-
Notifications
You must be signed in to change notification settings - Fork 349
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
KubeArmor is not blocking the process as expected #1839
Comments
Hey @myugan, Can you share how are trying to violate it and what's the output you see? Additionally can you run |
Hello @daemon1024, I have verified that the binary of sleep appears to be correct, and I even attempted to replace it with another binary file, but it did not block either. Is there a method to display the complete debug message in order to understand why it is not blocking the action according to the policy? Additionally, the output is not appearing in the |
Can we check if the Pod has apparmor annotation? Can you share the Pod/Deployment spec? |
There is no annotation in the pod. Here is the manifest file.
I have checked the Pod annotation, and it says the policy is enabled as well.
|
Got the same issue, any idea @daemon1024 ?
|
It seems like you have kubearmor in audit mode, not block. I'm my case I'm having the same issue, but I configured the policy in block mode using annotations: Policy definiton:
Karmor probe output: But I'm able to create files under /var/lib/mysql/ without being blocked. |
Bug Report
General Information
kubeadm
uname -a
):6.5.0-1020-aws
kubectl version
, ...): v1.29.5To Reproduce
sleep
command. Verify that the policy is successfully applied to the respective pod usingkarmor probe
.Expected behavior
KubeArmor must block any activities according to the created policy.
Screenshots
The text was updated successfully, but these errors were encountered: