turbot/steampipe-mod-kubernetes-compliance

Control: Replication Controller containers kube scheduler profiling should be disabled

Description

This check ensures that the container in the Replication Controller has kube scheduler profiling disabled.

Usage

Run the control in your terminal:

powerpipe control run kubernetes_compliance.control.replication_controller_container_argument_kube_scheduler_profiling_disabled

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run kubernetes_compliance.control.replication_controller_container_argument_kube_scheduler_profiling_disabled --share

SQL

This control uses a named query:

select
coalesce(uid, concat(path, ':', start_line)) as resource,
case
when (c -> 'command') is null or not ((c -> 'command') @> '["kube-scheduler"]') then 'ok'
when (c -> 'command') @> '["kube-scheduler"]'
and (c -> 'command') @> '["--profiling=false"]' then 'ok'
else 'alarm'
end as status,
case
when (c -> 'command') is null then c ->> 'name' || ' command not defined.'
when not ((c -> 'command') @> '["kube-scheduler"]') then c ->> 'name' || ' kube-scheduler not defined.'
when (c -> 'command') @> '["kube-apiserver"]'
and (c -> 'command') @> '["--profiling=false"]' then c ->> 'name' || ' profiling disabled.'
else c ->> 'name' || ' profiling enabled.'
end as reason,
name as replication_controller_name
, coalesce(context_name, '') as context_name, namespace, source_type, coalesce(path || ':' || start_line || '-' || end_line, '') as path
from
kubernetes_replication_controller,
jsonb_array_elements(template -> 'spec' -> 'containers') as c;

Tags