docs/examples/text-report-sample.txt
--- Kubernetes Cluster Report ---
Timestamp: 04/22/2025 11:58:43 --------------------------------- [🌐 Cluster Summary] Cluster Name: aks-0402-dev-uks Kubernetes Version: v1.30.11 Kubernetes control plane is running at https://aks-0402-dev-uks-okv6e22w.hcp.uksouth.azmk8s.io:443 CoreDNS is running at https://aks-0402-dev-uks-okv6e22w.hcp.uksouth.azmk8s.io:443/api/v1/namespaces/kube-system/services/kube-dns:dns/proxy Metrics-server is running at https://aks-0402-dev-uks-okv6e22w.hcp.uksouth.azmk8s.io:443/api/v1/namespaces/kube-system/services/https:metrics-server:/proxy To further debug and diagnose cluster problems, use 'kubectl cluster-info dump'. Compatibility Check: ⚠️ Cluster is running an outdated version: v1.30.11 (Latest: v1.32.3) API Server Health: Metrics: 📊 Cluster Metrics Summary ------------------------------------------------------------------------------------------ 🚀 Nodes: 6 🟩 Healthy: 6 🟥 Issues: 0 📦 Pods: 136 🟩 Running: 136 🟥 Failed: 0 🔄 Restarts: 1 🟨 Warnings: 0 🟥 Critical: 0 ⏳ Pending Pods: 0 🟡 Waiting: 0 ⚠️ Stuck Pods: 0 ❌ Stuck: 0 📉 Job Failures: 0 🔴 Failed: 0 ------------------------------------------------------------------------------------------ 📊 Pod Distribution: Avg: 22.7 | Max: 29 | Min: 13 | Total Nodes: 6 💾 Resource Usage ------------------------------------------------------------------------------------------ 🖥 CPU Usage: 49.73% 🟩 Normal 💾 Memory Usage: 4.51% 🟩 Normal ------------------------------------------------------------------------------------------ ❌ Errors: 0 ⚠️ Warnings: 0 CFG001 - Orphaned ConfigMaps Total Issues: 20 Message Namespace Resource ------- --------- -------- ConfigMap is not used by any workloads or services. aks-istio-system configmap/istio-asm-1-23 ConfigMap is not used by any workloads or services. aks-istio-system configmap/istio-gateway-status-leader ConfigMap is not used by any workloads or services. aks-istio-system configmap/istio-leader ConfigMap is not used by any workloads or services. aks-istio-system configmap/istio-namespace-controller-election ConfigMap is not used by any workloads or services. aks-istio-system configmap/istio-sidecar-injector-asm-1-23 ConfigMap is not used by any workloads or services. app-routing-system configmap/nginx ConfigMap is not used by any workloads or services. argocd configmap/argocd-notifications-cm ConfigMap is not used by any workloads or services. argocd configmap/argocd-rbac-cm ConfigMap is not used by any workloads or services. kube-system configmap/azure-ip-masq-agent-config-reconciled ConfigMap is not used by any workloads or services. kube-system configmap/cluster-autoscaler-status ConfigMap is not used by any workloads or services. kube-system configmap/container-azm-ms-aks-k8scluster ConfigMap is not used by any workloads or services. kube-system configmap/coredns-autoscaler ConfigMap is not used by any workloads or services. kube-system configmap/eraser-system-exclusion ConfigMap is not used by any workloads or services. kube-system configmap/extension-apiserver-authentication ConfigMap is not used by any workloads or services. kube-system configmap/extension-immutable-values ConfigMap is not used by any workloads or services. kube-system configmap/extensioncontrollerleaderid-lock ConfigMap is not used by any workloads or services. kube-system configmap/konnectivity-agent-autoscaler ConfigMap is not used by any workloads or services. kube-system configmap/kube-apiserver-legacy-service-account-token-tracking ConfigMap is not used by any workloads or services. kube-system configmap/overlay-upgrade-data ConfigMap is not used by any workloads or services. kube-system configmap/retina-config-win Category: Best Practices Severity: Medium Recommendation: Delete unused ConfigMaps to clean up the cluster and reduce confusion. URL: https://kubernetes.io/docs/concepts/configuration/configmap/ CFG002 - Duplicate ConfigMap Names Total Issues: 2 Message ------- Found in namespaces: 1, 10, 2, 3, 4, 5, 6, 7, 8, 9, aks-istio-egress, aks-istio-ingress, aks-istio-system, app-routing-system, argo-rollouts, argo-work… Found in namespaces: 1, 10, 2, 3, 4, 5, 6, 7, 8, 9, aks-istio-egress, aks-istio-ingress, aks-istio-system, app-routing-system, argo-rollouts, argo-work… Category: Best Practices Severity: Medium Recommendation: Avoid using the same ConfigMap name across namespaces to reduce confusion and misconfiguration risk. URL: https://kubernetes.io/docs/concepts/configuration/configmap/ CFG003 - Large ConfigMaps Total Issues: 0 ✅ No issues detected for Large ConfigMaps. Category: Best Practices Severity: Medium Recommendation: Avoid storing large data in ConfigMaps. Consider using PersistentVolumes or Secrets instead. URL: https://kubernetes.io/docs/concepts/configuration/configmap/ EVENT001 - Grouped Warning Events Total Issues: 0 ✅ No issues detected for Grouped Warning Events. Category: Events Severity: medium Recommendation: Check for recurring issues. Investigate sources using `kubectl describe` or logs. URL: https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.28/#event-v1-core EVENT002 - Full Warning Event Log Total Issues: 0 ✅ No issues detected for Full Warning Event Log. Category: Events Severity: medium Recommendation: Review recent warnings. Correlate events with impacted resources. URL: https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.28/#event-v1-core JOB001 - Stuck Kubernetes Jobs Total Issues: 0 ✅ No issues detected for Stuck Kubernetes Jobs. Category: Jobs Severity: medium Recommendation: Jobs that haven't completed may be stuck due to node issues, misconfiguration, or missing pods. URL: https://kubernetes.io/docs/concepts/workloads/controllers/job/#pod-backoff-failure-policy JOB002 - Failed Kubernetes Jobs Total Issues: 0 ✅ No issues detected for Failed Kubernetes Jobs. Category: Jobs Severity: high Recommendation: Review job logs and resource constraints to identify cause of failure. URL: https://kubernetes.io/docs/concepts/workloads/controllers/job/#handling-pod-and-container-failures NET001 - Services Without Endpoints Total Issues: 3 Message Namespace Resource Value ------- --------- -------- ----- No endpoints available kube-system service/extension-agent-metrics-service extension-agent-metrics-service No endpoints available kube-system service/extension-operator-metrics-service extension-operator-metrics-service No endpoints available kube-system service/network-observability network-observability Category: Networking Severity: High Recommendation: Check if the service selector matches any pods. Ensure the backing pods are running and ready. URL: https://kubernetes.io/docs/concepts/services-networking/service/ NET002 - Publicly Accessible Services Total Issues: 4 Message Namespace Resource Value ------- --------- -------- ----- Exposed via external IP: 131.145.32.126 aks-istio-ingress service/aks-istio-ingressgateway-external LoadBalancer Exposed via external IP: 4.250.59.60 app-routing-system service/nginx LoadBalancer Exposed via external IP: 85.210.102.171 pets service/store-front LoadBalancer Exposed via NodePort test service/simple-service NodePort Category: Networking Severity: High Recommendation: Audit services of type LoadBalancer or NodePort. Limit exposure with firewalls or internal IP ranges. URL: https://kubernetes.io/docs/concepts/services-networking/service/#publishing-services NET003 - Ingress Health Validation Total Issues: 0 ✅ No issues detected for Ingress Health Validation. Category: Networking Severity: High Recommendation: Fix invalid ingress definitions including missing TLS secrets, backend services, and path issues. URL: https://kubernetes.io/docs/concepts/services-networking/ingress/ NET004 - Namespace Missing Network Policy Total Issues: 16 Issue Namespace Pods ----- --------- ---- No NetworkPolicy in active namespace aks-istio-ingress 2 No NetworkPolicy in active namespace aks-istio-system 2 No NetworkPolicy in active namespace app-routing-system 2 No NetworkPolicy in active namespace argo-rollouts 1 No NetworkPolicy in active namespace argo-workflows 1 No NetworkPolicy in active namespace cert-manager 1 No NetworkPolicy in active namespace gatekeeper-system 3 No NetworkPolicy in active namespace grafana 1 No NetworkPolicy in active namespace kiali-operator 2 No NetworkPolicy in active namespace kubeview 1 No NetworkPolicy in active namespace linkerd 1 No NetworkPolicy in active namespace nginx 1 No NetworkPolicy in active namespace pets 4 No NetworkPolicy in active namespace prometheus 1 No NetworkPolicy in active namespace sealed-secrets 1 No NetworkPolicy in active namespace test 1 Category: Security Severity: Medium Recommendation: Apply a default deny-all ingress/egress NetworkPolicy in each namespace that hosts workloads, then selectively allow traffic as needed. URL: https://kubernetes.io/docs/concepts/services-networking/network-policies/ NODE001 - Node Readiness and Conditions Total Issues: 0 Node Status Issues ---- ------ ------ aks-systempool-19995743-vmss00000m ✅ Healthy None aks-systempool-19995743-vmss00000n ✅ Healthy None aks-systempool-19995743-vmss00000o ✅ Healthy None aks-workloadpool-10479701-vmss00000e ✅ Healthy None aks-workloadpool-10479701-vmss00000f ✅ Healthy None aks-workloadpool-10479701-vmss00000g ✅ Healthy None Category: Nodes Severity: High Recommendation: Investigate NotReady nodes to avoid workload disruption. URL: https://kubernetes.io/docs/concepts/architecture/nodes/ NODE002 - Node Resource Pressure Total Issues: 2 Node CPU Status CPU % CPU Used CPU Total Mem Status Mem % Mem Used Mem Total Disk % Disk Status ---- ---------- ----- -------- --------- ---------- ----- -------- --------- ------ ----------- aks-systempool-19995743-vmss00000m ✅ Normal 9.26% 176 mC 1900 mC 🟡 Warning 52.17% 3408 Mi 6533 Mi 52% ✅ Normal aks-systempool-19995743-vmss00000n ✅ Normal 8.68% 165 mC 1900 mC 🟡 Warning 50.16% 3277 Mi 6533 Mi 50% ✅ Normal aks-systempool-19995743-vmss00000o ✅ Normal 7.68% 146 mC 1900 mC ✅ Normal 49.17% 3212 Mi 6533 Mi 49% ✅ Normal aks-workloadpool-10479701-vmss00000e ✅ Normal 31.11% 1201 mC 3860 mC ✅ Normal 22.69% 3309 Mi 14584 Mi 22% ✅ Normal aks-workloadpool-10479701-vmss00000f ✅ Normal 30.23% 1167 mC 3860 mC ✅ Normal 16.99% 2478 Mi 14584 Mi 16% ✅ Normal aks-workloadpool-10479701-vmss00000g ✅ Normal 3.68% 142 mC 3860 mC ✅ Normal 14.11% 2058 Mi 14584 Mi 14% ✅ Normal Category: Nodes Severity: Medium Recommendation: Investigate and rebalance workloads on nodes with high resource usage. URL: https://kubernetes.io/docs/tasks/debug/debug-cluster/resource-usage-monitoring/ NS001 - Empty Namespaces Total Issues: 14 Namespace Status --------- ------ 1 📂 Empty 10 📂 Empty 2 📂 Empty 3 📂 Empty 4 📂 Empty 5 📂 Empty 6 📂 Empty 7 📂 Empty 8 📂 Empty 9 📂 Empty aks-istio-egress 📂 Empty default 📂 Empty kube-node-lease 📂 Empty kube-public 📂 Empty Category: Namespaces Severity: low Recommendation: These may be stale or unused and safe to delete after verifying they contain no critical resources. URL: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/ NS002 - Missing or Weak ResourceQuotas Total Issues: 32 Issue Namespace ----- --------- ❌ No ResourceQuota 1 ❌ No ResourceQuota 10 ❌ No ResourceQuota 2 ❌ No ResourceQuota 3 ❌ No ResourceQuota 4 ❌ No ResourceQuota 5 ❌ No ResourceQuota 6 ❌ No ResourceQuota 7 ❌ No ResourceQuota 8 ❌ No ResourceQuota 9 ❌ No ResourceQuota aks-istio-egress ❌ No ResourceQuota aks-istio-ingress ❌ No ResourceQuota aks-istio-system ❌ No ResourceQuota app-routing-system ❌ No ResourceQuota argo-rollouts ❌ No ResourceQuota argo-workflows ❌ No ResourceQuota argocd ❌ No ResourceQuota cert-manager ❌ No ResourceQuota default ❌ No ResourceQuota gatekeeper-system ❌ No ResourceQuota grafana ❌ No ResourceQuota kiali-operator ❌ No ResourceQuota kube-node-lease ❌ No ResourceQuota kube-public ❌ No ResourceQuota kube-system ❌ No ResourceQuota kubeview ❌ No ResourceQuota linkerd ❌ No ResourceQuota nginx ❌ No ResourceQuota pets ❌ No ResourceQuota prometheus ❌ No ResourceQuota sealed-secrets ❌ No ResourceQuota test Category: Namespaces Severity: medium Recommendation: Apply CPU, memory, and pod quotas to enforce fair resource usage. URL: https://kubernetes.io/docs/concepts/policy/resource-quotas/ NS003 - Missing LimitRanges Total Issues: 32 Issue Namespace ----- --------- ❌ No LimitRange 1 ❌ No LimitRange 10 ❌ No LimitRange 2 ❌ No LimitRange 3 ❌ No LimitRange 4 ❌ No LimitRange 5 ❌ No LimitRange 6 ❌ No LimitRange 7 ❌ No LimitRange 8 ❌ No LimitRange 9 ❌ No LimitRange aks-istio-egress ❌ No LimitRange aks-istio-ingress ❌ No LimitRange aks-istio-system ❌ No LimitRange app-routing-system ❌ No LimitRange argo-rollouts ❌ No LimitRange argo-workflows ❌ No LimitRange argocd ❌ No LimitRange cert-manager ❌ No LimitRange default ❌ No LimitRange gatekeeper-system ❌ No LimitRange grafana ❌ No LimitRange kiali-operator ❌ No LimitRange kube-node-lease ❌ No LimitRange kube-public ❌ No LimitRange kube-system ❌ No LimitRange kubeview ❌ No LimitRange linkerd ❌ No LimitRange nginx ❌ No LimitRange pets ❌ No LimitRange prometheus ❌ No LimitRange sealed-secrets ❌ No LimitRange test Category: Namespaces Severity: medium Recommendation: Define default CPU and memory limits to avoid unbounded pod usage. URL: https://kubernetes.io/docs/concepts/policy/limit-range/ POD001 - Pods with High Restarts Total Issues: 0 ✅ No issues detected for Pods with High Restarts. Category: Workloads Severity: Warning Recommendation: Review logs and events for frequently restarting pods and address root causes such as crashes, missing configs, or failing probes. URL: https://kubernetes.io/docs/tasks/debug/debug-application/debug-running-pod/#application-crashes POD002 - Long Running Pods Total Issues: 0 ✅ No issues detected for Long Running Pods. Category: Workloads Severity: Warning Recommendation: Review long-running pods and determine if they should be restarted or replaced by updated deployments. URL: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#pod-phase POD003 - Failed Pods Total Issues: 0 ✅ No issues detected for Failed Pods. Category: Workloads Severity: Error Recommendation: Investigate failed pods for common issues like image errors, resource constraints, or crash loops. URL: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#pod-phase POD004 - Pending Pods Total Issues: 0 ✅ No issues detected for Pending Pods. Category: Workloads Severity: Warning Recommendation: Inspect scheduling constraints, resource availability, and missing dependencies. URL: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#pod-phase POD005 - CrashLoopBackOff Pods Total Issues: 0 ✅ No issues detected for CrashLoopBackOff Pods. Category: Workloads Severity: Error Recommendation: Check logs, investigate container errors, and fix misconfigurations. URL: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#restart-policy POD006 - Leftover Debug Pods Total Issues: 0 ✅ No issues detected for Leftover Debug Pods. Category: Workloads Severity: Warning Recommendation: Delete any leftover debug pods and review your debugging practices. URL: https://kubernetes.io/docs/tasks/debug/debug-cluster/debug-running-pod/ POD007 - Container images do not use latest tag Total Issues: 3 Message Namespace Resource Value ------- --------- -------- ----- Container image uses the 'latest' tag, which can lead to unpredictable deployments. pets pod/order-service-6c5bfb6946-b58xq ghcr.io/azure-samples… Container image uses the 'latest' tag, which can lead to unpredictable deployments. pets pod/product-service-5dd87dfb8-ssfxc ghcr.io/azure-samples… Container image uses the 'latest' tag, which can lead to unpredictable deployments. pets pod/store-front-658994fd95-pk9qn ghcr.io/azure-samples… Category: Resource Management Severity: High Recommendation: Specify an explicit image tag (e.g., ':v1.2.3') to ensure consistent deployments. URL: https://kubernetes.io/docs/concepts/containers/images/#image-tags PVC001 - Unused Persistent Volume Claims Total Issues: 0 ✅ No issues detected for Unused Persistent Volume Claims. Category: Volumes Severity: Medium Recommendation: Review and delete unused PVCs to reclaim storage. URL: https://kubernetes.io/docs/concepts/storage/persistent-volumes/ RBAC001 - RBAC Misconfigurations Total Issues: 10 Message Namespace Resource Value ------- --------- -------- ----- ServiceAccount not found kube-system RoleBinding/system::leader-locking-kube-controller-manager ServiceAccount/kube-controller-manager ServiceAccount not found kube-system RoleBinding/system::leader-locking-kube-scheduler ServiceAccount/kube-scheduler ServiceAccount not found kube-system RoleBinding/system:controller:cloud-provider ServiceAccount/cloud-provider ServiceAccount not found aks-istio-system ClusterRoleBinding/istio-reader-clusterrole-asm-1-23-aks-istio-system ServiceAccount/istio-reader-service-acc… ServiceAccount not found kube-system ClusterRoleBinding/secretproviderrotation-rolebinding ServiceAccount/secrets-store-csi-driver ServiceAccount not found kube-system ClusterRoleBinding/system:azure-cloud-provider ServiceAccount/azure-cloud-provider ServiceAccount not found kube-system ClusterRoleBinding/system:azure-cloud-provider-secret-getter ServiceAccount/azure-cloud-provider ServiceAccount not found kube-system ClusterRoleBinding/system:controller:route-controller ServiceAccount/route-controller ServiceAccount not found kube-system ClusterRoleBinding/system:controller:service-controller ServiceAccount/service-controller ServiceAccount not found kube-system ClusterRoleBinding/system:kube-dns ServiceAccount/kube-dns Category: RBAC Severity: High Recommendation: Fix missing roleRefs, service accounts, and invalid namespaces in RoleBindings and ClusterRoleBindings. URL: https://kubernetes.io/docs/reference/access-authn-authz/rbac/ RBAC002 - RBAC Overexposure Total Issues: 21 Message Namespace Resource Value ------- --------- -------- ----- cluster-admin binding (built-in) 🌍 Cluster-Wide ClusterRoleBinding/aks-cluster-admin-binding User/clusterAdmin cluster-admin binding (built-in) 🌍 Cluster-Wide ClusterRoleBinding/aks-cluster-admin-binding User/clusterUser cluster-admin binding (built-in) 🌍 Cluster-Wide ClusterRoleBinding/aks-cluster-admin-binding-aad Group/e591c663-c79… Access to sensitive resources 🌍 Cluster-Wide ClusterRoleBinding/aks-secretprovidersyncing-rolebinding ServiceAccount/aks… Access to sensitive resources 🌍 Cluster-Wide ClusterRoleBinding/aks-service-rolebinding User/aks-support Wildcard permission role 🌍 Cluster-Wide ClusterRoleBinding/argocd-application-controller ServiceAccount/arg… cluster-admin binding (built-in) 🌍 Cluster-Wide ClusterRoleBinding/cluster-admin Group/system:maste… cluster-admin binding (built-in) 🌍 Cluster-Wide ClusterRoleBinding/extension-operator ServiceAccount/ext… Access to sensitive resources 🌍 Cluster-Wide ClusterRoleBinding/kiali-operator ServiceAccount/kia… Access to sensitive resources (built-in) 🌍 Cluster-Wide ClusterRoleBinding/system:controller:clusterrole-aggregation-controller ServiceAccount/clu… Access to sensitive resources (built-in) 🌍 Cluster-Wide ClusterRoleBinding/system:controller:legacy-service-account-token-cleaner ServiceAccount/leg… Access to sensitive resources (built-in) 🌍 Cluster-Wide ClusterRoleBinding/system:kube-controller-manager User/system:kube-c… Access to sensitive resources (built-in) 🌍 Cluster-Wide ClusterRoleBinding/system:kube-scheduler User/system:kube-s… Access to sensitive resources (built-in) 🌍 Cluster-Wide ClusterRoleBinding/system:persistent-volume-binding ServiceAccount/per… Access to sensitive resources aks-istio-system RoleBinding/istiod-asm-1-23 ServiceAccount/ist… Access to sensitive resources argocd RoleBinding/argocd-redis-ha-haproxy ServiceAccount/arg… Access to sensitive resources argocd RoleBinding/argocd-server ServiceAccount/arg… Access to sensitive resources gatekeeper-system RoleBinding/gatekeeper-manager-rolebinding ServiceAccount/gat… Access to sensitive resources kube-system RoleBinding/azure-policy-webhook-rolebinding ServiceAccount/azu… Access to sensitive resources kube-system RoleBinding/keda-operator-certs ServiceAccount/ked… Access to sensitive resources kube-system RoleBinding/system:controller:token-cleaner ServiceAccount/tok… Category: RBAC Severity: Critical Recommendation: Avoid cluster-admin, wildcard, and sensitive resource access in roles. Use least privilege. URL: https://kubernetes.io/docs/reference/access-authn-authz/rbac/ RBAC003 - Orphaned ServiceAccounts Total Issues: 20 Message Namespace Resource Value ------- --------- -------- ----- ServiceAccount not used by pods or RBAC bindings 1 serviceaccount/default default ServiceAccount not used by pods or RBAC bindings 10 serviceaccount/default default ServiceAccount not used by pods or RBAC bindings 2 serviceaccount/default default ServiceAccount not used by pods or RBAC bindings 3 serviceaccount/default default ServiceAccount not used by pods or RBAC bindings 4 serviceaccount/default default ServiceAccount not used by pods or RBAC bindings 5 serviceaccount/default default ServiceAccount not used by pods or RBAC bindings 6 serviceaccount/default default ServiceAccount not used by pods or RBAC bindings 7 serviceaccount/default default ServiceAccount not used by pods or RBAC bindings 8 serviceaccount/default default ServiceAccount not used by pods or RBAC bindings 9 serviceaccount/default default ServiceAccount not used by pods or RBAC bindings aks-istio-egress serviceaccount/default default ServiceAccount not used by pods or RBAC bindings aks-istio-ingress serviceaccount/default default ServiceAccount not used by pods or RBAC bindings aks-istio-system serviceaccount/default default ServiceAccount not used by pods or RBAC bindings app-routing-system serviceaccount/default default ServiceAccount not used by pods or RBAC bindings argocd serviceaccount/default default ServiceAccount not used by pods or RBAC bindings default serviceaccount/default default ServiceAccount not used by pods or RBAC bindings gatekeeper-system serviceaccount/default default ServiceAccount not used by pods or RBAC bindings kiali-operator serviceaccount/default default ServiceAccount not used by pods or RBAC bindings kube-node-lease serviceaccount/default default ServiceAccount not used by pods or RBAC bindings kube-public serviceaccount/default default Category: RBAC Severity: Medium Recommendation: Clean up unused ServiceAccounts to avoid confusion and reduce RBAC clutter. URL: https://kubernetes.io/docs/reference/access-authn-authz/service-accounts-admin/ RBAC004 - Orphaned and Ineffective Roles Total Issues: 4 Message Namespace Resource Value ------- --------- -------- ----- ClusterRoleBinding has no subjects cluster-wide clusterrolebinding/system:node system:node Unused ClusterRole cluster-wide clusterrole/aks-secretproviderclasses-admin-role aks-secretproviderclasses-admin-role Unused ClusterRole cluster-wide clusterrole/aks-secretproviderclasses-viewer-role aks-secretproviderclasses-viewer-role ClusterRole has no rules cluster-wide clusterrole/eraser-imagejob-pods-cluster-role eraser-imagejob-pods-cluster-role Category: RBAC Severity: Low Recommendation: Delete Roles and ClusterRoles that are not bound or do not define any rules. URL: https://kubernetes.io/docs/reference/access-authn-authz/rbac/ SEC001 - Orphaned Secrets Total Issues: 10 Message Namespace Resource Value ------- --------- -------- ----- Secret appears unused across workloads, ingresses, service accounts, or CRs aks-istio-system secret/istio-ca-secret istio-ca-secret Secret appears unused across workloads, ingresses, service accounts, or CRs argocd secret/argocd-initial-admin-secret argocd-initial-admin-se… Secret appears unused across workloads, ingresses, service accounts, or CRs argocd secret/argocd-notifications-secret argocd-notifications-se… Secret appears unused across workloads, ingresses, service accounts, or CRs argocd secret/argocd-secret argocd-secret Secret appears unused across workloads, ingresses, service accounts, or CRs argocd secret/repo-1114886772 repo-1114886772 Secret appears unused across workloads, ingresses, service accounts, or CRs argocd secret/repo-1952242182 repo-1952242182 Secret appears unused across workloads, ingresses, service accounts, or CRs kube-system secret/aad-msi-auth-token aad-msi-auth-token Secret appears unused across workloads, ingresses, service accounts, or CRs kube-system secret/azure-policy-webhook-cert azure-policy-webhook-ce… Secret appears unused across workloads, ingresses, service accounts, or CRs kube-system secret/extensions-aad-msi-token extensions-aad-msi-token Secret appears unused across workloads, ingresses, service accounts, or CRs kube-system secret/omsagent-aad-msi-token omsagent-aad-msi-token Category: Security Severity: Medium Recommendation: Review and remove unused Secrets to reduce surface area and limit stale credentials. URL: https://kubernetes.io/docs/concepts/configuration/secret/ SEC002 - Pods using hostPID or hostNetwork Total Issues: 36 Message Namespace Resource Value ------- --------- -------- ----- Pod uses hostNetwork kube-system pod/aks-secrets-store-provider-azure-68nhw hostPID=False, hostNetwork=True Pod uses hostNetwork kube-system pod/aks-secrets-store-provider-azure-7bqmn hostPID=False, hostNetwork=True Pod uses hostNetwork kube-system pod/aks-secrets-store-provider-azure-7r458 hostPID=False, hostNetwork=True Pod uses hostNetwork kube-system pod/aks-secrets-store-provider-azure-k9tdc hostPID=False, hostNetwork=True Pod uses hostNetwork kube-system pod/aks-secrets-store-provider-azure-n952g hostPID=False, hostNetwork=True Pod uses hostNetwork kube-system pod/aks-secrets-store-provider-azure-njpqh hostPID=False, hostNetwork=True Pod uses hostNetwork kube-system pod/azure-ip-masq-agent-4522j hostPID=False, hostNetwork=True Pod uses hostNetwork kube-system pod/azure-ip-masq-agent-4c7cr hostPID=False, hostNetwork=True Pod uses hostNetwork kube-system pod/azure-ip-masq-agent-78rnw hostPID=False, hostNetwork=True Pod uses hostNetwork kube-system pod/azure-ip-masq-agent-84ltn hostPID=False, hostNetwork=True Pod uses hostNetwork kube-system pod/azure-ip-masq-agent-t4c2w hostPID=False, hostNetwork=True Pod uses hostNetwork kube-system pod/azure-ip-masq-agent-vbdd8 hostPID=False, hostNetwork=True Pod uses hostNetwork kube-system pod/azure-npm-jsbbh hostPID=False, hostNetwork=True Pod uses hostNetwork kube-system pod/azure-npm-lp6sf hostPID=False, hostNetwork=True Pod uses hostNetwork kube-system pod/azure-npm-nv6xx hostPID=False, hostNetwork=True Pod uses hostNetwork kube-system pod/azure-npm-p6fpw hostPID=False, hostNetwork=True Pod uses hostNetwork kube-system pod/azure-npm-vsrfp hostPID=False, hostNetwork=True Pod uses hostNetwork kube-system pod/azure-npm-z8mcz hostPID=False, hostNetwork=True Pod uses hostNetwork kube-system pod/cloud-node-manager-57rk2 hostPID=False, hostNetwork=True Pod uses hostNetwork kube-system pod/cloud-node-manager-gl5xl hostPID=False, hostNetwork=True Pod uses hostNetwork kube-system pod/cloud-node-manager-l7v5j hostPID=False, hostNetwork=True Pod uses hostNetwork kube-system pod/cloud-node-manager-lr49d hostPID=False, hostNetwork=True Pod uses hostNetwork kube-system pod/cloud-node-manager-n5qdr hostPID=False, hostNetwork=True Pod uses hostNetwork kube-system pod/cloud-node-manager-xwrrd hostPID=False, hostNetwork=True Pod uses hostNetwork kube-system pod/kube-proxy-26xkd hostPID=False, hostNetwork=True Pod uses hostNetwork kube-system pod/kube-proxy-6mrql hostPID=False, hostNetwork=True Pod uses hostNetwork kube-system pod/kube-proxy-9rbxf hostPID=False, hostNetwork=True Pod uses hostNetwork kube-system pod/kube-proxy-njzgk hostPID=False, hostNetwork=True Pod uses hostNetwork kube-system pod/kube-proxy-rvmxl hostPID=False, hostNetwork=True Pod uses hostNetwork kube-system pod/kube-proxy-vp7xj hostPID=False, hostNetwork=True Pod uses hostNetwork kube-system pod/retina-agent-cgv48 hostPID=False, hostNetwork=True Pod uses hostNetwork kube-system pod/retina-agent-gjxk8 hostPID=False, hostNetwork=True Pod uses hostNetwork kube-system pod/retina-agent-js76w hostPID=False, hostNetwork=True Pod uses hostNetwork kube-system pod/retina-agent-lfn7d hostPID=False, hostNetwork=True Pod uses hostNetwork kube-system pod/retina-agent-qc9bs hostPID=False, hostNetwork=True Pod uses hostNetwork kube-system pod/retina-agent-wlt7b hostPID=False, hostNetwork=True Category: Pods Severity: High Recommendation: Avoid using hostPID or hostNetwork unless strictly required. These settings reduce isolation and can expose the host. URL: https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline SEC003 - Pods Running as Root Total Issues: 380 Message Namespace Resource ------- --------- -------- Container runs as root or has no runAsUser set aks-istio-ingress pod/aks-istio-ingressgateway-external-asm-1-23… Container runs as root or has no runAsUser set aks-istio-ingress pod/aks-istio-ingressgateway-external-asm-1-23… Container runs as root or has no runAsUser set aks-istio-ingress pod/aks-istio-ingressgateway-external-asm-1-23… Container runs as root or has no runAsUser set aks-istio-ingress pod/aks-istio-ingressgateway-external-asm-1-23… Container discovery runs as root or has no runAsUser set aks-istio-system pod/istiod-asm-1-23-7744d5fbf4-9572m Container runs as root or has no runAsUser set aks-istio-system pod/istiod-asm-1-23-7744d5fbf4-9572m Container runs as root or has no runAsUser set aks-istio-system pod/istiod-asm-1-23-7744d5fbf4-9572m Container discovery runs as root or has no runAsUser set aks-istio-system pod/istiod-asm-1-23-7744d5fbf4-rqzvt Container runs as root or has no runAsUser set aks-istio-system pod/istiod-asm-1-23-7744d5fbf4-rqzvt Container runs as root or has no runAsUser set aks-istio-system pod/istiod-asm-1-23-7744d5fbf4-rqzvt Container runs as root or has no runAsUser set app-routing-system pod/nginx-69fcb489fd-4wgk9 Container runs as root or has no runAsUser set app-routing-system pod/nginx-69fcb489fd-4wgk9 Container runs as root or has no runAsUser set app-routing-system pod/nginx-69fcb489fd-64v6k Container runs as root or has no runAsUser set app-routing-system pod/nginx-69fcb489fd-64v6k Container webserver-simple runs as root or has no runAsUser set argo-rollouts pod/simple-deployment-74fd649f8d-996vt Container runs as root or has no runAsUser set argo-rollouts pod/simple-deployment-74fd649f8d-996vt Container runs as root or has no runAsUser set argo-rollouts pod/simple-deployment-74fd649f8d-996vt Container webserver-simple runs as root or has no runAsUser set argo-workflows pod/simple-deployment-74fd649f8d-24t56 Container runs as root or has no runAsUser set argo-workflows pod/simple-deployment-74fd649f8d-24t56 Container runs as root or has no runAsUser set argo-workflows pod/simple-deployment-74fd649f8d-24t56 Container argocd-application-controller runs as root or has no runAsUser set argocd pod/argocd-application-controller-0 Container runs as root or has no runAsUser set argocd pod/argocd-application-controller-0 Container runs as root or has no runAsUser set argocd pod/argocd-application-controller-0 Container argocd-applicationset-controller runs as root or has no runAsUser set argocd pod/argocd-applicationset-controller-6fdf84dbb… Container runs as root or has no runAsUser set