-
Notifications
You must be signed in to change notification settings - Fork 34
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update securityContext for all deployments #90
base: main
Are you sure you want to change the base?
Conversation
4354403
to
c29e842
Compare
Rebased on current main, forgot to sync initially. |
fa0f67b
to
a9fa817
Compare
The Metabase doesn't seem to be configured when navigating to the URL. This will need some more investigating. Which component does the setup for this database? |
382893a
to
9618767
Compare
Hi @Jeroen0494, Thanks for doing this PR. |
Hi, yes it is ready. |
Hi, Sorry for the delay. I tested the PR, It's not working when you enable a notification plugin. |
Hi, thank you for testing it! |
Hi @Jeroen0494, Sorry for the delay. Yes, so basically, to reproduce the behavior:
config:
profiles.yaml: |
name: default_ip_remediation
#debug: true
filters:
- Alert.Remediation == true && Alert.GetScope() == "Ip"
decisions:
- type: ban
duration: 4h
notifications:
- myslack
on_success: break
notifications:
myslack.yaml: |
type: slack
name: myslack
log_level: info
format: |
{{range . -}}
{{$alert := . -}}
{{range .Decisions -}}
{{if $alert.Source.Cn -}}
:flag-{{$alert.Source.Cn}}: <https://www.whois.com/whois/{{.Value}}|{{.Value}}> will get {{.Type}} for next {{.Duration}} for triggering {{.Scenario}} on machine '{{$alert.MachineID}}'. <https://www.shodan.io/host/{{.Value}}|Shodan>{{end}}
{{if not $alert.Source.Cn -}}
:pirate_flag: <https://www.whois.com/whois/{{.Value}}|{{.Value}}> will get {{.Type}} for next {{.Duration}} for triggering {{.Scenario}} on machine '{{$alert.MachineID}}'. <https://www.shodan.io/host/{{.Value}}|Shodan>{{end}}
{{end -}}
{{end -}}
webhook: <slack_webhook>
On the installation, the crowdsec-lapi pod will crash with this error :
Because of not enough permissions |
Hi @Jeroen0494, Did you get any chance to look into the issue about the permissions ? |
Hi, eh, no I have not because I completely forgot about this PR. |
what is the current status of this PR? Would like to see this merged for security hardenings of crowdsec. Currently the chart is deploying the workloads with to privileged permissions |
Haven't gotten to it yet. |
afa4cea
to
801566b
Compare
There, I've moved all of the security settings to the values.yaml file, so you can override them if your plugins need more permissions. |
Hi @Jeroen0494, Thanks for the update. Two last suggestions we have on this PR :
|
@Jeroen0494 do you find some time to complete the last 2 suggestions from he2ss? |
Signed-off-by: Jeroen Rijken <[email protected]>
Signed-off-by: Jeroen Rijken <[email protected]>
Signed-off-by: Jeroen Rijken <[email protected]>
Signed-off-by: Jeroen Rijken <[email protected]>
Signed-off-by: Jeroen Rijken <[email protected]>
Signed-off-by: Jeroen Rijken <[email protected]>
Signed-off-by: Jeroen Rijken <[email protected]>
Signed-off-by: Jeroen Rijken <[email protected]>
Signed-off-by: Jeroen Rijken <[email protected]>
Signed-off-by: Jeroen Rijken <[email protected]>
cf42373
to
706a238
Compare
I can do it one of two ways.
|
Hi,
Changes
Explanation
This PR changes quite a few things.Containers will run with the least amount of privileges required to run.
User facing changes
Exiting installations will fail to run without also updating the owners of files already existing on the filesystem. To mitigate this, we can do one of two things: