turbot/kubernetes_compliance

Query: job_container_argument_kubelet_read_only_port_0

Usage

powerpipe query kubernetes_compliance.query.job_container_argument_kubelet_read_only_port_0

Steampipe Tables

SQL

with container_list as (
select
c ->> 'name' as container_name,
trim('"' from split_part(co::text, '=', 2))::integer as value,
j.name as job
from
kubernetes_job as j,
jsonb_array_elements(template -> 'spec' -> 'containers') as c,
jsonb_array_elements(c -> 'command') as co
where
(co)::text LIKE '%--read-only-port=%'
), container_name_with_job_name as (
select
j.name as job_name,
j.uid as job_uid,
j.path as path,
j.start_line as start_line,
j.end_line as end_line,
j.context_name as context_name,
j.namespace as namespace,
j.source_type as source_type,
j.tags as tags,
j._ctx as _ctx,
c.*
from
kubernetes_job as j,
jsonb_array_elements(template -> 'spec' -> 'containers') as c
)
select
coalesce(j.job_uid, concat(j.path, ':', j.start_line)) as resource,
case
when (j.value -> 'command') is null or not ((j.value -> 'command') @> '["kubelet"]') then 'ok'
when l.container_name is not null and (j.value -> 'command') @> '["kubelet"]' and (l.value = 0) then 'ok'
else 'alarm'
end as status,
case
when (j.value -> 'command') is null then j.value ->> 'name' || ' command not defined.'
when not ((j.value -> 'command') @> '["kubelet"]') then j.value ->> 'name' || ' kubelet not defined.'
else j.value ->> 'name' || ' read-only port is set to ' || (l.value) || '.'
end as reason,
j.job_name as job_name
, coalesce(context_name, '') as context_name, namespace, source_type, coalesce(path || ':' || start_line || '-' || end_line, '') as path
from
container_name_with_job_name as j
left join container_list as l on j.value ->> 'name' = l.container_name and j.job_name = l.job;

Controls

The query is being used by the following controls: