instruction
stringlengths 358
2.34k
| output
stringlengths 139
2.49k
|
---|---|
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/etc/crontab'. '/etc/anacrontab'. '/etc/fcrontab'. '/etc/hcron'. '/etc/jobber'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache-tomcat
process:
matchPaths:
- path: /etc/crontab
- path: /etc/anacrontab
- path: /etc/fcrontab
- path: /etc/hcron
- path: /etc/jobber
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo-db'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/home/user1/secret_data1.txt'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/readwrite'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo-db
file:
matchPaths:
- path: /home/user1/secret_data1.txt
readOnly: true
ownerOnly: true
fromSource:
- path: /readwrite
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/sbin/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/usr/bin/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/usr/lib/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/usr/sbin/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/bin/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/boot/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
file:
matchDirectories:
- dir: /sbin/
readOnly: true
recursive: true
- dir: /usr/bin/
readOnly: true
recursive: true
- dir: /usr/lib/
readOnly: true
recursive: true
- dir: /usr/sbin/
readOnly: true
recursive: true
- dir: /bin/
readOnly: true
recursive: true
- dir: /boot/
readOnly: true
recursive: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/base32'. '/usr/bin/base16'. '/usr/bin/base32plain'. '/usr/bin/base32hex'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchPaths:
- path: /usr/bin/base32
- path: /usr/bin/base16
- path: /usr/bin/base32plain
- path: /usr/bin/base32hex
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: nginx'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/data/db/auditLog.json'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/data/db/auditLog.bson'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: nginx
file:
matchPaths:
- path: /data/db/auditLog.json
ownerOnly: true
- path: /data/db/auditLog.bson
ownerOnly: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: nginx'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/strings/ctype-latin1.c'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: nginx
file:
matchPaths:
- path: /strings/ctype-latin1.c
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
file:
matchDirectories:
- dir: /etc/
recursive: true
ownerOnly: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: nginx'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/postgresql/13/main/postgresql.conf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/var/lib/pgsql/data/postgresql.conf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. applies the rule to files with the '/**/pg_log/postgresql-Thu.log' pattern, ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: nginx
file:
matchPaths:
- path: /etc/postgresql/13/main/postgresql.conf
ownerOnly: true
- path: /var/lib/pgsql/data/postgresql.conf
ownerOnly: true
matchPatterns:
- pattern: /**/pg_log/postgresql-Thu.log
ownerOnly: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: discovery-engine'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/var/log/mongodb/mongod.log'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: discovery-engine
file:
matchPaths:
- path: /var/log/mongodb/mongod.log
readOnly: false
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: discovery-engine'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/credentials/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: discovery-engine
file:
matchDirectories:
- dir: /credentials/
recursive: true
readOnly: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: discovery-engine'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/ls'. '/usr/bin/sleep'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: discovery-engine
- WARNING
process:
matchPaths:
- path: /usr/bin/ls
- path: /usr/bin/sleep
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'kubearmor-app: kubearmor-policy-manager'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/credentials/', Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
kubearmor-app: kubearmor-policy-manager
file:
matchDirectories:
- dir: /credentials/
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: test'. defines the policy related to file access. applies the rule to files with the '/var/lib/pgsql/**/data/postgresql.conf' pattern, '/var/lib/pgsql/**/data/pg_hba.conf' pattern, '/var/lib/pgsql/**/data/pg_ident.conf' pattern, Specifies a rule that matches a specific file absolute path '/var/lib/postgresql/data/pgdata/postgresql.conf'. '/var/lib/postgresql/data/pgdata/pg_hba.conf'. '/var/lib/postgresql/data/pgdata/pg_ident.conf'. '/var/lib/postgresql/data/pgdata/postgresql.auto.conf'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: test
file:
matchPatterns:
- pattern: /var/lib/pgsql/**/data/postgresql.conf
- pattern: /var/lib/pgsql/**/data/pg_hba.conf
- pattern: /var/lib/pgsql/**/data/pg_ident.conf
matchPaths:
- path: /var/lib/postgresql/data/pgdata/postgresql.conf
- path: /var/lib/postgresql/data/pgdata/pg_hba.conf
- path: /var/lib/postgresql/data/pgdata/pg_ident.conf
- path: /var/lib/postgresql/data/pgdata/postgresql.auto.conf
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apc'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/scp'. '/bin/scp'. '/usr/bin/scp'. '/bin/scp'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apc
action: Block
process:
matchPaths:
- path: /usr/bin/scp
- path: /bin/scp
- path: /usr/bin/scp
- path: /bin/scp |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: cass-server'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/log/postgresql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/usr/bin/touch', specifies a rule that matches a specific directory path '/usr/bin/chmod', specifies a rule that matches a specific directory path '/usr/bin/nano', specifies a rule that matches a specific directory path '/usr/bin/cat', specifies a rule that matches a specific directory path '/usr/bin/vi', Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: cass-server
file:
matchDirectories:
- dir: /var/log/postgresql/
recursive: true
readOnly: false
fromSource:
- path: /usr/bin/touch
- path: /usr/bin/chmod
- path: /usr/bin/nano
- path: /usr/bin/cat
- path: /usr/bin/vi
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: cass-server'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/dev/', specifies a rule that matches a specific directory path '/root/', Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chmod'. '/usr/bin/nc'. '/usr/bin/dig'. '/usr/bin/ncat'. '/usr/bin/nmap'. '/usr/sbin/tcpdump'. '/usr/bin/tcpdump'. '/usr/bin/tshark'. '/usr/bin/ngrep'. '/usr/bin/telnet'. '/usr/bin/mitmproxy'. '/usr/bin/socat'. '/usr/sbin/zmap'. '/usr/bin/login'. '/usr/bin/su'. '/usr/sbin/nologin'. '/usr/bin/faillog'. '/usr/bin/lastlog'. '/usr/bin/newgrp'. '/usr/bin/sg'. '/usr/sbin/shadowconfig'. '/usr/sbin/grpck'. '/usr/sbin/pwunconv'. '/usr/sbin/grpconv'. '/usr/sbin/pwck'. '/usr/sbin/groupmod'. '/usr/sbin/vipw'. '/usr/sbin/pwconv'. '/usr/sbin/useradd'. '/usr/sbin/newusers'. '/usr/sbin/cppw'. '/usr/sbin/chpasswd'. '/usr/sbin/usermod'. '/usr/sbin/groupadd'. '/usr/sbin/groupdel'. '/usr/sbin/grpunconv'. '/usr/sbin/chgpasswd'. '/usr/sbin/userdel'. '/usr/bin/chage'. '/usr/bin/chsh'. '/usr/bin/gpasswd'. '/usr/bin/chfn'. '/usr/bin/expiry'. '/usr/bin/passwd'. '/usr/sbin/vigr'. '/usr/sbin/cpgr'. '/usr/sbin/adduser'. '/usr/sbin/addgroup'. '/usr/sbin/deluser'. '/usr/sbin/delgroup'. '/usr/bin/chage'. '/usr/bin/gpasswd'. '/usr/bin/lastlog'. '/usr/bin/newgrp'. '/usr/bin/sg'. '/usr/sbin/adduser'. '/usr/sbin/deluser'. '/usr/sbin/chpasswd'. '/usr/sbin/groupadd'. '/usr/sbin/groupdel'. '/usr/sbin/addgroup'. '/usr/sbin/delgroup'. '/usr/sbin/groupmems'. '/usr/sbin/groupmod'. '/usr/sbin/grpck'. '/usr/sbin/grpconv'. '/usr/sbin/grpunconv'. '/usr/sbin/newusers'. '/usr/sbin/pwck'. '/usr/sbin/pwconv'. '/usr/sbin/pwunconv'. '/usr/sbin/useradd'. '/usr/sbin/userdel'. '/usr/sbin/usermod'. '/usr/sbin/vigr'. '/usr/sbin/vipw'. '/usr/sbin/unix_chkpwd'. '/usr/bin/openssl'. '/usr/sbin/update-ca-certificates'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: cass-server
process:
matchPaths:
- path: /usr/bin/chmod
- path: /usr/bin/nc
- path: /usr/bin/dig
- path: /usr/bin/ncat
- path: /usr/bin/nmap
- path: /usr/sbin/tcpdump
- path: /usr/bin/tcpdump
- path: /usr/bin/tshark
- path: /usr/bin/ngrep
- path: /usr/bin/telnet
- path: /usr/bin/mitmproxy
- path: /usr/bin/socat
- path: /usr/sbin/zmap
- path: /usr/bin/login
- path: /usr/bin/su
- path: /usr/sbin/nologin
- path: /usr/bin/faillog
- path: /usr/bin/lastlog
- path: /usr/bin/newgrp
- path: /usr/bin/sg
- path: /usr/sbin/shadowconfig
- path: /usr/sbin/grpck
- path: /usr/sbin/pwunconv
- path: /usr/sbin/grpconv
- path: /usr/sbin/pwck
- path: /usr/sbin/groupmod
- path: /usr/sbin/vipw
- path: /usr/sbin/pwconv
- path: /usr/sbin/useradd
- path: /usr/sbin/newusers
- path: /usr/sbin/cppw
- path: /usr/sbin/chpasswd
- path: /usr/sbin/usermod
- path: /usr/sbin/groupadd
- path: /usr/sbin/groupdel
- path: /usr/sbin/grpunconv
- path: /usr/sbin/chgpasswd
- path: /usr/sbin/userdel
- path: /usr/bin/chage
- path: /usr/bin/chsh
- path: /usr/bin/gpasswd
- path: /usr/bin/chfn
- path: /usr/bin/expiry
- path: /usr/bin/passwd
- path: /usr/sbin/vigr
- path: /usr/sbin/cpgr
- path: /usr/sbin/adduser
- path: /usr/sbin/addgroup
- path: /usr/sbin/deluser
- path: /usr/sbin/delgroup
- path: /usr/bin/chage
- path: /usr/bin/gpasswd
- path: /usr/bin/lastlog
- path: /usr/bin/newgrp
- path: /usr/bin/sg
- path: /usr/sbin/adduser
- path: /usr/sbin/deluser
- path: /usr/sbin/chpasswd
- path: /usr/sbin/groupadd
- path: /usr/sbin/groupdel
- path: /usr/sbin/addgroup
- path: /usr/sbin/delgroup
- path: /usr/sbin/groupmems
- path: /usr/sbin/groupmod
- path: /usr/sbin/grpck
- path: /usr/sbin/grpconv
- path: /usr/sbin/grpunconv
- path: /usr/sbin/newusers
- path: /usr/sbin/pwck
- path: /usr/sbin/pwconv
- path: /usr/sbin/pwunconv
- path: /usr/sbin/useradd
- path: /usr/sbin/userdel
- path: /usr/sbin/usermod
- path: /usr/sbin/vigr
- path: /usr/sbin/vipw
- path: /usr/sbin/unix_chkpwd
- path: /usr/bin/openssl
- path: /usr/sbin/update-ca-certificates
file:
matchDirectories:
- dir: /dev/
- dir: /root/
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: cass-server'. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/sbin/'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: cass-server
process:
matchDirectories:
- dir: /sbin/
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: laravel-pod'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/*/apt-get install *' pattern. '/*/*/apt-get install *' pattern. '/*/apt install *' pattern. '/*/*/apt install *' pattern. '/*/apt install fwupd #new firmware installation' pattern. '/*/*/apt install fwupd' pattern. '/*/apt-get install fwupd' pattern. '/*/*/apt-get install fwupd' pattern. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/dev/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: laravel-pod
process:
matchPatterns:
- pattern: /*/apt-get install *
- pattern: /*/*/apt-get install *
- pattern: /*/apt install *
- pattern: /*/*/apt install *
- pattern: /*/apt install fwupd #new firmware installation
- pattern: /*/*/apt install fwupd
- pattern: /*/apt-get install fwupd
- pattern: /*/*/apt-get install fwupd
matchDirectories:
- dir: /dev/
recursive: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: xorddos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/shadow'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: xorddos
file:
matchPaths:
- path: /etc/shadow
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: mysql-1'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/group'. '/etc/group-'. '/etc/passwd'. '/etc/gshadow'. '/etc/gshadow-'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/sbin/pwconv'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: mysql-1
process:
matchPaths:
- path: /usr/sbin/pwconv
file:
matchPaths:
- path: /etc/group
- path: /etc/group-
- path: /etc/passwd
- path: /etc/gshadow
- path: /etc/gshadow-
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/credentials/', Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
file:
matchDirectories:
- dir: /credentials/
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo-db'. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/bin/'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. '/sbin/'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. '/usr/bin/'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. '/usr/sbin/'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo-db
process:
matchDirectories:
- dir: /bin/
ownerOnly: true
recursive: true
- dir: /sbin/
ownerOnly: true
recursive: true
- dir: /usr/bin/
ownerOnly: true
recursive: true
- dir: /usr/sbin/
ownerOnly: true
recursive: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql8'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/dev/shm/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql8
file:
matchDirectories:
- dir: /dev/shm/
readOnly: true
recursive: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: testpod'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/root/.Blackhawk.sh'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. applies the rule to files with the '/**/.Blackhawk.sh' pattern, '/.Blackhawk.sh' pattern, defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chmod'. When the 'fromSource' field is defined, the action is only applied to source processes in the path '/usr/lib/jvm/java-9-openjdk-amd64/bin/java'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: testpod
file:
matchPatterns:
- pattern: /**/.Blackhawk.sh
- pattern: /.Blackhawk.sh
matchPaths:
- path: /root/.Blackhawk.sh
process:
matchPaths:
- path: /usr/bin/chmod
fromSource:
- path: /usr/lib/jvm/java-9-openjdk-amd64/bin/java
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: java'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/bin/bash'. '/bin/sh'. '/usr/bin/bash'. '/usr/bin/env'. '/usr/bin/shell'. '/bin/ksh'. '/etc/init.d'. '/dev/tty'. '/bin/zsh'. '/bin/tcsh'. '/bin/csh'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/bin/bash'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/rm'. '/usr/bin/unlink'. '/usr/bin/rmdir'. '/bin/bash'. '/bin/sh'. '/usr/bin/bash'. '/usr/bin/env'. '/usr/bin/shell'. '/bin/ksh'. '/etc/init.d'. '/dev/tty'. '/bin/zsh'. '/bin/tcsh'. '/bin/csh'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: java
process:
matchPaths:
- path: /usr/bin/rm
- path: /usr/bin/unlink
- path: /usr/bin/rmdir
process:
matchPaths:
- path: /bin/bash
- path: /bin/sh
- path: /usr/bin/bash
- path: /usr/bin/env
- path: /usr/bin/shell
- path: /bin/ksh
- path: /etc/init.d
- path: /dev/tty
- path: /bin/zsh
- path: /bin/tcsh
- path: /bin/csh
file:
matchPaths:
- path: /bin/bash
- path: /bin/sh
- path: /usr/bin/bash
- path: /usr/bin/env
- path: /usr/bin/shell
- path: /bin/ksh
- path: /etc/init.d
- path: /dev/tty
- path: /bin/zsh
- path: /bin/tcsh
- path: /bin/csh
fromSource:
- path: /bin/bash
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql-pod'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/local/tomcat/logs/', ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/var/log/tomcat/', ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql-pod
file:
matchDirectories:
- dir: /usr/local/tomcat/logs/
ownerOnly: true
recursive: true
- dir: /var/log/tomcat/
ownerOnly: true
recursive: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'pod: testpod'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/*.mysql history' pattern. '/*.mysql_history' pattern. '/*.mysqlsh/history' pattern. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
pod: testpod
process:
matchPatterns:
- pattern: /*.mysql history
- pattern: /*.mysql_history
- pattern: /*.mysqlsh/history
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: tomcat-app'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/local/tomcat/webapps/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: tomcat-app
file:
matchDirectories:
- dir: /usr/local/tomcat/webapps/
recursive: true
ownerOnly: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: tomcat-app'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/*/*/*/django-admin dbshell*' pattern. '/*/*/django-admin dbshell*' pattern. '/*/django-admin dbshell*' pattern. '/django-admin dbshell*' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: tomcat-app
