Control: CronJob containers argument kube controller manager service account credentials should be enabled
Description
This check ensures that the container in the CronJob has argument kube controller manager service account credentials enabled.
Usage
Run the control in your terminal:
powerpipe control run kubernetes_compliance.control.cronjob_container_argument_kube_controller_manager_service_account_credentials_enabledSnapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run kubernetes_compliance.control.cronjob_container_argument_kube_controller_manager_service_account_credentials_enabled --shareSQL
This control uses a named query:
select coalesce(uid, concat(path, ':', start_line)) as resource, case when (c -> 'command') is null or not ((c -> 'command') @> '["kube-controller-manager"]') then 'ok' when (c -> 'command') @> '["kube-controller-manager"]' and (c -> 'command') @> '["--use-service-account-credentials=true"]' then 'ok' else 'alarm' end as status, case when (c -> 'command') is null then c ->> 'name' || ' command not defined.' when not ((c -> 'command') @> '["kube-controller-manager"]') then c ->> 'name' || ' kube-controller-manager not defined.' when (c -> 'command') @> '["kube-controller-manager"]' and (c -> 'command') @> '["--use-service-account-credentials=true"]' then c ->> 'name' || ' use service account credential enabled.' else c ->> 'name' || ' use service account credential disabled.' end as reason, name as cronjob_name , coalesce(context_name, '') as context_name, namespace, source_type, coalesce(path || ':' || start_line || '-' || end_line, '') as pathfrom kubernetes_cronjob, jsonb_array_elements(job_template -> 'spec' -> 'template' -> 'spec' -> 'containers') as c;