Control: Pod containers kube controller manager profiling should be disabled
Description
This check ensures that the container in the Pod has kube controller manager profiling disabled.
Usage
Run the control in your terminal:
powerpipe control run kubernetes_compliance.control.pod_container_argument_kube_controller_manager_profiling_disabledSnapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run kubernetes_compliance.control.pod_container_argument_kube_controller_manager_profiling_disabled --shareSQL
This control uses a named query:
select coalesce(uid, concat(path, ':', start_line)) as resource, case when (c -> 'command') is null or not ((c -> 'command') @> '["kube-controller-manager"]') then 'ok' when (c -> 'command') @> '["kube-controller-manager"]' and (c -> 'command') @> '["--profiling=false"]' then 'ok' else 'alarm' end as status, case when (c -> 'command') is null then c ->> 'name' || ' command not defined.' when not ((c -> 'command') @> '["kube-controller-manager"]') then c ->> 'name' || ' kube-controller-manager not defined.' when (c -> 'command') @> '["kube-controller-manager"]' and (c -> 'command') @> '["--profiling=false"]' then c ->> 'name' || ' profiling disabled.' else c ->> 'name' || ' profiling enabled.' end as reason, name as pod_name , coalesce(context_name, '') as context_name, namespace, source_type, coalesce(path || ':' || start_line || '-' || end_line, '') as pathfrom kubernetes_pod, jsonb_array_elements(containers) as c;