process:
matchPatterns:
- pattern: /*/*/*/django-admin dbshell*
- pattern: /*/*/django-admin dbshell*
- pattern: /*/django-admin dbshell*
- pattern: /django-admin dbshell*
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: tomcat-app'. defines the policy related to file access. applies the rule to files with the '/**/.htpasswd' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. applies the rule to processes with the '/**/htpasswd' pattern. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: tomcat-app
file:
matchPatterns:
- pattern: /**/.htpasswd
process:
matchPatterns:
- pattern: /**/htpasswd
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'group: group-1'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/usr/local/tomcat/conf/server.xml'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
group: group-1
file:
matchPaths:
- path: /usr/local/tomcat/conf/server.xml
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/ssl/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/etc/pki/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/usr/local/share/ca-certificates/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: apache
file:
matchDirectories:
- dir: /etc/ssl/
readOnly: true
recursive: true
- dir: /etc/pki/
readOnly: true
recursive: true
- dir: /usr/local/share/ca-certificates/
readOnly: true
recursive: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: flask-app'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/base32'. '/usr/bin/base16'. '/usr/bin/base32plain'. '/usr/bin/base32hex'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: flask-app
process:
matchPaths:
- path: /usr/bin/base32
- path: /usr/bin/base16
- path: /usr/bin/base32plain
- path: /usr/bin/base32hex
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: frontend'. defines the network-related policies. In this case, rule applies to raw network traffic. Specifies what to do when rules match, which means relevant network activities will be logged. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: frontend
network:
matchProtocols:
- protocol: raw
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'pod: testpod'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/apt'. '/usr/bin/apt-get'. '/bin/apt-get'. '/sbin/apk'. '/bin/apt'. '/usr/bin/dpkg'. '/bin/dpkg'. '/usr/bin/gdebi'. '/bin/gdebi'. '/usr/bin/make'. '/bin/make'. '/usr/bin/yum'. '/bin/yum'. '/usr/bin/rpm'. '/bin/rpm'. '/usr/bin/dnf'. '/bin/dnf'. '/usr/bin/pacman'. '/usr/sbin/pacman'. '/bin/pacman'. '/sbin/pacman'. '/usr/bin/makepkg'. '/usr/sbin/makepkg'. '/bin/makepkg'. '/sbin/makepkg'. '/usr/bin/yaourt'. '/usr/sbin/yaourt'. '/bin/yaourt'. '/sbin/yaourt'. '/usr/bin/zypper'. '/bin/zypper'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
pod: testpod
process:
matchPaths:
- path: /usr/bin/apt
- path: /usr/bin/apt-get
- path: /bin/apt-get
- path: /sbin/apk
- path: /bin/apt
- path: /usr/bin/dpkg
- path: /bin/dpkg
- path: /usr/bin/gdebi
- path: /bin/gdebi
- path: /usr/bin/make
- path: /bin/make
- path: /usr/bin/yum
- path: /bin/yum
- path: /usr/bin/rpm
- path: /bin/rpm
- path: /usr/bin/dnf
- path: /bin/dnf
- path: /usr/bin/pacman
- path: /usr/sbin/pacman
- path: /bin/pacman
- path: /sbin/pacman
- path: /usr/bin/makepkg
- path: /usr/sbin/makepkg
- path: /bin/makepkg
- path: /sbin/makepkg
- path: /usr/bin/yaourt
- path: /usr/sbin/yaourt
- path: /bin/yaourt
- path: /sbin/yaourt
- path: /usr/bin/zypper
- path: /bin/zypper
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. applies the rule to files with the '/**/npm-debug.log' pattern, similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/local/tomcat/bin/', ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
file:
matchPatterns:
- pattern: /**/npm-debug.log
file:
matchDirectories:
- dir: /usr/local/tomcat/bin/
recurive: true
ownerOnly: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: lfipod'. defines the policy related to file access. applies the rule to files with the '/etc/*hado?' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: lfipod
file:
matchPatterns:
- pattern: /etc/*hado?
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: testpod'. defines the network-related policies. In this case, rule applies to ICMP network traffic. Specifies what to do when rules match, which means relevant network activities will be logged. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: testpod
network:
matchProtocols:
- protocol: icmp
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: testpod'. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/lib/postgresql/data/'. When the 'fromSource' field is defined, the action is only applied to source processes in the path '/usr/lib/postgresql/14/bin/postgres'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: testpod
process:
matchDirectories:
- dir: /var/lib/postgresql/data/
fromSource:
- path: /usr/lib/postgresql/14/bin/postgres
recursive: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/bin/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. '/bin/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. '/usr/local/bin/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mysql
process:
matchDirectories:
- dir: /usr/bin/
recursive: true
- dir: /bin/
recursive: true
- dir: /usr/local/bin/
recursive: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: test-app'. defines the policy related to file access. applies the rule to files with the '/**/kataras/iris/**/' pattern, Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: test-app
file:
matchPatterns:
- pattern: /**/kataras/iris/**/
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'pad: testpad'. defines the policy related to file access. applies the rule to files with the '/**/app.yaml' pattern, '/**/app.yml' pattern, '/**/application.yaml' pattern, '/**/application.yml' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
pad: testpad
file:
matchPatterns:
- pattern: /**/app.yaml
- pattern: /**/app.yml
- pattern: /**/application.yaml
- pattern: /**/application.yml
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: node-app'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/var/lib/postgresql/data/pgdata/postgresql.conf'. '/var/lib/postgresql/data/pgdata/pg_hba.conf'. '/var/lib/postgresql/data/pgdata/pg_ident.conf'. '/var/lib/postgresql/data/pgdata/postgresql.auto.conf'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. applies the rule to files with the '/var/lib/pgsql/**/data/postgresql.conf' pattern, '/var/lib/pgsql/**/data/pg_hba.conf' pattern, '/var/lib/pgsql/**/data/pg_ident.conf' pattern, | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: node-app
file:
matchPatterns:
- pattern: /var/lib/pgsql/**/data/postgresql.conf
- pattern: /var/lib/pgsql/**/data/pg_hba.conf
- pattern: /var/lib/pgsql/**/data/pg_ident.conf
matchPaths:
- path: /var/lib/postgresql/data/pgdata/postgresql.conf
- path: /var/lib/postgresql/data/pgdata/pg_hba.conf
- path: /var/lib/postgresql/data/pgdata/pg_ident.conf
- path: /var/lib/postgresql/data/pgdata/postgresql.auto.conf
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: node-app'. defines the policy related to file access. applies the rule to files with the '/**/my.cnf' pattern, ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: node-app
file:
matchPatterns:
- pattern: /**/my.cnf
ownerOnly: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: owncloud'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/mongod.conf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: owncloud
file:
matchPaths:
- path: /etc/mongod.conf
ownerOnly: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: testpod'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/passwd'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: testpod
file:
matchPaths:
- path: /etc/passwd
ownerOnly: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: samba'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/rsync'. '/bin/rsync'. '/usr/bin/scp'. '/bin/scp'. '/usr/bin/scp'. '/bin/scp'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: samba
process:
matchPaths:
- path: /usr/bin/rsync
- path: /bin/rsync
- path: /usr/bin/scp
- path: /bin/scp
- path: /usr/bin/scp
- path: /bin/scp
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/hostapd/hostapd.conf'. '/etc/network/interfaces'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-1
file:
matchPaths:
- path: /etc/hostapd/hostapd.conf
- path: /etc/network/interfaces
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-2'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/dev/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-2
file:
matchDirectories:
- dir: /dev/
readOnly: true
recursive: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'kubearmor.io/container.name: wordpress-mysql'. defines the policy related to file access. applies the rule to files with the '/**/storage/logs/laravel.log' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
kubearmor.io/container.name: wordpress-mysql
file:
matchPatterns:
- pattern: /**/storage/logs/laravel.log
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: zend'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/**/*tftp-server*' pattern. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: zend
process:
matchPatterns:
- pattern: /**/*tftp-server*
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'kubearmor-app: kubearmor-host-policy-manager'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/proc/meminfo'. '/proc/mounts'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. applies the rule to processes with the '^/proc/\*/maps$' pattern. '^/proc/\*/mem$' pattern. '/*/mv * /dev/null' pattern. '/*/*/mv * /dev/null' pattern. '/*/mkfs.ext4 /dev/*' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
kubearmor-app: kubearmor-host-policy-manager
process:
matchPatterns:
- pattern: ^/proc/\*/maps$
- pattern: ^/proc/\*/mem$
- pattern: /*/mv * /dev/null
- pattern: /*/*/mv * /dev/null
- pattern: /*/mkfs.ext4 /dev/*
file:
matchPaths:
- path: /proc/meminfo
- path: /proc/mounts
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: java-ms'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/local/go/src/crypto/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. applies the rule to files with the '/**/crypto/**/' pattern, Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: java-ms
file:
matchDirectories:
- dir: /usr/local/go/src/crypto/
recursive: true
matchPatterns:
- pattern: /**/crypto/**/
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: nginx-2'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/credentials/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Allow' allows access to the matching file. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/bin/'. Specifies the action to take when rules match, in which case the 'Allow' action allows the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: nginx-2
process:
matchDirectories:
- dir: /bin/
file:
matchDirectories:
- dir: /credentials/
recursive: true
action: Allow |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: test'. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/sbin/'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: test
process:
matchDirectories:
- dir: /sbin/
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: rhel8'. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/sbin/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: rhel8
process:
matchDirectories:
- dir: /sbin/
recursive: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'pod: test'. defines the network-related policies. In this case, rule applies to raw network traffic. Specifies what to do when rules match, which means relevant network activities will be blocked. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
pod: test
network:
matchProtocols:
- protocol: raw
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: pickle-app'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/**/bulk' pattern. '/**/*bulk' pattern. '/**/**/bulk' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: pickle-app
process:
matchPatterns:
- pattern: /**/bulk
- pattern: /**/*bulk
- pattern: /**/**/bulk
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: frontend'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/log/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/usr/bin/rm', specifies a rule that matches a specific directory path '/bin/rm', specifies a rule that matches a specific directory path '/usr/bin/rmdir', specifies a rule that matches a specific directory path '/bin/rmdir', specifies a rule that matches a specific directory path '/usr/bin/unlink', specifies a rule that matches a specific directory path '/bin/unlink', Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: frontend
file:
matchDirectories:
- dir: /var/log/
recursive: true
fromSource:
- path: /usr/bin/rm
- path: /bin/rm
- path: /usr/bin/rmdir
- path: /bin/rmdir
- path: /usr/bin/unlink
- path: /bin/unlink
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-5'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/local/tomcat/webapps/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
container: ubuntu-5
file:
matchDirectories:
- dir: /usr/local/tomcat/webapps/
recursive: true
ownerOnly: true
action: Audit |
No dataset card yet
New: Create and edit this dataset card directly on the website!
Contribute a Dataset Card- Downloads last month
- 6