argocd pod/argocd-applicationset-controller-6fdf84dbb… Container runs as root or has no runAsUser set argocd pod/argocd-applicationset-controller-6fdf84dbb… Container dex runs as root or has no runAsUser set argocd pod/argocd-dex-server-556c76889-h4kxj Container copyutil runs as root or has no runAsUser set argocd pod/argocd-dex-server-556c76889-h4kxj Container runs as root or has no runAsUser set argocd pod/argocd-dex-server-556c76889-h4kxj Container argocd-notifications-controller runs as root or has no runAsUser set argocd pod/argocd-notifications-controller-6ff6bf8dd6… Container runs as root or has no runAsUser set argocd pod/argocd-notifications-controller-6ff6bf8dd6… Container runs as root or has no runAsUser set argocd pod/argocd-notifications-controller-6ff6bf8dd6… Container argocd-repo-server runs as root or has no runAsUser set argocd pod/argocd-repo-server-8568fc89b5-sx6ks Container copyutil runs as root or has no runAsUser set argocd pod/argocd-repo-server-8568fc89b5-sx6ks Container runs as root or has no runAsUser set argocd pod/argocd-repo-server-8568fc89b5-sx6ks Container argocd-repo-server runs as root or has no runAsUser set argocd pod/argocd-repo-server-8568fc89b5-xrzzn Container copyutil runs as root or has no runAsUser set argocd pod/argocd-repo-server-8568fc89b5-xrzzn Container runs as root or has no runAsUser set argocd pod/argocd-repo-server-8568fc89b5-xrzzn Container argocd-server runs as root or has no runAsUser set argocd pod/argocd-server-54f9645b87-k4rz8 Container runs as root or has no runAsUser set argocd pod/argocd-server-54f9645b87-k4rz8 Container runs as root or has no runAsUser set argocd pod/argocd-server-54f9645b87-k4rz8 Container argocd-server runs as root or has no runAsUser set argocd pod/argocd-server-54f9645b87-wwzgz Container runs as root or has no runAsUser set argocd pod/argocd-server-54f9645b87-wwzgz Container runs as root or has no runAsUser set argocd pod/argocd-server-54f9645b87-wwzgz Container webserver-simple runs as root or has no runAsUser set cert-manager pod/simple-deployment-74fd649f8d-7cht8 Container runs as root or has no runAsUser set cert-manager pod/simple-deployment-74fd649f8d-7cht8 Container runs as root or has no runAsUser set cert-manager pod/simple-deployment-74fd649f8d-7cht8 Container runs as root or has no runAsUser set gatekeeper-system pod/gatekeeper-audit-77858c8f69-7k782 Container runs as root or has no runAsUser set gatekeeper-system pod/gatekeeper-audit-77858c8f69-7k782 Container runs as root or has no runAsUser set gatekeeper-system pod/gatekeeper-controller-6f97954b4b-7tbnr Container runs as root or has no runAsUser set gatekeeper-system pod/gatekeeper-controller-6f97954b4b-7tbnr Container runs as root or has no runAsUser set gatekeeper-system pod/gatekeeper-controller-6f97954b4b-gwrgg Container runs as root or has no runAsUser set gatekeeper-system pod/gatekeeper-controller-6f97954b4b-gwrgg Container webserver-simple runs as root or has no runAsUser set grafana pod/simple-deployment-74fd649f8d-l7wrd Container runs as root or has no runAsUser set grafana pod/simple-deployment-74fd649f8d-l7wrd Container runs as root or has no runAsUser set grafana pod/simple-deployment-74fd649f8d-l7wrd Container kiali runs as root or has no runAsUser set kiali-operator pod/kiali-5b88cfb6f8-cm8dz Container runs as root or has no runAsUser set kiali-operator pod/kiali-5b88cfb6f8-cm8dz Container runs as root or has no runAsUser set kiali-operator pod/kiali-5b88cfb6f8-cm8dz Container operator runs as root or has no runAsUser set kiali-operator pod/kiali-operator-696bd54db-mr8md Container runs as root or has no runAsUser set kiali-operator pod/kiali-operator-696bd54db-mr8md Container runs as root or has no runAsUser set kiali-operator pod/kiali-operator-696bd54db-mr8md Container node-driver-registrar runs as root or has no runAsUser set kube-system pod/aks-secrets-store-csi-driver-2l2wl Container secrets-store runs as root or has no runAsUser set kube-system pod/aks-secrets-store-csi-driver-2l2wl Container liveness-probe runs as root or has no runAsUser set kube-system pod/aks-secrets-store-csi-driver-2l2wl Container runs as root or has no runAsUser set kube-system pod/aks-secrets-store-csi-driver-2l2wl Container runs as root or has no runAsUser set kube-system pod/aks-secrets-store-csi-driver-2l2wl Container node-driver-registrar runs as root or has no runAsUser set kube-system pod/aks-secrets-store-csi-driver-6w2vp Container secrets-store runs as root or has no runAsUser set kube-system pod/aks-secrets-store-csi-driver-6w2vp Container liveness-probe runs as root or has no runAsUser set kube-system pod/aks-secrets-store-csi-driver-6w2vp Container runs as root or has no runAsUser set kube-system pod/aks-secrets-store-csi-driver-6w2vp Container runs as root or has no runAsUser set kube-system pod/aks-secrets-store-csi-driver-6w2vp Container node-driver-registrar runs as root or has no runAsUser set kube-system pod/aks-secrets-store-csi-driver-7879c Container secrets-store runs as root or has no runAsUser set kube-system pod/aks-secrets-store-csi-driver-7879c Container liveness-probe runs as root or has no runAsUser set kube-system pod/aks-secrets-store-csi-driver-7879c Container runs as root or has no runAsUser set kube-system pod/aks-secrets-store-csi-driver-7879c Container runs as root or has no runAsUser set kube-system pod/aks-secrets-store-csi-driver-7879c Container node-driver-registrar runs as root or has no runAsUser set kube-system pod/aks-secrets-store-csi-driver-m8m29 Container secrets-store runs as root or has no runAsUser set kube-system pod/aks-secrets-store-csi-driver-m8m29 Container liveness-probe runs as root or has no runAsUser set kube-system pod/aks-secrets-store-csi-driver-m8m29 Container runs as root or has no runAsUser set kube-system pod/aks-secrets-store-csi-driver-m8m29 Container runs as root or has no runAsUser set kube-system pod/aks-secrets-store-csi-driver-m8m29 Container node-driver-registrar runs as root or has no runAsUser set kube-system pod/aks-secrets-store-csi-driver-vnmcd Container secrets-store runs as root or has no runAsUser set kube-system pod/aks-secrets-store-csi-driver-vnmcd Container liveness-probe runs as root or has no runAsUser set kube-system pod/aks-secrets-store-csi-driver-vnmcd Container runs as root or has no runAsUser set kube-system pod/aks-secrets-store-csi-driver-vnmcd Container runs as root or has no runAsUser set kube-system pod/aks-secrets-store-csi-driver-vnmcd Container node-driver-registrar runs as root or has no runAsUser set kube-system pod/aks-secrets-store-csi-driver-zrfbz Container secrets-store runs as root or has no runAsUser set kube-system pod/aks-secrets-store-csi-driver-zrfbz Container liveness-probe runs as root or has no runAsUser set kube-system pod/aks-secrets-store-csi-driver-zrfbz Container runs as root or has no runAsUser set kube-system pod/aks-secrets-store-csi-driver-zrfbz Container runs as root or has no runAsUser set kube-system pod/aks-secrets-store-csi-driver-zrfbz Container provider-azure-installer runs as root or has no runAsUser set kube-system pod/aks-secrets-store-provider-azure-68nhw Container runs as root or has no runAsUser set kube-system pod/aks-secrets-store-provider-azure-68nhw Container runs as root or has no runAsUser set kube-system pod/aks-secrets-store-provider-azure-68nhw Container provider-azure-installer runs as root or has no runAsUser set kube-system pod/aks-secrets-store-provider-azure-7bqmn Container runs as root or has no runAsUser set kube-system pod/aks-secrets-store-provider-azure-7bqmn Container runs as root or has no runAsUser set kube-system pod/aks-secrets-store-provider-azure-7bqmn Container provider-azure-installer runs as root or has no runAsUser set kube-system pod/aks-secrets-store-provider-azure-7r458 Container runs as root or has no runAsUser set kube-system pod/aks-secrets-store-provider-azure-7r458 Container runs as root or has no runAsUser set kube-system pod/aks-secrets-store-provider-azure-7r458 Container provider-azure-installer runs as root or has no runAsUser set kube-system pod/aks-secrets-store-provider-azure-k9tdc Container runs as root or has no runAsUser set kube-system pod/aks-secrets-store-provider-azure-k9tdc Container runs as root or has no runAsUser set kube-system pod/aks-secrets-store-provider-azure-k9tdc Container provider-azure-installer runs as root or has no runAsUser set kube-system pod/aks-secrets-store-provider-azure-n952g Container runs as root or has no runAsUser set kube-system pod/aks-secrets-store-provider-azure-n952g Container runs as root or has no runAsUser set kube-system pod/aks-secrets-store-provider-azure-n952g Container provider-azure-installer runs as root or has no runAsUser set kube-system pod/aks-secrets-store-provider-azure-njpqh Container runs as root or has no runAsUser set kube-system pod/aks-secrets-store-provider-azure-njpqh Container runs as root or has no runAsUser set kube-system pod/aks-secrets-store-provider-azure-njpqh Container ama-logs runs as root or has no runAsUser set kube-system pod/ama-logs-4v8mz Container ama-logs-prometheus runs as root or has no runAsUser set kube-system pod/ama-logs-4v8mz Container runs as root or has no runAsUser set kube-system pod/ama-logs-4v8mz Container runs as root or has no runAsUser set kube-system pod/ama-logs-4v8mz Container ama-logs runs as root or has no runAsUser set kube-system pod/ama-logs-5vr2w Container ama-logs-prometheus runs as root or has no runAsUser set kube-system pod/ama-logs-5vr2w Container runs as root or has no runAsUser set kube-system pod/ama-logs-5vr2w Container runs as root or has no runAsUser set kube-system pod/ama-logs-5vr2w Container ama-logs runs as root or has no runAsUser set kube-system pod/ama-logs-fmd7b Container ama-logs-prometheus runs as root or has no runAsUser set kube-system pod/ama-logs-fmd7b Container runs as root or has no runAsUser set kube-system pod/ama-logs-fmd7b Container runs as root or has no runAsUser set kube-system pod/ama-logs-fmd7b Container ama-logs runs as root or has no runAsUser set kube-system pod/ama-logs-fpkw6 Container ama-logs-prometheus runs as root or has no runAsUser set kube-system pod/ama-logs-fpkw6 Container runs as root or has no runAsUser set kube-system pod/ama-logs-fpkw6 Container runs as root or has no runAsUser set kube-system pod/ama-logs-fpkw6 Container ama-logs runs as root or has no runAsUser set kube-system pod/ama-logs-gqs28 Container ama-logs-prometheus runs as root or has no runAsUser set kube-system pod/ama-logs-gqs28 Container runs as root or has no runAsUser set kube-system pod/ama-logs-gqs28 Container runs as root or has no runAsUser set kube-system pod/ama-logs-gqs28 Container ama-logs runs as root or has no runAsUser set kube-system pod/ama-logs-ndxrw Container ama-logs-prometheus runs as root or has no runAsUser set kube-system pod/ama-logs-ndxrw Container runs as root or has no runAsUser set kube-system pod/ama-logs-ndxrw Container runs as root or has no runAsUser set kube-system pod/ama-logs-ndxrw Container ama-logs runs as root or has no runAsUser set kube-system pod/ama-logs-rs-64765bd4b9-ldxwl Container runs as root or has no runAsUser set kube-system pod/ama-logs-rs-64765bd4b9-ldxwl Container runs as root or has no runAsUser set kube-system pod/ama-logs-rs-64765bd4b9-ldxwl Container prometheus-collector runs as root or has no runAsUser set kube-system pod/ama-metrics-7f878d975f-hlggb Container addon-token-adapter runs as root or has no runAsUser set kube-system pod/ama-metrics-7f878d975f-hlggb Container runs as root or has no runAsUser set kube-system pod/ama-metrics-7f878d975f-hlggb Container runs as root or has no runAsUser set kube-system pod/ama-metrics-7f878d975f-hlggb Container prometheus-collector runs as root or has no runAsUser set kube-system pod/ama-metrics-7f878d975f-q2mlg Container addon-token-adapter runs as root or has no runAsUser set kube-system pod/ama-metrics-7f878d975f-q2mlg Container runs as root or has no runAsUser set kube-system pod/ama-metrics-7f878d975f-q2mlg Container runs as root or has no runAsUser set kube-system pod/ama-metrics-7f878d975f-q2mlg Container prometheus-collector runs as root or has no runAsUser set kube-system pod/ama-metrics-node-2ssrw Container addon-token-adapter runs as root or has no runAsUser set kube-system pod/ama-metrics-node-2ssrw Container runs as root or has no runAsUser set kube-system pod/ama-metrics-node-2ssrw Container runs as root or has no runAsUser set kube-system pod/ama-metrics-node-2ssrw Container prometheus-collector runs as root or has no runAsUser set kube-system pod/ama-metrics-node-6kkz8 Container addon-token-adapter runs as root or has no runAsUser set kube-system pod/ama-metrics-node-6kkz8 Container runs as root or has no runAsUser set kube-system pod/ama-metrics-node-6kkz8 Container runs as root or has no runAsUser set kube-system pod/ama-metrics-node-6kkz8 Container prometheus-collector runs as root or has no runAsUser set kube-system pod/ama-metrics-node-9h44h Container addon-token-adapter runs as root or has no runAsUser set kube-system pod/ama-metrics-node-9h44h Container runs as root or has no runAsUser set kube-system pod/ama-metrics-node-9h44h Container runs as root or has no runAsUser set kube-system pod/ama-metrics-node-9h44h Container prometheus-collector runs as root or has no runAsUser set kube-system pod/ama-metrics-node-lhk42 Container addon-token-adapter runs as root or has no runAsUser set kube-system pod/ama-metrics-node-lhk42 Container runs as root or has no runAsUser set kube-system pod/ama-metrics-node-lhk42 Container runs as root or has no runAsUser set kube-system pod/ama-metrics-node-lhk42 Container prometheus-collector runs as root or has no runAsUser set kube-system pod/ama-metrics-node-nm5bf Container addon-token-adapter runs as root or has no runAsUser set kube-system pod/ama-metrics-node-nm5bf Container runs as root or has no runAsUser set kube-system pod/ama-metrics-node-nm5bf Container runs as root or has no runAsUser set kube-system pod/ama-metrics-node-nm5bf Container prometheus-collector runs as root or has no runAsUser set kube-system pod/ama-metrics-node-pqcz5 Container addon-token-adapter runs as root or has no runAsUser set kube-system pod/ama-metrics-node-pqcz5 Container runs as root or has no runAsUser set kube-system pod/ama-metrics-node-pqcz5 Container runs as root or has no runAsUser set kube-system pod/ama-metrics-node-pqcz5 Container targetallocator runs as root or has no runAsUser set kube-system pod/ama-metrics-operator-targets-66fb46c8d6-vs… Container config-reader runs as root or has no runAsUser set kube-system pod/ama-metrics-operator-targets-66fb46c8d6-vs… Container runs as root or has no runAsUser set kube-system pod/ama-metrics-operator-targets-66fb46c8d6-vs… Container runs as root or has no runAsUser set kube-system pod/ama-metrics-operator-targets-66fb46c8d6-vs… Container azure-ip-masq-agent runs as root or has no runAsUser set kube-system pod/azure-ip-masq-agent-4522j Container runs as root or has no runAsUser set kube-system pod/azure-ip-masq-agent-4522j Container runs as root or has no runAsUser set kube-system pod/azure-ip-masq-agent-4522j Container azure-ip-masq-agent runs as root or has no runAsUser set kube-system pod/azure-ip-masq-agent-4c7cr Container runs as root or has no runAsUser set kube-system pod/azure-ip-masq-agent-4c7cr Container runs as root or has no runAsUser set kube-system pod/azure-ip-masq-agent-4c7cr Container azure-ip-masq-agent runs as root or has no runAsUser set kube-system pod/azure-ip-masq-agent-78rnw Container runs as root or has no runAsUser set kube-system pod/azure-ip-masq-agent-78rnw Container runs as root or has no runAsUser set kube-system pod/azure-ip-masq-agent-78rnw Container azure-ip-masq-agent runs as root or has no runAsUser set kube-system pod/azure-ip-masq-agent-84ltn Container runs as root or has no runAsUser set kube-system pod/azure-ip-masq-agent-84ltn Container runs as root or has no runAsUser set kube-system pod/azure-ip-masq-agent-84ltn Container azure-ip-masq-agent runs as root or has no runAsUser set kube-system pod/azure-ip-masq-agent-t4c2w Container runs as root or has no runAsUser set kube-system pod/azure-ip-masq-agent-t4c2w Container runs as root or has no runAsUser set kube-system pod/azure-ip-masq-agent-t4c2w Container azure-ip-masq-agent runs as root or has no runAsUser set kube-system pod/azure-ip-masq-agent-vbdd8 Container runs as root or has no runAsUser set kube-system pod/azure-ip-masq-agent-vbdd8 Container runs as root or has no runAsUser set kube-system pod/azure-ip-masq-agent-vbdd8 Container azure-npm runs as root or has no runAsUser set kube-system pod/azure-npm-jsbbh Container block-wireserver runs as root or has no runAsUser set kube-system pod/azure-npm-jsbbh Container runs as root or has no runAsUser set kube-system pod/azure-npm-jsbbh Container azure-npm runs as root or has no runAsUser set kube-system pod/azure-npm-lp6sf Container block-wireserver runs as root or has no runAsUser set kube-system pod/azure-npm-lp6sf Container runs as root or has no runAsUser set kube-system pod/azure-npm-lp6sf Container azure-npm runs as root or has no runAsUser set kube-system pod/azure-npm-nv6xx Container block-wireserver runs as root or has no runAsUser set kube-system pod/azure-npm-nv6xx Container runs as root or has no runAsUser set kube-system pod/azure-npm-nv6xx Container azure-npm runs as root or has no runAsUser set kube-system pod/azure-npm-p6fpw Container block-wireserver runs as root or has no runAsUser set kube-system pod/azure-npm-p6fpw Container runs as root or has no runAsUser set kube-system pod/azure-npm-p6fpw Container azure-npm runs as root or has no runAsUser set kube-system pod/azure-npm-vsrfp Container block-wireserver runs as root or has no runAsUser set kube-system pod/azure-npm-vsrfp Container runs as root or has no runAsUser set kube-system pod/azure-npm-vsrfp Container azure-npm runs as root or has no runAsUser set kube-system pod/azure-npm-z8mcz Container block-wireserver runs as root or has no runAsUser set kube-system pod/azure-npm-z8mcz Container runs as root or has no runAsUser set kube-system pod/azure-npm-z8mcz Container azure-policy runs as root or has no runAsUser set kube-system pod/azure-policy-698f7c86b4-nnff2 Container runs as root or has no runAsUser set kube-system pod/azure-policy-698f7c86b4-nnff2 Container runs as root or has no runAsUser set kube-system pod/azure-policy-698f7c86b4-nnff2 Container runs as root or has no runAsUser set kube-system pod/azure-policy-webhook-764fdf5cd5-6vrc5 Container runs as root or has no runAsUser set kube-system pod/azure-policy-webhook-764fdf5cd5-6vrc5 Container runs as root or has no runAsUser set kube-system pod/azure-wi-webhook-controller-manager-7f95f6… Container runs as root or has no runAsUser set kube-system pod/azure-wi-webhook-controller-manager-7f95f6… Container runs as root or has no runAsUser set kube-system pod/azure-wi-webhook-controller-manager-7f95f6… Container runs as root or has no runAsUser set kube-system pod/azure-wi-webhook-controller-manager-7f95f6… Container cloud-node-manager runs as root or has no runAsUser set kube-system pod/cloud-node-manager-57rk2 Container runs as root or has no runAsUser set kube-system pod/cloud-node-manager-57rk2 Container runs as root or has no runAsUser set kube-system pod/cloud-node-manager-57rk2 Container cloud-node-manager runs as root or has no runAsUser set kube-system pod/cloud-node-manager-gl5xl Container runs as root or has no runAsUser set kube-system pod/cloud-node-manager-gl5xl Container runs as root or has no runAsUser set kube-system pod/cloud-node-manager-gl5xl Container cloud-node-manager runs as root or has no runAsUser set kube-system pod/cloud-node-manager-l7v5j Container runs as root or has no runAsUser set kube-system pod/cloud-node-manager-l7v5j Container runs as root or has no runAsUser set kube-system pod/cloud-node-manager-l7v5j Container cloud-node-manager runs as root or has no runAsUser set kube-system pod/cloud-node-manager-lr49d Container runs as root or has no runAsUser set kube-system pod/cloud-node-manager-lr49d Container runs as root or has no runAsUser set kube-system pod/cloud-node-manager-lr49d Container cloud-node-manager runs as root or has no runAsUser set kube-system pod/cloud-node-manager-n5qdr Container runs as root or has no runAsUser set kube-system pod/cloud-node-manager-n5qdr Container runs as root or has no runAsUser set kube-system pod/cloud-node-manager-n5qdr Container cloud-node-manager runs as root or has no runAsUser set kube-system pod/cloud-node-manager-xwrrd Container runs as root or has no runAsUser set kube-system pod/cloud-node-manager-xwrrd Container runs as root or has no runAsUser set kube-system pod/cloud-node-manager-xwrrd Container coredns runs as root or has no runAsUser set kube-system pod/coredns-658d6d767d-757xp Container runs as root or has no runAsUser set kube-system pod/coredns-658d6d767d-757xp Container runs as root or has no runAsUser set kube-system pod/coredns-658d6d767d-757xp Container coredns runs as root or has no runAsUser set kube-system pod/coredns-658d6d767d-pt6l6 Container runs as root or has no runAsUser set kube-system pod/coredns-658d6d767d-pt6l6 Container runs as root or has no runAsUser set kube-system pod/coredns-658d6d767d-pt6l6 Container autoscaler runs as root or has no runAsUser set kube-system pod/coredns-autoscaler-5955d6bbdb-mz9kn Container runs as root or has no runAsUser set kube-system pod/coredns-autoscaler-5955d6bbdb-mz9kn Container runs as root or has no runAsUser set kube-system pod/coredns-autoscaler-5955d6bbdb-mz9kn Container runs as root or has no runAsUser set kube-system pod/eraser-controller-manager-864f9476c8-lhdfc Container runs as root or has no runAsUser set kube-system pod/eraser-controller-manager-864f9476c8-lhdfc Container extension-agent runs as root or has no runAsUser set kube-system pod/extension-agent-66c4486d68-46cqq Container fluent-bit runs as root or has no runAsUser set kube-system pod/extension-agent-66c4486d68-46cqq Container runs as root or has no runAsUser set kube-system pod/extension-agent-66c4486d68-46cqq Container runs as root or has no runAsUser set kube-system pod/extension-agent-66c4486d68-46cqq Container manager runs as root or has no runAsUser set kube-system pod/extension-operator-d95fd449b-ssrcx Container fluent-bit runs as root or has no runAsUser set kube-system pod/extension-operator-d95fd449b-ssrcx Container runs as root or has no runAsUser set kube-system pod/extension-operator-d95fd449b-ssrcx Container runs as root or has no runAsUser set kube-system pod/extension-operator-d95fd449b-ssrcx Container konnectivity-agent runs as root or has no runAsUser set kube-system pod/konnectivity-agent-9f65c5cd8-fzm5q Container runs as root or has no runAsUser set kube-system pod/konnectivity-agent-9f65c5cd8-fzm5q Container runs as root or has no runAsUser set kube-system pod/konnectivity-agent-9f65c5cd8-fzm5q Container konnectivity-agent runs as root or has no runAsUser set kube-system pod/konnectivity-agent-9f65c5cd8-t9qdj Container runs as root or has no runAsUser set kube-system pod/konnectivity-agent-9f65c5cd8-t9qdj Container runs as root or has no runAsUser set kube-system pod/konnectivity-agent-9f65c5cd8-t9qdj Container autoscaler runs as root or has no runAsUser set kube-system pod/konnectivity-agent-autoscaler-cdfc7c46-vct… Container runs as root or has no runAsUser set kube-system pod/konnectivity-agent-autoscaler-cdfc7c46-vct… Container runs as root or has no runAsUser set kube-system pod/konnectivity-agent-autoscaler-cdfc7c46-vct… Container kube-proxy runs as root or has no runAsUser set kube-system pod/kube-proxy-26xkd Container kube-proxy-bootstrap runs as root or has no runAsUser set kube-system pod/kube-proxy-26xkd Container runs as root or has no runAsUser set kube-system pod/kube-proxy-26xkd Container kube-proxy runs as root or has no runAsUser set kube-system pod/kube-proxy-6mrql Container kube-proxy-bootstrap runs as root or has no runAsUser set kube-system pod/kube-proxy-6mrql Container runs as root or has no runAsUser set kube-system pod/kube-proxy-6mrql Container kube-proxy runs as root or has no runAsUser set kube-system pod/kube-proxy-9rbxf Container kube-proxy-bootstrap runs as root or has no runAsUser set kube-system pod/kube-proxy-9rbxf Container runs as root or has no runAsUser set kube-system pod/kube-proxy-9rbxf Container kube-proxy runs as root or has no runAsUser set kube-system pod/kube-proxy-njzgk Container kube-proxy-bootstrap runs as root or has no runAsUser set kube-system pod/kube-proxy-njzgk Container runs as root or has no runAsUser set kube-system pod/kube-proxy-njzgk Container kube-proxy runs as root or has no runAsUser set kube-system pod/kube-proxy-rvmxl Container kube-proxy-bootstrap runs as root or has no runAsUser set kube-system pod/kube-proxy-rvmxl Container runs as root or has no runAsUser set kube-system pod/kube-proxy-rvmxl Container kube-proxy runs as root or has no runAsUser set kube-system pod/kube-proxy-vp7xj Container kube-proxy-bootstrap runs as root or has no runAsUser set kube-system pod/kube-proxy-vp7xj Container runs as root or has no runAsUser set kube-system pod/kube-proxy-vp7xj Container runs as root or has no runAsUser set kube-system pod/metrics-server-5f9ccffcc4-jsrjl Container runs as root or has no runAsUser set kube-system pod/metrics-server-5f9ccffcc4-jsrjl Container runs as root or has no runAsUser set kube-system pod/metrics-server-5f9ccffcc4-v88pw Container runs as root or has no runAsUser set kube-system pod/metrics-server-5f9ccffcc4-v88pw Container microsoft-defender-pod-collector runs as root or has no runAsUser set kube-system pod/microsoft-defender-collector-ds-6xdfq Container microsoft-defender-low-level-collector runs as root or has no runAsUser set kube-system pod/microsoft-defender-collector-ds-6xdfq Container runs as root or has no runAsUser set kube-system pod/microsoft-defender-collector-ds-6xdfq Container runs as root or has no runAsUser set kube-system pod/microsoft-defender-collector-ds-6xdfq Container microsoft-defender-pod-collector runs as root or has no runAsUser set kube-system pod/microsoft-defender-collector-ds-89l74 Container microsoft-defender-low-level-collector runs as root or has no runAsUser set kube-system pod/microsoft-defender-collector-ds-89l74 Container runs as root or has no runAsUser set kube-system pod/microsoft-defender-collector-ds-89l74 Container runs as root or has no runAsUser set kube-system pod/microsoft-defender-collector-ds-89l74 Container microsoft-defender-pod-collector runs as root or has no runAsUser set kube-system pod/microsoft-defender-collector-ds-d7gwk Container microsoft-defender-low-level-collector runs as root or has no runAsUser set kube-system pod/microsoft-defender-collector-ds-d7gwk Container runs as root or has no runAsUser set kube-system pod/microsoft-defender-collector-ds-d7gwk Container runs as root or has no runAsUser set kube-system pod/microsoft-defender-collector-ds-d7gwk Container microsoft-defender-pod-collector runs as root or has no runAsUser set kube-system pod/microsoft-defender-collector-ds-mdcs8 Container microsoft-defender-low-level-collector runs as root or has no runAsUser set kube-system pod/microsoft-defender-collector-ds-mdcs8 Container runs as root or has no runAsUser set kube-system pod/microsoft-defender-collector-ds-mdcs8 Container runs as root or has no runAsUser set kube-system pod/microsoft-defender-collector-ds-mdcs8 Container microsoft-defender-pod-collector runs as root or has no runAsUser set kube-system pod/microsoft-defender-collector-ds-q6d6c Container microsoft-defender-low-level-collector runs as root or has no runAsUser set kube-system pod/microsoft-defender-collector-ds-q6d6c Container runs as root or has no runAsUser set kube-system pod/microsoft-defender-collector-ds-q6d6c Container runs as root or has no runAsUser set kube-system pod/microsoft-defender-collector-ds-q6d6c Container microsoft-defender-pod-collector runs as root or has no runAsUser set kube-system pod/microsoft-defender-collector-ds-wb5dm Container microsoft-defender-low-level-collector runs as root or has no runAsUser set kube-system pod/microsoft-defender-collector-ds-wb5dm Container runs as root or has no runAsUser set kube-system pod/microsoft-defender-collector-ds-wb5dm Container runs as root or has no runAsUser set kube-system pod/microsoft-defender-collector-ds-wb5dm Container microsoft-defender-pod-collector runs as root or has no runAsUser set kube-system pod/microsoft-defender-collector-misc-7df67764… Container runs as root or has no runAsUser set kube-system pod/microsoft-defender-collector-misc-7df67764… Container runs as root or has no runAsUser set kube-system pod/microsoft-defender-collector-misc-7df67764… Container microsoft-defender-publisher runs as root or has no runAsUser set kube-system pod/microsoft-defender-publisher-ds-2ql5b Container old-file-cleaner runs as root or has no runAsUser set kube-system pod/microsoft-defender-publisher-ds-2ql5b Container runs as root or has no runAsUser set kube-system pod/microsoft-defender-publisher-ds-2ql5b Container microsoft-defender-publisher runs as root or has no runAsUser set kube-system pod/microsoft-defender-publisher-ds-2rsrw Container old-file-cleaner runs as root or has no runAsUser set kube-system pod/microsoft-defender-publisher-ds-2rsrw Container runs as root or has no runAsUser set kube-system pod/microsoft-defender-publisher-ds-2rsrw Container microsoft-defender-publisher runs as root or has no runAsUser set kube-system pod/microsoft-defender-publisher-ds-jj6dh Container old-file-cleaner runs as root or has no runAsUser set kube-system pod/microsoft-defender-publisher-ds-jj6dh Container runs as root or has no runAsUser set kube-system pod/microsoft-defender-publisher-ds-jj6dh Container microsoft-defender-publisher runs as root or has no runAsUser set kube-system pod/microsoft-defender-publisher-ds-l5crs Container old-file-cleaner runs as root or has no runAsUser set kube-system pod/microsoft-defender-publisher-ds-l5crs Container runs as root or has no runAsUser set kube-system pod/microsoft-defender-publisher-ds-l5crs Container microsoft-defender-publisher runs as root or has no runAsUser set kube-system pod/microsoft-defender-publisher-ds-lfk8h Container old-file-cleaner runs as root or has no runAsUser set kube-system pod/microsoft-defender-publisher-ds-lfk8h Container runs as root or has no runAsUser set kube-system pod/microsoft-defender-publisher-ds-lfk8h Container microsoft-defender-publisher runs as root or has no runAsUser set kube-system pod/microsoft-defender-publisher-ds-vz2c6 Container old-file-cleaner runs as root or has no runAsUser set kube-system pod/microsoft-defender-publisher-ds-vz2c6 Container runs as root or has no runAsUser set kube-system pod/microsoft-defender-publisher-ds-vz2c6 Container retina runs as root or has no runAsUser set kube-system pod/retina-agent-cgv48 Container retina-agent-init runs as root or has no runAsUser set kube-system pod/retina-agent-cgv48 Container runs as root or has no runAsUser set kube-system pod/retina-agent-cgv48 Container retina runs as root or has no runAsUser set kube-system pod/retina-agent-gjxk8 Container retina-agent-init runs as root or has no runAsUser set kube-system pod/retina-agent-gjxk8 Container runs as root or has no runAsUser set kube-system pod/retina-agent-gjxk8 Container retina runs as root or has no runAsUser set kube-system pod/retina-agent-js76w Container retina-agent-init runs as root or has no runAsUser set kube-system pod/retina-agent-js76w Container runs as root or has no runAsUser set kube-system pod/retina-agent-js76w Container retina runs as root or has no runAsUser set kube-system pod/retina-agent-lfn7d Container retina-agent-init runs as root or has no runAsUser set kube-system pod/retina-agent-lfn7d Container runs as root or has no runAsUser set kube-system pod/retina-agent-lfn7d Container retina runs as root or has no runAsUser set kube-system pod/retina-agent-qc9bs Container retina-agent-init runs as root or has no runAsUser set kube-system pod/retina-agent-qc9bs Container runs as root or has no runAsUser set kube-system pod/retina-agent-qc9bs Container retina runs as root or has no runAsUser set kube-system pod/retina-agent-wlt7b Container retina-agent-init runs as root or has no runAsUser set kube-system pod/retina-agent-wlt7b Container runs as root or has no runAsUser set kube-system pod/retina-agent-wlt7b Container webserver-simple runs as root or has no runAsUser set kubeview pod/simple-deployment-74fd649f8d-qxp2r Container runs as root or has no runAsUser set kubeview pod/simple-deployment-74fd649f8d-qxp2r Container runs as root or has no runAsUser set kubeview pod/simple-deployment-74fd649f8d-qxp2r Container webserver-simple runs as root or has no runAsUser set linkerd pod/simple-deployment-74fd649f8d-mkmst Container runs as root or has no runAsUser set linkerd pod/simple-deployment-74fd649f8d-mkmst Container runs as root or has no runAsUser set linkerd pod/simple-deployment-74fd649f8d-mkmst Container webserver-simple runs as root or has no runAsUser set nginx pod/simple-deployment-74fd649f8d-hlcdk Container runs as root or has no runAsUser set nginx pod/simple-deployment-74fd649f8d-hlcdk Container runs as root or has no runAsUser set nginx pod/simple-deployment-74fd649f8d-hlcdk Container order-service runs as root or has no runAsUser set pets pod/order-service-6c5bfb6946-b58xq Container wait-for-rabbitmq runs as root or has no runAsUser set pets pod/order-service-6c5bfb6946-b58xq Container istio-init runs as root or has no runAsUser set pets pod/order-service-6c5bfb6946-b58xq Container runs as root or has no runAsUser set pets pod/order-service-6c5bfb6946-b58xq Container product-service runs as root or has no runAsUser set pets pod/product-service-5dd87dfb8-ssfxc Container istio-init runs as root or has no runAsUser set pets pod/product-service-5dd87dfb8-ssfxc Container runs as root or has no runAsUser set pets pod/product-service-5dd87dfb8-ssfxc Container rabbitmq runs as root or has no runAsUser set pets pod/rabbitmq-0 Container istio-init runs as root or has no runAsUser set pets pod/rabbitmq-0 Container runs as root or has no runAsUser set pets pod/rabbitmq-0 Container store-front runs as root or has no runAsUser set pets pod/store-front-658994fd95-pk9qn Container istio-init runs as root or has no runAsUser set pets pod/store-front-658994fd95-pk9qn Container runs as root or has no runAsUser set pets pod/store-front-658994fd95-pk9qn Container webserver-simple runs as root or has no runAsUser set prometheus pod/simple-deployment-74fd649f8d-2x6w5 Container runs as root or has no runAsUser set prometheus pod/simple-deployment-74fd649f8d-2x6w5 Container runs as root or has no runAsUser set prometheus pod/simple-deployment-74fd649f8d-2x6w5 Container webserver-simple runs as root or has no runAsUser set sealed-secrets pod/simple-deployment-74fd649f8d-stktp Container runs as root or has no runAsUser set sealed-secrets pod/simple-deployment-74fd649f8d-stktp Container runs as root or has no runAsUser set sealed-secrets pod/simple-deployment-74fd649f8d-stktp Container webserver-simple runs as root or has no runAsUser set test pod/simple-deployment-74fd649f8d-lhlkx Container runs as root or has no runAsUser set test pod/simple-deployment-74fd649f8d-lhlkx Container runs as root or has no runAsUser set test pod/simple-deployment-74fd649f8d-lhlkx Category: Pod Security Severity: High Recommendation: Avoid running pods as root by explicitly setting runAsUser to a non-zero UID in pod or container securityContext. URL: https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline SEC004 - Privileged Containers Total Issues: 37 Message Namespace Resource Value ------- --------- -------- ----- Container 'secrets-store' is running in privileged mode kube-system pod/aks-secrets-store-csi-driver-2l2wl privileged=true Container 'secrets-store' is running in privileged mode kube-system pod/aks-secrets-store-csi-driver-6w2vp privileged=true Container 'secrets-store' is running in privileged mode kube-system pod/aks-secrets-store-csi-driver-7879c privileged=true Container 'secrets-store' is running in privileged mode kube-system pod/aks-secrets-store-csi-driver-m8m29 privileged=true Container 'secrets-store' is running in privileged mode kube-system pod/aks-secrets-store-csi-driver-vnmcd privileged=true Container 'secrets-store' is running in privileged mode kube-system pod/aks-secrets-store-csi-driver-zrfbz privileged=true Container 'ama-logs' is running in privileged mode kube-system pod/ama-logs-4v8mz privileged=true Container 'ama-logs-prometheus' is running in privileged mode kube-system pod/ama-logs-4v8mz privileged=true Container 'ama-logs' is running in privileged mode kube-system pod/ama-logs-5vr2w privileged=true Container 'ama-logs-prometheus' is running in privileged mode kube-system pod/ama-logs-5vr2w privileged=true Container 'ama-logs' is running in privileged mode kube-system pod/ama-logs-fmd7b privileged=true Container 'ama-logs-prometheus' is running in privileged mode kube-system pod/ama-logs-fmd7b privileged=true Container 'ama-logs' is running in privileged mode kube-system pod/ama-logs-fpkw6 privileged=true Container 'ama-logs-prometheus' is running in privileged mode kube-system pod/ama-logs-fpkw6 privileged=true Container 'ama-logs' is running in privileged mode kube-system pod/ama-logs-gqs28 privileged=true Container 'ama-logs-prometheus' is running in privileged mode kube-system pod/ama-logs-gqs28 privileged=true Container 'ama-logs' is running in privileged mode kube-system pod/ama-logs-ndxrw privileged=true Container 'ama-logs-prometheus' is running in privileged mode kube-system pod/ama-logs-ndxrw privileged=true Container 'ama-logs' is running in privileged mode kube-system pod/ama-logs-rs-64765bd4b9-ldxwl privileged=true Container 'kube-proxy' is running in privileged mode kube-system pod/kube-proxy-26xkd privileged=true Container 'kube-proxy-bootstrap' is running in privileged mode kube-system pod/kube-proxy-26xkd privileged=true Container 'kube-proxy' is running in privileged mode kube-system pod/kube-proxy-6mrql privileged=true Container 'kube-proxy-bootstrap' is running in privileged mode kube-system pod/kube-proxy-6mrql privileged=true Container 'kube-proxy' is running in privileged mode kube-system pod/kube-proxy-9rbxf privileged=true Container 'kube-proxy-bootstrap' is running in privileged mode kube-system pod/kube-proxy-9rbxf privileged=true Container 'kube-proxy' is running in privileged mode kube-system pod/kube-proxy-njzgk privileged=true Container 'kube-proxy-bootstrap' is running in privileged mode kube-system pod/kube-proxy-njzgk privileged=true Container 'kube-proxy' is running in privileged mode kube-system pod/kube-proxy-rvmxl privileged=true Container 'kube-proxy-bootstrap' is running in privileged mode kube-system pod/kube-proxy-rvmxl privileged=true Container 'kube-proxy' is running in privileged mode kube-system pod/kube-proxy-vp7xj privileged=true Container 'kube-proxy-bootstrap' is running in privileged mode kube-system pod/kube-proxy-vp7xj privileged=true Container 'retina-agent-init' is running in privileged mode kube-system pod/retina-agent-cgv48 privileged=true Container 'retina-agent-init' is running in privileged mode kube-system pod/retina-agent-gjxk8 privileged=true Container 'retina-agent-init' is running in privileged mode kube-system pod/retina-agent-js76w privileged=true Container 'retina-agent-init' is running in privileged mode kube-system pod/retina-agent-lfn7d privileged=true Container 'retina-agent-init' is running in privileged mode kube-system pod/retina-agent-qc9bs privileged=true Container 'retina-agent-init' is running in privileged mode kube-system pod/retina-agent-wlt7b privileged=true Category: Pod Security Severity: High Recommendation: Avoid using privileged containers unless absolutely necessary, as they grant broad access to host resources. URL: https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted SEC005 - Pods Using hostIPC Total Issues: 0 ✅ No issues detected for Pods Using hostIPC. Category: Pod Security Severity: High Recommendation: Avoid using hostIPC in pods unless absolutely required for specific functionality. URL: https://kubernetes.io/docs/concepts/security/pod-security-standards/#host-namespaces SEC006 - Pods Missing Secure Defaults Total Issues: 155 Container Flags Issue --------- ----- ----- controller runAsNonRoot: True, readOnlyRootFilesystem: , allowPrivilegeEscalation: False Missing one or more secure defaults controller runAsNonRoot: True, readOnlyRootFilesystem: , allowPrivilegeEscalation: False Missing one or more secure defaults webserver-simple Missing securityContext No securityContext defined webserver-simple Missing securityContext No securityContext defined argocd-notifications-controller runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False Missing one or more secure defaults haproxy runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False Missing one or more secure defaults haproxy runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False Missing one or more secure defaults haproxy runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False Missing one or more secure defaults redis runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False Missing one or more secure defaults sentinel runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False Missing one or more secure defaults split-brain-fix runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False