Control: CronJob containers argument kube controller manager service account credentials should be enabled
Description
This check ensures that the container in the CronJob has argument kube controller manager service account credentials enabled.
Usage
Run the control in your terminal:
powerpipe control run kubernetes_compliance.control.cronjob_container_argument_kube_controller_manager_service_account_credentials_enabled
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run kubernetes_compliance.control.cronjob_container_argument_kube_controller_manager_service_account_credentials_enabled --share
SQL
This control uses a named query:
select coalesce(uid, concat(path, ':', start_line)) as resource, case when (c -> 'command') is null or not ((c -> 'command') @> '["kube-controller-manager"]') then 'ok' when (c -> 'command') @> '["kube-controller-manager"]' and (c -> 'command') @> '["--use-service-account-credentials=true"]' then 'ok' else 'alarm' end as status, case when (c -> 'command') is null then c ->> 'name' || ' command not defined.' when not ((c -> 'command') @> '["kube-controller-manager"]') then c ->> 'name' || ' kube-controller-manager not defined.' when (c -> 'command') @> '["kube-controller-manager"]' and (c -> 'command') @> '["--use-service-account-credentials=true"]' then c ->> 'name' || ' use service account credential enabled.' else c ->> 'name' || ' use service account credential disabled.' end as reason, name as cronjob_name , coalesce(context_name, '') as context_name, namespace, source_type, coalesce(path || ':' || start_line || '-' || end_line, '') as pathfrom kubernetes_cronjob, jsonb_array_elements(job_template -> 'spec' -> 'template' -> 'spec' -> 'containers') as c;