Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Background scanning for policy violations #98

Open
phenixblue opened this issue Feb 20, 2021 · 0 comments
Open

Background scanning for policy violations #98

phenixblue opened this issue Feb 20, 2021 · 0 comments
Labels

Comments

@phenixblue
Copy link
Contributor

What would you like to be added:

a mechanism to scan and alert on kubernetes resources that are already deployed in the cluster (ie. past the initial admission control workflow).

  • Probably needs to run in a configurable interval
  • Could be background daemon or sidecar, or a completely separate pod.
  • Could be a good thing to look at doing in Golang
  • Maybe think through the possibility of an enforcement action in addition to alerts (ie. Scale to 0 pods on Deploymebt with privileged pod spec)
  • not sure if we'd want a separate severity/deny level for the background scanning vs. the admission response flow

Why is this needed:

This would cover brownfield environments or scenarios where new policies are added/policy severity changes and resources may be long-lived/deployed infrequently

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant