Control: DaemonSet containers kube scheduler profiling should be disabled
Description
This check ensures that the container in the DaemonSet has kube scheduler profiling disabled.
Usage
Run the control in your terminal:
powerpipe control run kubernetes_compliance.control.daemonset_container_argument_kube_scheduler_profiling_disabled
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run kubernetes_compliance.control.daemonset_container_argument_kube_scheduler_profiling_disabled --share
SQL
This control uses a named query:
select coalesce(uid, concat(path, ':', start_line)) as resource, case when (c -> 'command') is null or not ((c -> 'command') @> '["kube-scheduler"]') then 'ok' when (c -> 'command') @> '["kube-scheduler"]' and (c -> 'command') @> '["--profiling=false"]' then 'ok' else 'alarm' end as status, case when (c -> 'command') is null then c ->> 'name' || ' command not defined.' when not ((c -> 'command') @> '["kube-scheduler"]') then c ->> 'name' || ' kube-scheduler not defined.' when (c -> 'command') @> '["kube-apiserver"]' and (c -> 'command') @> '["--profiling=false"]' then c ->> 'name' || ' profiling disabled.' else c ->> 'name' || ' profiling enabled.' end as reason, name as daemonset_name , coalesce(context_name, '') as context_name, namespace, source_type, coalesce(path || ':' || start_line || '-' || end_line, '') as pathfrom kubernetes_daemonset, jsonb_array_elements(template -> 'spec' -> 'containers') as c;