Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add missing privileges for the apps Kubernetes API group #1136

Merged
merged 1 commit into from
Apr 16, 2020

Conversation

JPLachance
Copy link
Contributor

@JPLachance JPLachance commented Apr 8, 2020

What type of PR is this?
/kind bug

Any specific area of the project related to this PR?
/area integrations

What this PR does / why we need it:
In falco/integrations/k8s-using-daemonset/k8s-with-rbac/falco-account.yaml, we create a ClusterRole for the Falco ServiceAccount. I reviewed our kube audit logs and saw that Falco was getting an access denied on:

  • watch /apis/apps/v1/watch/deployments?pretty=false
  • watch /apis/apps/v1/watch/replicasets?pretty=false
  • watch /apis/apps/v1/watch/daemonsets?pretty=false

Falco tries those call over and over again which floods audit logs and I'm quite sure Falco is not working as expected without that privilege.

This PR adds the missing privileges and we stop seeing errors in Kubernetes audit logs. We also expect Falco to work a little bit better with those privileges.

Which issue(s) this PR fixes:
Fixes #1064

Does this PR introduce a user-facing change?:

fix(integrations/k8s-using-daemonset): added missing privileges for the apps Kubernetes API group in the falco-cluster-role when using RBAC

…es API group

Fixes falcosecurity#1064

Signed-off-by: Jean-Philippe Lachance <jplachance@coveo.com>
@poiana
Copy link

poiana commented Apr 16, 2020

LGTM label has been added.

Git tree hash: b2f1e5075ffca3df2396f17761814bb9b48c789d

@leodido
Copy link
Member

leodido commented Apr 16, 2020

/milestone 0.22.0

@poiana poiana added this to the 0.22.0 milestone Apr 16, 2020
@leodido leodido removed the request for review from Kaizhe April 16, 2020 11:18
@poiana
Copy link

poiana commented Apr 16, 2020

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: fntlnz, leodido

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@poiana poiana merged commit ad4b8d4 into falcosecurity:master Apr 16, 2020
@JPLachance
Copy link
Contributor Author

Hello @leodido,

This issue is also present in the Falco Helm chart. Who maintains that Helm chart?

Regards,
JP

@leogr
Copy link
Member

leogr commented Jun 12, 2020

Hello @leodido,

This issue is also present in the Falco Helm chart. Who maintains that Helm chart?

Regards,
JP

Hey @JPLachance

here 👇 the PR to fix the helm chart too
falcosecurity/charts#30

Thank you!

@leodido
Copy link
Member

leodido commented Jun 12, 2020 via email

@JPLachance JPLachance deleted the fix-falco-k8s-clusterrole branch June 16, 2020 18:21
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

The falco-cluster-role ClusterRole is missing the watch privileges on resources in the apps API group
5 participants