instruction
stringlengths
358
2.34k
output
stringlengths
139
2.49k
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/etc/crontab'. '/etc/anacrontab'. '/etc/fcrontab'. '/etc/hcron'. '/etc/jobber'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat process: matchPaths: - path: /etc/crontab - path: /etc/anacrontab - path: /etc/fcrontab - path: /etc/hcron - path: /etc/jobber action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo-db'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/home/user1/secret_data1.txt'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/readwrite'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo-db file: matchPaths: - path: /home/user1/secret_data1.txt readOnly: true ownerOnly: true fromSource: - path: /readwrite action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/sbin/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/usr/bin/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/usr/lib/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/usr/sbin/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/bin/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/boot/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mysql file: matchDirectories: - dir: /sbin/ readOnly: true recursive: true - dir: /usr/bin/ readOnly: true recursive: true - dir: /usr/lib/ readOnly: true recursive: true - dir: /usr/sbin/ readOnly: true recursive: true - dir: /bin/ readOnly: true recursive: true - dir: /boot/ readOnly: true recursive: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/base32'. '/usr/bin/base16'. '/usr/bin/base32plain'. '/usr/bin/base32hex'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mysql process: matchPaths: - path: /usr/bin/base32 - path: /usr/bin/base16 - path: /usr/bin/base32plain - path: /usr/bin/base32hex action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: nginx'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/data/db/auditLog.json'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/data/db/auditLog.bson'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: nginx file: matchPaths: - path: /data/db/auditLog.json ownerOnly: true - path: /data/db/auditLog.bson ownerOnly: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: nginx'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/strings/ctype-latin1.c'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: nginx file: matchPaths: - path: /strings/ctype-latin1.c action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 file: matchDirectories: - dir: /etc/ recursive: true ownerOnly: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: nginx'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/postgresql/13/main/postgresql.conf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/var/lib/pgsql/data/postgresql.conf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. applies the rule to files with the '/**/pg_log/postgresql-Thu.log' pattern, ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: nginx file: matchPaths: - path: /etc/postgresql/13/main/postgresql.conf ownerOnly: true - path: /var/lib/pgsql/data/postgresql.conf ownerOnly: true matchPatterns: - pattern: /**/pg_log/postgresql-Thu.log ownerOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: discovery-engine'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/var/log/mongodb/mongod.log'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: discovery-engine file: matchPaths: - path: /var/log/mongodb/mongod.log readOnly: false action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: discovery-engine'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/credentials/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: discovery-engine file: matchDirectories: - dir: /credentials/ recursive: true readOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: discovery-engine'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/ls'. '/usr/bin/sleep'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: discovery-engine - WARNING process: matchPaths: - path: /usr/bin/ls - path: /usr/bin/sleep action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'kubearmor-app: kubearmor-policy-manager'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/credentials/', Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: kubearmor-app: kubearmor-policy-manager file: matchDirectories: - dir: /credentials/ action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: test'. defines the policy related to file access. applies the rule to files with the '/var/lib/pgsql/**/data/postgresql.conf' pattern, '/var/lib/pgsql/**/data/pg_hba.conf' pattern, '/var/lib/pgsql/**/data/pg_ident.conf' pattern, Specifies a rule that matches a specific file absolute path '/var/lib/postgresql/data/pgdata/postgresql.conf'. '/var/lib/postgresql/data/pgdata/pg_hba.conf'. '/var/lib/postgresql/data/pgdata/pg_ident.conf'. '/var/lib/postgresql/data/pgdata/postgresql.auto.conf'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: test file: matchPatterns: - pattern: /var/lib/pgsql/**/data/postgresql.conf - pattern: /var/lib/pgsql/**/data/pg_hba.conf - pattern: /var/lib/pgsql/**/data/pg_ident.conf matchPaths: - path: /var/lib/postgresql/data/pgdata/postgresql.conf - path: /var/lib/postgresql/data/pgdata/pg_hba.conf - path: /var/lib/postgresql/data/pgdata/pg_ident.conf - path: /var/lib/postgresql/data/pgdata/postgresql.auto.conf action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apc'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/scp'. '/bin/scp'. '/usr/bin/scp'. '/bin/scp'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apc action: Block process: matchPaths: - path: /usr/bin/scp - path: /bin/scp - path: /usr/bin/scp - path: /bin/scp
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: cass-server'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/log/postgresql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/usr/bin/touch', specifies a rule that matches a specific directory path '/usr/bin/chmod', specifies a rule that matches a specific directory path '/usr/bin/nano', specifies a rule that matches a specific directory path '/usr/bin/cat', specifies a rule that matches a specific directory path '/usr/bin/vi', Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: cass-server file: matchDirectories: - dir: /var/log/postgresql/ recursive: true readOnly: false fromSource: - path: /usr/bin/touch - path: /usr/bin/chmod - path: /usr/bin/nano - path: /usr/bin/cat - path: /usr/bin/vi action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: cass-server'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/dev/', specifies a rule that matches a specific directory path '/root/', Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chmod'. '/usr/bin/nc'. '/usr/bin/dig'. '/usr/bin/ncat'. '/usr/bin/nmap'. '/usr/sbin/tcpdump'. '/usr/bin/tcpdump'. '/usr/bin/tshark'. '/usr/bin/ngrep'. '/usr/bin/telnet'. '/usr/bin/mitmproxy'. '/usr/bin/socat'. '/usr/sbin/zmap'. '/usr/bin/login'. '/usr/bin/su'. '/usr/sbin/nologin'. '/usr/bin/faillog'. '/usr/bin/lastlog'. '/usr/bin/newgrp'. '/usr/bin/sg'. '/usr/sbin/shadowconfig'. '/usr/sbin/grpck'. '/usr/sbin/pwunconv'. '/usr/sbin/grpconv'. '/usr/sbin/pwck'. '/usr/sbin/groupmod'. '/usr/sbin/vipw'. '/usr/sbin/pwconv'. '/usr/sbin/useradd'. '/usr/sbin/newusers'. '/usr/sbin/cppw'. '/usr/sbin/chpasswd'. '/usr/sbin/usermod'. '/usr/sbin/groupadd'. '/usr/sbin/groupdel'. '/usr/sbin/grpunconv'. '/usr/sbin/chgpasswd'. '/usr/sbin/userdel'. '/usr/bin/chage'. '/usr/bin/chsh'. '/usr/bin/gpasswd'. '/usr/bin/chfn'. '/usr/bin/expiry'. '/usr/bin/passwd'. '/usr/sbin/vigr'. '/usr/sbin/cpgr'. '/usr/sbin/adduser'. '/usr/sbin/addgroup'. '/usr/sbin/deluser'. '/usr/sbin/delgroup'. '/usr/bin/chage'. '/usr/bin/gpasswd'. '/usr/bin/lastlog'. '/usr/bin/newgrp'. '/usr/bin/sg'. '/usr/sbin/adduser'. '/usr/sbin/deluser'. '/usr/sbin/chpasswd'. '/usr/sbin/groupadd'. '/usr/sbin/groupdel'. '/usr/sbin/addgroup'. '/usr/sbin/delgroup'. '/usr/sbin/groupmems'. '/usr/sbin/groupmod'. '/usr/sbin/grpck'. '/usr/sbin/grpconv'. '/usr/sbin/grpunconv'. '/usr/sbin/newusers'. '/usr/sbin/pwck'. '/usr/sbin/pwconv'. '/usr/sbin/pwunconv'. '/usr/sbin/useradd'. '/usr/sbin/userdel'. '/usr/sbin/usermod'. '/usr/sbin/vigr'. '/usr/sbin/vipw'. '/usr/sbin/unix_chkpwd'. '/usr/bin/openssl'. '/usr/sbin/update-ca-certificates'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: cass-server process: matchPaths: - path: /usr/bin/chmod - path: /usr/bin/nc - path: /usr/bin/dig - path: /usr/bin/ncat - path: /usr/bin/nmap - path: /usr/sbin/tcpdump - path: /usr/bin/tcpdump - path: /usr/bin/tshark - path: /usr/bin/ngrep - path: /usr/bin/telnet - path: /usr/bin/mitmproxy - path: /usr/bin/socat - path: /usr/sbin/zmap - path: /usr/bin/login - path: /usr/bin/su - path: /usr/sbin/nologin - path: /usr/bin/faillog - path: /usr/bin/lastlog - path: /usr/bin/newgrp - path: /usr/bin/sg - path: /usr/sbin/shadowconfig - path: /usr/sbin/grpck - path: /usr/sbin/pwunconv - path: /usr/sbin/grpconv - path: /usr/sbin/pwck - path: /usr/sbin/groupmod - path: /usr/sbin/vipw - path: /usr/sbin/pwconv - path: /usr/sbin/useradd - path: /usr/sbin/newusers - path: /usr/sbin/cppw - path: /usr/sbin/chpasswd - path: /usr/sbin/usermod - path: /usr/sbin/groupadd - path: /usr/sbin/groupdel - path: /usr/sbin/grpunconv - path: /usr/sbin/chgpasswd - path: /usr/sbin/userdel - path: /usr/bin/chage - path: /usr/bin/chsh - path: /usr/bin/gpasswd - path: /usr/bin/chfn - path: /usr/bin/expiry - path: /usr/bin/passwd - path: /usr/sbin/vigr - path: /usr/sbin/cpgr - path: /usr/sbin/adduser - path: /usr/sbin/addgroup - path: /usr/sbin/deluser - path: /usr/sbin/delgroup - path: /usr/bin/chage - path: /usr/bin/gpasswd - path: /usr/bin/lastlog - path: /usr/bin/newgrp - path: /usr/bin/sg - path: /usr/sbin/adduser - path: /usr/sbin/deluser - path: /usr/sbin/chpasswd - path: /usr/sbin/groupadd - path: /usr/sbin/groupdel - path: /usr/sbin/addgroup - path: /usr/sbin/delgroup - path: /usr/sbin/groupmems - path: /usr/sbin/groupmod - path: /usr/sbin/grpck - path: /usr/sbin/grpconv - path: /usr/sbin/grpunconv - path: /usr/sbin/newusers - path: /usr/sbin/pwck - path: /usr/sbin/pwconv - path: /usr/sbin/pwunconv - path: /usr/sbin/useradd - path: /usr/sbin/userdel - path: /usr/sbin/usermod - path: /usr/sbin/vigr - path: /usr/sbin/vipw - path: /usr/sbin/unix_chkpwd - path: /usr/bin/openssl - path: /usr/sbin/update-ca-certificates file: matchDirectories: - dir: /dev/ - dir: /root/ action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: cass-server'. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/sbin/'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: cass-server process: matchDirectories: - dir: /sbin/ action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: laravel-pod'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/*/apt-get install *' pattern. '/*/*/apt-get install *' pattern. '/*/apt install *' pattern. '/*/*/apt install *' pattern. '/*/apt install fwupd #new firmware installation' pattern. '/*/*/apt install fwupd' pattern. '/*/apt-get install fwupd' pattern. '/*/*/apt-get install fwupd' pattern. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/dev/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: laravel-pod process: matchPatterns: - pattern: /*/apt-get install * - pattern: /*/*/apt-get install * - pattern: /*/apt install * - pattern: /*/*/apt install * - pattern: /*/apt install fwupd #new firmware installation - pattern: /*/*/apt install fwupd - pattern: /*/apt-get install fwupd - pattern: /*/*/apt-get install fwupd matchDirectories: - dir: /dev/ recursive: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: xorddos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/shadow'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: container: xorddos file: matchPaths: - path: /etc/shadow action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: mysql-1'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/group'. '/etc/group-'. '/etc/passwd'. '/etc/gshadow'. '/etc/gshadow-'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/sbin/pwconv'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: container: mysql-1 process: matchPaths: - path: /usr/sbin/pwconv file: matchPaths: - path: /etc/group - path: /etc/group- - path: /etc/passwd - path: /etc/gshadow - path: /etc/gshadow- action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/credentials/', Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo file: matchDirectories: - dir: /credentials/ action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo-db'. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/bin/'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. '/sbin/'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. '/usr/bin/'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. '/usr/sbin/'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo-db process: matchDirectories: - dir: /bin/ ownerOnly: true recursive: true - dir: /sbin/ ownerOnly: true recursive: true - dir: /usr/bin/ ownerOnly: true recursive: true - dir: /usr/sbin/ ownerOnly: true recursive: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql8'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/dev/shm/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mysql8 file: matchDirectories: - dir: /dev/shm/ readOnly: true recursive: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: testpod'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/root/.Blackhawk.sh'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. applies the rule to files with the '/**/.Blackhawk.sh' pattern, '/.Blackhawk.sh' pattern, defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chmod'. When the 'fromSource' field is defined, the action is only applied to source processes in the path '/usr/lib/jvm/java-9-openjdk-amd64/bin/java'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: testpod file: matchPatterns: - pattern: /**/.Blackhawk.sh - pattern: /.Blackhawk.sh matchPaths: - path: /root/.Blackhawk.sh process: matchPaths: - path: /usr/bin/chmod fromSource: - path: /usr/lib/jvm/java-9-openjdk-amd64/bin/java action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: java'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/bin/bash'. '/bin/sh'. '/usr/bin/bash'. '/usr/bin/env'. '/usr/bin/shell'. '/bin/ksh'. '/etc/init.d'. '/dev/tty'. '/bin/zsh'. '/bin/tcsh'. '/bin/csh'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/bin/bash'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/rm'. '/usr/bin/unlink'. '/usr/bin/rmdir'. '/bin/bash'. '/bin/sh'. '/usr/bin/bash'. '/usr/bin/env'. '/usr/bin/shell'. '/bin/ksh'. '/etc/init.d'. '/dev/tty'. '/bin/zsh'. '/bin/tcsh'. '/bin/csh'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: java process: matchPaths: - path: /usr/bin/rm - path: /usr/bin/unlink - path: /usr/bin/rmdir process: matchPaths: - path: /bin/bash - path: /bin/sh - path: /usr/bin/bash - path: /usr/bin/env - path: /usr/bin/shell - path: /bin/ksh - path: /etc/init.d - path: /dev/tty - path: /bin/zsh - path: /bin/tcsh - path: /bin/csh file: matchPaths: - path: /bin/bash - path: /bin/sh - path: /usr/bin/bash - path: /usr/bin/env - path: /usr/bin/shell - path: /bin/ksh - path: /etc/init.d - path: /dev/tty - path: /bin/zsh - path: /bin/tcsh - path: /bin/csh fromSource: - path: /bin/bash action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql-pod'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/local/tomcat/logs/', ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/var/log/tomcat/', ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mysql-pod file: matchDirectories: - dir: /usr/local/tomcat/logs/ ownerOnly: true recursive: true - dir: /var/log/tomcat/ ownerOnly: true recursive: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'pod: testpod'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/*.mysql history' pattern. '/*.mysql_history' pattern. '/*.mysqlsh/history' pattern. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: pod: testpod process: matchPatterns: - pattern: /*.mysql history - pattern: /*.mysql_history - pattern: /*.mysqlsh/history action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: tomcat-app'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/local/tomcat/webapps/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: tomcat-app file: matchDirectories: - dir: /usr/local/tomcat/webapps/ recursive: true ownerOnly: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: tomcat-app'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/*/*/*/django-admin dbshell*' pattern. '/*/*/django-admin dbshell*' pattern. '/*/django-admin dbshell*' pattern. '/django-admin dbshell*' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: tomcat-app process: matchPatterns: - pattern: /*/*/*/django-admin dbshell* - pattern: /*/*/django-admin dbshell* - pattern: /*/django-admin dbshell* - pattern: /django-admin dbshell* action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: tomcat-app'. defines the policy related to file access. applies the rule to files with the '/**/.htpasswd' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. applies the rule to processes with the '/**/htpasswd' pattern. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: tomcat-app file: matchPatterns: - pattern: /**/.htpasswd process: matchPatterns: - pattern: /**/htpasswd action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'group: group-1'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/usr/local/tomcat/conf/server.xml'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: group: group-1 file: matchPaths: - path: /usr/local/tomcat/conf/server.xml action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/ssl/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/etc/pki/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/usr/local/share/ca-certificates/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache file: matchDirectories: - dir: /etc/ssl/ readOnly: true recursive: true - dir: /etc/pki/ readOnly: true recursive: true - dir: /usr/local/share/ca-certificates/ readOnly: true recursive: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: flask-app'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/base32'. '/usr/bin/base16'. '/usr/bin/base32plain'. '/usr/bin/base32hex'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: flask-app process: matchPaths: - path: /usr/bin/base32 - path: /usr/bin/base16 - path: /usr/bin/base32plain - path: /usr/bin/base32hex action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: frontend'. defines the network-related policies. In this case, rule applies to raw network traffic. Specifies what to do when rules match, which means relevant network activities will be logged.
kind: KubeArmorPolicy spec: selector: matchLabels: app: frontend network: matchProtocols: - protocol: raw action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'pod: testpod'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/apt'. '/usr/bin/apt-get'. '/bin/apt-get'. '/sbin/apk'. '/bin/apt'. '/usr/bin/dpkg'. '/bin/dpkg'. '/usr/bin/gdebi'. '/bin/gdebi'. '/usr/bin/make'. '/bin/make'. '/usr/bin/yum'. '/bin/yum'. '/usr/bin/rpm'. '/bin/rpm'. '/usr/bin/dnf'. '/bin/dnf'. '/usr/bin/pacman'. '/usr/sbin/pacman'. '/bin/pacman'. '/sbin/pacman'. '/usr/bin/makepkg'. '/usr/sbin/makepkg'. '/bin/makepkg'. '/sbin/makepkg'. '/usr/bin/yaourt'. '/usr/sbin/yaourt'. '/bin/yaourt'. '/sbin/yaourt'. '/usr/bin/zypper'. '/bin/zypper'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: pod: testpod process: matchPaths: - path: /usr/bin/apt - path: /usr/bin/apt-get - path: /bin/apt-get - path: /sbin/apk - path: /bin/apt - path: /usr/bin/dpkg - path: /bin/dpkg - path: /usr/bin/gdebi - path: /bin/gdebi - path: /usr/bin/make - path: /bin/make - path: /usr/bin/yum - path: /bin/yum - path: /usr/bin/rpm - path: /bin/rpm - path: /usr/bin/dnf - path: /bin/dnf - path: /usr/bin/pacman - path: /usr/sbin/pacman - path: /bin/pacman - path: /sbin/pacman - path: /usr/bin/makepkg - path: /usr/sbin/makepkg - path: /bin/makepkg - path: /sbin/makepkg - path: /usr/bin/yaourt - path: /usr/sbin/yaourt - path: /bin/yaourt - path: /sbin/yaourt - path: /usr/bin/zypper - path: /bin/zypper action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. applies the rule to files with the '/**/npm-debug.log' pattern, similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/local/tomcat/bin/', ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 file: matchPatterns: - pattern: /**/npm-debug.log file: matchDirectories: - dir: /usr/local/tomcat/bin/ recurive: true ownerOnly: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: lfipod'. defines the policy related to file access. applies the rule to files with the '/etc/*hado?' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: lfipod file: matchPatterns: - pattern: /etc/*hado? action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: testpod'. defines the network-related policies. In this case, rule applies to ICMP network traffic. Specifies what to do when rules match, which means relevant network activities will be logged.
kind: KubeArmorPolicy spec: selector: matchLabels: app: testpod network: matchProtocols: - protocol: icmp action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: testpod'. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/lib/postgresql/data/'. When the 'fromSource' field is defined, the action is only applied to source processes in the path '/usr/lib/postgresql/14/bin/postgres'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: testpod process: matchDirectories: - dir: /var/lib/postgresql/data/ fromSource: - path: /usr/lib/postgresql/14/bin/postgres recursive: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mysql'. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/bin/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. '/bin/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. '/usr/local/bin/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mysql process: matchDirectories: - dir: /usr/bin/ recursive: true - dir: /bin/ recursive: true - dir: /usr/local/bin/ recursive: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: test-app'. defines the policy related to file access. applies the rule to files with the '/**/kataras/iris/**/' pattern, Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: test-app file: matchPatterns: - pattern: /**/kataras/iris/**/ action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'pad: testpad'. defines the policy related to file access. applies the rule to files with the '/**/app.yaml' pattern, '/**/app.yml' pattern, '/**/application.yaml' pattern, '/**/application.yml' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: pad: testpad file: matchPatterns: - pattern: /**/app.yaml - pattern: /**/app.yml - pattern: /**/application.yaml - pattern: /**/application.yml action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: node-app'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/var/lib/postgresql/data/pgdata/postgresql.conf'. '/var/lib/postgresql/data/pgdata/pg_hba.conf'. '/var/lib/postgresql/data/pgdata/pg_ident.conf'. '/var/lib/postgresql/data/pgdata/postgresql.auto.conf'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. applies the rule to files with the '/var/lib/pgsql/**/data/postgresql.conf' pattern, '/var/lib/pgsql/**/data/pg_hba.conf' pattern, '/var/lib/pgsql/**/data/pg_ident.conf' pattern,
kind: KubeArmorPolicy spec: selector: matchLabels: app: node-app file: matchPatterns: - pattern: /var/lib/pgsql/**/data/postgresql.conf - pattern: /var/lib/pgsql/**/data/pg_hba.conf - pattern: /var/lib/pgsql/**/data/pg_ident.conf matchPaths: - path: /var/lib/postgresql/data/pgdata/postgresql.conf - path: /var/lib/postgresql/data/pgdata/pg_hba.conf - path: /var/lib/postgresql/data/pgdata/pg_ident.conf - path: /var/lib/postgresql/data/pgdata/postgresql.auto.conf action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: node-app'. defines the policy related to file access. applies the rule to files with the '/**/my.cnf' pattern, ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: node-app file: matchPatterns: - pattern: /**/my.cnf ownerOnly: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: owncloud'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/mongod.conf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: owncloud file: matchPaths: - path: /etc/mongod.conf ownerOnly: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: testpod'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/passwd'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: testpod file: matchPaths: - path: /etc/passwd ownerOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: samba'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/rsync'. '/bin/rsync'. '/usr/bin/scp'. '/bin/scp'. '/usr/bin/scp'. '/bin/scp'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: samba process: matchPaths: - path: /usr/bin/rsync - path: /bin/rsync - path: /usr/bin/scp - path: /bin/scp - path: /usr/bin/scp - path: /bin/scp action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/hostapd/hostapd.conf'. '/etc/network/interfaces'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 file: matchPaths: - path: /etc/hostapd/hostapd.conf - path: /etc/network/interfaces action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-2'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/dev/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-2 file: matchDirectories: - dir: /dev/ readOnly: true recursive: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'kubearmor.io/container.name: wordpress-mysql'. defines the policy related to file access. applies the rule to files with the '/**/storage/logs/laravel.log' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: kubearmor.io/container.name: wordpress-mysql file: matchPatterns: - pattern: /**/storage/logs/laravel.log action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: zend'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/**/*tftp-server*' pattern. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: container: zend process: matchPatterns: - pattern: /**/*tftp-server* action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'kubearmor-app: kubearmor-host-policy-manager'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/proc/meminfo'. '/proc/mounts'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. applies the rule to processes with the '^/proc/\*/maps$' pattern. '^/proc/\*/mem$' pattern. '/*/mv * /dev/null' pattern. '/*/*/mv * /dev/null' pattern. '/*/mkfs.ext4 /dev/*' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: kubearmor-app: kubearmor-host-policy-manager process: matchPatterns: - pattern: ^/proc/\*/maps$ - pattern: ^/proc/\*/mem$ - pattern: /*/mv * /dev/null - pattern: /*/*/mv * /dev/null - pattern: /*/mkfs.ext4 /dev/* file: matchPaths: - path: /proc/meminfo - path: /proc/mounts action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: java-ms'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/local/go/src/crypto/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. applies the rule to files with the '/**/crypto/**/' pattern, Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: java-ms file: matchDirectories: - dir: /usr/local/go/src/crypto/ recursive: true matchPatterns: - pattern: /**/crypto/**/ action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: nginx-2'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/credentials/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Allow' allows access to the matching file. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/bin/'. Specifies the action to take when rules match, in which case the 'Allow' action allows the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: nginx-2 process: matchDirectories: - dir: /bin/ file: matchDirectories: - dir: /credentials/ recursive: true action: Allow
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: test'. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/sbin/'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: test process: matchDirectories: - dir: /sbin/ action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: rhel8'. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/sbin/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: rhel8 process: matchDirectories: - dir: /sbin/ recursive: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'pod: test'. defines the network-related policies. In this case, rule applies to raw network traffic. Specifies what to do when rules match, which means relevant network activities will be blocked.
kind: KubeArmorPolicy spec: selector: matchLabels: pod: test network: matchProtocols: - protocol: raw action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: pickle-app'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/**/bulk' pattern. '/**/*bulk' pattern. '/**/**/bulk' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: pickle-app process: matchPatterns: - pattern: /**/bulk - pattern: /**/*bulk - pattern: /**/**/bulk action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: frontend'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/log/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/usr/bin/rm', specifies a rule that matches a specific directory path '/bin/rm', specifies a rule that matches a specific directory path '/usr/bin/rmdir', specifies a rule that matches a specific directory path '/bin/rmdir', specifies a rule that matches a specific directory path '/usr/bin/unlink', specifies a rule that matches a specific directory path '/bin/unlink', Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: frontend file: matchDirectories: - dir: /var/log/ recursive: true fromSource: - path: /usr/bin/rm - path: /bin/rm - path: /usr/bin/rmdir - path: /bin/rmdir - path: /usr/bin/unlink - path: /bin/unlink action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-5'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/local/tomcat/webapps/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-5 file: matchDirectories: - dir: /usr/local/tomcat/webapps/ recursive: true ownerOnly: true action: Audit

No dataset card yet

New: Create and edit this dataset card directly on the website!

Contribute a Dataset Card
Downloads last month
6
Add dataset card