Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Consider pods running with "default" service account a warning or error #42

Closed
naseemkullah opened this issue Jul 9, 2019 · 6 comments
Labels
enhancement New feature or request

Comments

@naseemkullah
Copy link

Would it fall under popeye's scope to check for best practices such as this?

@derailed derailed added the enhancement New feature or request label Jul 13, 2019
@derailed
Copy link
Owner

@naseemkullah Thank you for this report! Yes I think this is a valid check.

@naseemkullah
Copy link
Author

naseemkullah commented Jul 13, 2019

My pleasure @derailed.
Furthermore, if interested in encompassing checks with regards to securityContext as well, https://kubesec.io/ have some nice ideas to draw inspiration from (to check if pod is running as non-root for example).

@derailed
Copy link
Owner

@naseemkullah Thank you for the pointer! I'll take a peek and see how we can start surfacing more security best practices in Popeye.

@naseemkullah
Copy link
Author

My pleasure @derailed , I just discovered this tool as well that covers this sort of thing: https://github.com/Shopify/kubeaudit ...could maybe get some ideas from it as well.

@derailed
Copy link
Owner

derailed commented Aug 3, 2019

@naseemkullah Thank you for your pointers on this!! v0.4.1 now performs some basic security checks. More to come on this... Please see v0.4.0 release notes.

@derailed derailed closed this as completed Aug 3, 2019
@naseemkullah
Copy link
Author

Excellent!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants