-
Notifications
You must be signed in to change notification settings - Fork 905
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add missing privileges for the apps Kubernetes API group #1136
Add missing privileges for the apps Kubernetes API group #1136
Conversation
…es API group Fixes falcosecurity#1064 Signed-off-by: Jean-Philippe Lachance <jplachance@coveo.com>
LGTM label has been added. Git tree hash: b2f1e5075ffca3df2396f17761814bb9b48c789d
|
/milestone 0.22.0 |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: fntlnz, leodido The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Hello @leodido, This issue is also present in the Falco Helm chart. Who maintains that Helm chart? Regards, |
Hey @JPLachance here 👇 the PR to fix the helm chart too Thank you! |
Thanks @leogr for approaching this, I had lost track of the JP’s comment
On Fri, 12 Jun 2020 at 15:06, Leonardo Grasso ***@***.***> wrote:
Hello @leodido <https://github.com/leodido>,
This issue is also present in the Falco Helm chart
<https://github.com/helm/charts/blob/master/stable/falco/templates/clusterrole.yaml>.
Who maintains that Helm chart?
Regards,
JP
Hey @JPLachance <https://github.com/JPLachance>
here 👇 the PR to fix the helm chart too
falcosecurity/charts#30 <falcosecurity/charts#30>
Thank you!
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#1136 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAA5J44R3ANYLIJ4HNWGWP3RWIR5NANCNFSM4MEHULDA>
.
--
L.
|
What type of PR is this?
/kind bug
Any specific area of the project related to this PR?
/area integrations
What this PR does / why we need it:
In falco/integrations/k8s-using-daemonset/k8s-with-rbac/falco-account.yaml, we create a ClusterRole for the Falco ServiceAccount. I reviewed our kube audit logs and saw that Falco was getting an access denied on:
watch
/apis/apps/v1/watch/deployments?pretty=false
watch
/apis/apps/v1/watch/replicasets?pretty=false
watch
/apis/apps/v1/watch/daemonsets?pretty=false
Falco tries those call over and over again which floods audit logs and I'm quite sure Falco is not working as expected without that privilege.
This PR adds the missing privileges and we stop seeing errors in Kubernetes audit logs. We also expect Falco to work a little bit better with those privileges.
Which issue(s) this PR fixes:
Fixes #1064
Does this PR introduce a user-facing change?: