: /usr/bin/pg_dump - path: /usr/bin/pg_dumpall - path: /usr/bin/pg_upgradecluster - path: /usr/bin/pg_upgrade - path: /usr/lib/postgresql/13/bin/pg_dump - path: /usr/lib/postgresql/13/bin/pg_upgrade file: matchPaths: - path: /usr/bin/pg_dump - path: /usr/bin/pg_upgrade - path: /usr/bin/pg_dumpall - path: /usr/bin/pg_upgradecluster - path: /usr/lib/postgresql/13/bin/pg_dump - path: /usr/lib/postgresql/13/bin/pg_upgrade action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/psql'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/psql'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/share/postgresql-common/pg_wrapper'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns process: matchPaths: - path: /usr/bin/psql ownerOnly: true - path: /bin/psql ownerOnly: true - path: /usr/share/postgresql-common/pg_wrapper ownerOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/credentials/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/readwrite', Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns - WARNING file: matchDirectories: - dir: /credentials/ readOnly: true fromSource: - path: /readwrite action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/proc/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/lib/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/sys/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/pts/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Allow' allows access to the matching file. Specifies a rule that matches a specific file absolute path '/root/.bashrc'. '/root/.bash_history'. '/home/user1/.profile'. '/home/user1/.bashrc'. '/run/utmp'. '/dev/tty'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/home/user1/hello'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/bin/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. '/usr/bin/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Allow' action allows the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns process: matchPaths: - path: /home/user1/hello ownerOnly: true matchDirectories: - dir: /bin/ recursive: true - dir: /usr/bin/ recursive: true file: matchPaths: - path: /root/.bashrc - path: /root/.bash_history - path: /home/user1/.profile - path: /home/user1/.bashrc - path: /run/utmp - path: /dev/tty matchDirectories: - dir: /etc/ recursive: true - dir: /proc/ recursive: true - dir: /lib/ recursive: true - dir: /sys/ recursive: true - dir: /pts/ recursive: true action: Allow
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/credentials/', Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns file: matchDirectories: - dir: /credentials/ action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/credentials/password'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/readwrite'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns file: matchPaths: - path: /credentials/password readOnly: true fromSource: - path: /readwrite action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/root/.bashrc'. '/root/.bash_history'. '/dev/tty'. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/credentials/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. specifies a rule that matches a specific directory path '/etc/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/proc/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Allow' allows access to the matching file. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/bin/'. Specifies the action to take when rules match, in which case the 'Allow' action allows the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns process: matchDirectories: - dir: /bin/ file: matchPaths: - path: /root/.bashrc - path: /root/.bash_history - path: /dev/tty matchDirectories: - dir: /credentials/ recursive: true readOnly: true - dir: /etc/ recursive: true - dir: /proc/ recursive: true action: Allow
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines the policy related to file access. applies the rule to files with the '/**/ZendApp/admin/configs/application.ini' pattern, '/**/ZendApp/module/Application/config/application.ini' pattern, '/**/application.ini' pattern, '/**/aplicacao/application/configs/application.ini' pattern, '/**/cloudexp/application/configs/application.ini' pattern, '/**/cms/application/configs/application.ini' pattern, '/**/moto/application/configs/application.iniZendApp/admin/configs/application.ini' pattern, '/**/moto/application/configs/application.ini' pattern, '/**/Partners/application/configs/application.ini' pattern, '/**/radio/application/configs/application.ini' pattern, '/**/seminovos/application/configs/application.ini' pattern, '/**/shop/application/configs/application.ini' pattern, '/**/site_cg/application/configs/application.iniradio/application/configs/application.ini' pattern, '/**/slr/application/configs/application.ini' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns file: matchPatterns: - pattern: /**/ZendApp/admin/configs/application.ini - pattern: /**/ZendApp/module/Application/config/application.ini - pattern: /**/application.ini - pattern: /**/aplicacao/application/configs/application.ini - pattern: /**/cloudexp/application/configs/application.ini - pattern: /**/cms/application/configs/application.ini - pattern: /**/moto/application/configs/application.iniZendApp/admin/configs/application.ini - pattern: /**/moto/application/configs/application.ini - pattern: /**/Partners/application/configs/application.ini - pattern: /**/radio/application/configs/application.ini - pattern: /**/seminovos/application/configs/application.ini - pattern: /**/shop/application/configs/application.ini - pattern: /**/site_cg/application/configs/application.iniradio/application/configs/application.ini - pattern: /**/slr/application/configs/application.ini action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/sbin/'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns process: matchDirectories: - dir: /sbin/ action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'k8s-app: kube-dns'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chmod'. '/usr/bin/chown'. '/bin/chmod'. '/bin/chown'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: k8s-app: kube-dns process: matchPaths: - path: /usr/bin/chmod - path: /usr/bin/chown - path: /bin/chmod - path: /bin/chown action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: saia'. defines rules related to system calls. specifies a rule for system calls directed to a specific directory path or the absolute executable path The corresponding system call is 'rmdir'. if a path is specified in fromSource, kubearmor will match only syscalls generated by the defined source. That is, only system calls generated by '/home/' exectuable path will be matched. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching system calls.
kind: KubeArmorPolicy spec: selector: matchLabels: app: saia syscalls: matchPaths: - syscall: - rmdir fromSource: - path: /home/ recursive: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: saia'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/usr/local/tomcat/conf/server.xml'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: saia file: matchPaths: - path: /usr/local/tomcat/conf/server.xml ownerOnly: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: saia'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/modprobe.d/udf.conf'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/bin/false'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: saia file: matchPaths: - path: /etc/modprobe.d/udf.conf fromSource: - path: /bin/false readOnly: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: saia'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/data/db/auditLog.json'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/data/db/auditLog.bson'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: saia file: matchPaths: - path: /data/db/auditLog.json ownerOnly: true - path: /data/db/auditLog.bson ownerOnly: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: saia'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/proc/*/environ' pattern. '/*/grep MYSQL_PWD /proc/*/environ' pattern. '/*/*/grep MYSQL_PWD /proc/*/environ' pattern. '/*/*/*/grep MYSQL_PWD /proc/*/environ' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: saia process: matchPatterns: - pattern: /proc/*/environ - pattern: /*/grep MYSQL_PWD /proc/*/environ - pattern: /*/*/grep MYSQL_PWD /proc/*/environ - pattern: /*/*/*/grep MYSQL_PWD /proc/*/environ action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: saia'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/home/user1/secret_data1.txt'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/root/.bashrc'. '/root/.bash_history'. '/home/user1/.profile'. '/home/user1/.bashrc'. '/run/utmp'. '/dev/tty'. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/proc/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Allow' allows access to the matching file. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/bin/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. '/usr/bin/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Allow' action allows the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: saia process: matchDirectories: - dir: /bin/ recursive: true - dir: /usr/bin/ recursive: true file: matchPaths: - path: /home/user1/secret_data1.txt readOnly: true ownerOnly: true - path: /root/.bashrc - path: /root/.bash_history - path: /home/user1/.profile - path: /home/user1/.bashrc - path: /run/utmp - path: /dev/tty matchDirectories: - dir: /etc/ recursive: true - dir: /proc/ recursive: true action: Allow
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: saia'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/bin/ls'. When the 'fromSource' field is defined, the action is only applied to source processes in the path '/bin/dash'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: saia process: matchPaths: - path: /bin/ls fromSource: - path: /bin/dash action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: saia'. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/sbin/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: saia process: matchDirectories: - dir: /sbin/ recursive: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: saia'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/issue'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. '/etc/issue.net'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. '/etc/hosts'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. '/etc/sysconfig/network'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: saia file: matchPaths: - path: /etc/issue readOnly: true - path: /etc/issue.net readOnly: true - path: /etc/hosts readOnly: true - path: /etc/sysconfig/network readOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: saia'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: saia file: matchDirectories: - dir: /etc/ readOnly: true recursive: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: saia'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/nginx/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: saia file: matchDirectories: - dir: /etc/nginx/ recursive: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: saia'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/ssl/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/etc/pki/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/usr/local/share/ca-certificates/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: saia file: matchDirectories: - dir: /etc/ssl/ readOnly: true recursive: true - dir: /etc/pki/ readOnly: true recursive: true - dir: /usr/local/share/ca-certificates/ readOnly: true recursive: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: saia'. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/sbin/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: saia process: matchDirectories: - dir: /sbin/ recursive: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: saia'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/apt'. '/usr/bin/apt-get'. '/bin/apt-get'. '/sbin/apk'. '/bin/apt'. '/usr/bin/dpkg'. '/bin/dpkg'. '/usr/bin/gdebi'. '/bin/gdebi'. '/usr/bin/make'. '/bin/make'. '/usr/bin/yum'. '/bin/yum'. '/usr/bin/rpm'. '/bin/rpm'. '/usr/bin/dnf'. '/bin/dnf'. '/usr/bin/pacman'. '/usr/sbin/pacman'. '/bin/pacman'. '/sbin/pacman'. '/usr/bin/makepkg'. '/usr/sbin/makepkg'. '/bin/makepkg'. '/sbin/makepkg'. '/usr/bin/yaourt'. '/usr/sbin/yaourt'. '/bin/yaourt'. '/sbin/yaourt'. '/usr/bin/zypper'. '/bin/zypper'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: saia process: matchPaths: - path: /usr/bin/apt - path: /usr/bin/apt-get - path: /bin/apt-get - path: /sbin/apk - path: /bin/apt - path: /usr/bin/dpkg - path: /bin/dpkg - path: /usr/bin/gdebi - path: /bin/gdebi - path: /usr/bin/make - path: /bin/make - path: /usr/bin/yum - path: /bin/yum - path: /usr/bin/rpm - path: /bin/rpm - path: /usr/bin/dnf - path: /bin/dnf - path: /usr/bin/pacman - path: /usr/sbin/pacman - path: /bin/pacman - path: /sbin/pacman - path: /usr/bin/makepkg - path: /usr/sbin/makepkg - path: /bin/makepkg - path: /sbin/makepkg - path: /usr/bin/yaourt - path: /usr/sbin/yaourt - path: /bin/yaourt - path: /sbin/yaourt - path: /usr/bin/zypper - path: /bin/zypper action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: saia'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/bin/', When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/bin/rm', specifies a rule that matches a specific directory path '/root/', When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/bin/rm', specifies a rule that matches a specific directory path '/home/', When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/bin/rm', specifies a rule that matches a specific directory path '/etc/', When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/bin/rm', Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chsh'. '/bin/chmod'. '/bin/chown'. '/bin/chgrp'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: saia process: matchPaths: - path: /usr/bin/chsh - path: /bin/chmod - path: /bin/chown - path: /bin/chgrp file: matchDirectories: - dir: /bin/ fromSource: - path: /bin/rm - dir: /root/ fromSource: - path: /bin/rm - dir: /home/ fromSource: - path: /bin/rm - dir: /etc/ fromSource: - path: /bin/rm action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: saia'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/log/elasticsearch/',
kind: KubeArmorPolicy spec: selector: matchLabels: app: saia file: matchDirectories: - dir: /var/log/elasticsearch/ action: audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: saia'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/local/go/src/regexp/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: saia file: matchDirectories: - dir: /usr/local/go/src/regexp/ recursive: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: saia'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/**/mysql*' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: saia process: matchPatterns: - pattern: /**/mysql* action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: saia'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/cups/', specifies a rule that matches a specific directory path '/etc/xdg/', specifies a rule that matches a specific directory path '/etc/ssh/', specifies a rule that matches a specific directory path '/etc/apparmor.d/', specifies a rule that matches a specific directory path '/etc/udev/', specifies a rule that matches a specific directory path '/etc/x11/', specifies a rule that matches a specific directory path '/etc/opt/', Specifies a rule that matches a specific file absolute path '/etc/resolv.conf'. '/etc/bash.bashrc'. '/etc/profile'. '/etc/dhcp/dhclient.conf'. '/etc/fstab'. '/etc/hostname'. '/etc/hosts'. '/etc/hosts.deny'. '/etc/mime.type'. '/etc/motd'. '/etc/timezone'. '/etc/sudoers'. '/etc/httpd/conf'. '/etc/httpd.conf.d'. '/etc/default/grub'. '/boot/grub/grub.cfg'. '/boot/grub/grub.cfg'. '/etc/default/grub'. applies the rule to files with the '/home/**/.config' pattern, '/home/**/.xinitrc' pattern, '/home/**/.vimrc' pattern, '/home/**/.bashrc' pattern, '/home/**/.editor' pattern, '/home/**/.gitconfig' pattern, '/home/**/.profile' pattern, '/home/**/.ssh/config' pattern, Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: saia file: matchDirectories: - dir: /etc/cups/ - dir: /etc/xdg/ - dir: /etc/ssh/ - dir: /etc/apparmor.d/ - dir: /etc/udev/ - dir: /etc/x11/ - dir: /etc/opt/ matchPaths: - path: /etc/resolv.conf - path: /etc/bash.bashrc - path: /etc/profile - path: /etc/dhcp/dhclient.conf - path: /etc/fstab - path: /etc/hostname - path: /etc/hosts - path: /etc/hosts.deny - path: /etc/mime.type - path: /etc/motd - path: /etc/timezone - path: /etc/sudoers - path: /etc/httpd/conf - path: /etc/httpd.conf.d - path: /etc/default/grub - path: /boot/grub/grub.cfg - path: /boot/grub/grub.cfg - path: /etc/default/grub matchPatterns: - pattern: /home/**/.config - pattern: /home/**/.xinitrc - pattern: /home/**/.vimrc - pattern: /home/**/.bashrc - pattern: /home/**/.editor - pattern: /home/**/.gitconfig - pattern: /home/**/.profile - pattern: /home/**/.ssh/config action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: saia'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/dconf/db/local.d/00-disable-CAD'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: saia file: matchPaths: - path: /etc/dconf/db/local.d/00-disable-CAD action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: saia'. defines the policy related to file access. applies the rule to files with the '/**/confluence/WEB-INF/lib/xwork-1.0.3-atlassian-8.jar' pattern, '/**/confluence/WEB-INF/lib/xwork-1.0.3.6.jar' pattern, '/**/confluence/WEB-INF/lib/webwork-2.1.5-atlassian-3.jar' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. applies the rule to processes with the '/**/confluence/WEB-INF/lib/xwork-1.0.3-atlassian-8.jar' pattern. '/**/confluence/WEB-INF/lib/xwork-1.0.3.6.jar' pattern. '/**/confluence/WEB-INF/lib/webwork-2.1.5-atlassian-3.jar' pattern. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: saia file: matchPatterns: - pattern: /**/confluence/WEB-INF/lib/xwork-1.0.3-atlassian-8.jar - pattern: /**/confluence/WEB-INF/lib/xwork-1.0.3.6.jar - pattern: /**/confluence/WEB-INF/lib/webwork-2.1.5-atlassian-3.jar process: matchPatterns: - pattern: /**/confluence/WEB-INF/lib/xwork-1.0.3-atlassian-8.jar - pattern: /**/confluence/WEB-INF/lib/xwork-1.0.3.6.jar - pattern: /**/confluence/WEB-INF/lib/webwork-2.1.5-atlassian-3.jar action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: saia'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/storage/vcops/user/conf/ssl/tcserver.truststore'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: saia file: matchPaths: - path: /storage/vcops/user/conf/ssl/tcserver.truststore readOnly: true ownerOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: saia'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/sql/sql_type.cc'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: saia file: matchPaths: - path: /sql/sql_type.cc action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: saia'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/init/control-alt-delete.conf'. '/etc/init/control-alt-delete.override'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: saia file: matchPaths: - path: /etc/init/control-alt-delete.conf - path: /etc/init/control-alt-delete.override action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: saia'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/mysql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: saia file: matchDirectories: - dir: /etc/mysql/ recursive: true ownerOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: saia'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/gdm/custom.conf'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: saia file: matchPaths: - path: /etc/gdm/custom.conf action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: saia'. defines the policy related to file access. applies the rule to files with the '/**/*.conf' pattern, ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: saia file: matchPatterns: - pattern: /**/*.conf ownerOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: saia'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/bin/cd'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: saia process: matchPaths: - path: /bin/cd action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: saia'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/**'. When the 'fromSource' field is defined, the action is only applied to source processes in the path '/usr/bin/netcat'. apply rules to the executable processes at paths '/usr/bin/**'. When the 'fromSource' field is defined, the action is only applied to source processes in the path '/usr/bin/nc'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: saia process: matchPaths: - path: /usr/bin/** fromSource: - path: /usr/bin/netcat - path: /usr/bin/** fromSource: - path: /usr/bin/nc action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: saia'. defines the policy related to file access. applies the rule to files with the '/**/ua-parser.js' pattern, ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: saia file: matchPatterns: - pattern: /**/ua-parser.js ownerOnly: true action: Block