Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: added kubectl exec alert policy #1818

Closed
wants to merge 1 commit into from

Conversation

yp969803
Copy link

@yp969803 yp969803 commented Jul 27, 2024

Signed-off-by: Yash Patel [email protected]

Purpose of PR?: added kubectl exec alert policy

Fixes #1750

Does this PR introduce a breaking change?

If the changes in this PR are manually verified, list down the scenarios covered::

Additional information for reviewer? :
Mention if this PR is part of any design or a continuation of previous PRs

Checklist:

  • Bug fix. Fixes #
  • New feature (non-breaking change which adds functionality)
  • Breaking change (fix or feature that would cause existing functionality to not work as expected)
  • This change requires a documentation update
  • PR Title follows the convention of <type>(<scope>): <subject>
  • Commit has unit tests
  • Commit has integration tests

Signed-off-by: Yash Patel [email protected]

Signed-off-by: YASH PATEL <[email protected]>
@yp969803
Copy link
Author

yp969803 commented Jul 27, 2024

@daemon1024 can you review the current work

@yp969803
Copy link
Author

@daemon1024 cab u run the tests

@daemon1024
Copy link
Member

Hey @yp969803
Appreciate the attempt at the problem statement. The scope of the problem is very different. It involves construction of entirely new spec for KubeArmor Policy. I will try to update #1750 with more details, but this is definitely not in the same direction of solution what the problem statement demands to be.

@daemon1024 daemon1024 closed this Aug 6, 2024
@yp969803
Copy link
Author

yp969803 commented Aug 6, 2024

@daemon1024 sorry for misunderstanding the issue, i thought you wanted a defualt policy for all the pods which audit kubectl exec.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Alert Policy for KubeArmor
2 participants