Missing one or more secure defaults redis runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False Missing one or more secure defaults sentinel runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False Missing one or more secure defaults split-brain-fix runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False Missing one or more secure defaults redis runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False Missing one or more secure defaults sentinel runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False Missing one or more secure defaults split-brain-fix runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False Missing one or more secure defaults webserver-simple Missing securityContext No securityContext defined webserver-simple Missing securityContext No securityContext defined node-driver-registrar Missing securityContext No securityContext defined secrets-store runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults liveness-probe Missing securityContext No securityContext defined node-driver-registrar Missing securityContext No securityContext defined secrets-store runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults liveness-probe Missing securityContext No securityContext defined node-driver-registrar Missing securityContext No securityContext defined secrets-store runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults liveness-probe Missing securityContext No securityContext defined node-driver-registrar Missing securityContext No securityContext defined secrets-store runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults liveness-probe Missing securityContext No securityContext defined node-driver-registrar Missing securityContext No securityContext defined secrets-store runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults liveness-probe Missing securityContext No securityContext defined node-driver-registrar Missing securityContext No securityContext defined secrets-store runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults liveness-probe Missing securityContext No securityContext defined provider-azure-installer runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: Missing one or more secure defaults provider-azure-installer runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: Missing one or more secure defaults provider-azure-installer runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: Missing one or more secure defaults provider-azure-installer runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: Missing one or more secure defaults provider-azure-installer runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: Missing one or more secure defaults provider-azure-installer runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: Missing one or more secure defaults ama-logs runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults ama-logs-prometheus runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults ama-logs runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults ama-logs-prometheus runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults ama-logs runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults ama-logs-prometheus runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults ama-logs runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults ama-logs-prometheus runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults ama-logs runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults ama-logs-prometheus runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults ama-logs runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults ama-logs-prometheus runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults ama-logs runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults prometheus-collector runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults addon-token-adapter runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults prometheus-collector runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults addon-token-adapter runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults ama-metrics-ksm runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults prometheus-collector runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults addon-token-adapter runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults prometheus-collector runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults addon-token-adapter runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults prometheus-collector runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults addon-token-adapter runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults prometheus-collector runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults addon-token-adapter runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults prometheus-collector runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults addon-token-adapter runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults prometheus-collector runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults addon-token-adapter runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults targetallocator runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults config-reader runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults azure-ip-masq-agent runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults azure-ip-masq-agent runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults azure-ip-masq-agent runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults azure-ip-masq-agent runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults azure-ip-masq-agent runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults azure-ip-masq-agent runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults azure-npm runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: Missing one or more secure defaults azure-npm runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: Missing one or more secure defaults azure-npm runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: Missing one or more secure defaults azure-npm runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: Missing one or more secure defaults azure-npm runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: Missing one or more secure defaults azure-npm runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: Missing one or more secure defaults azure-policy runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False Missing one or more secure defaults cloud-node-manager runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults cloud-node-manager runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults cloud-node-manager runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults cloud-node-manager runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults cloud-node-manager runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults cloud-node-manager runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults coredns runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False Missing one or more secure defaults coredns runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False Missing one or more secure defaults autoscaler runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults extension-agent Missing securityContext No securityContext defined fluent-bit Missing securityContext No securityContext defined manager Missing securityContext No securityContext defined fluent-bit Missing securityContext No securityContext defined keda-admission-webhooks runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False Missing one or more secure defaults keda-admission-webhooks runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False Missing one or more secure defaults keda-operator runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False Missing one or more secure defaults keda-operator runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False Missing one or more secure defaults keda-operator-metrics-apiserver runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False Missing one or more secure defaults keda-operator-metrics-apiserver runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False Missing one or more secure defaults konnectivity-agent runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults konnectivity-agent runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults autoscaler runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults kube-proxy runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults kube-proxy runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults kube-proxy runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults kube-proxy runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults kube-proxy runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults kube-proxy runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults microsoft-defender-pod-collector runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults microsoft-defender-low-level-collector runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults microsoft-defender-pod-collector runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults microsoft-defender-low-level-collector runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults microsoft-defender-pod-collector runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults microsoft-defender-low-level-collector runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults microsoft-defender-pod-collector runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults microsoft-defender-low-level-collector runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults microsoft-defender-pod-collector runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults microsoft-defender-low-level-collector runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults microsoft-defender-pod-collector runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults microsoft-defender-low-level-collector runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults microsoft-defender-pod-collector runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults microsoft-defender-publisher runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults microsoft-defender-publisher runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults microsoft-defender-publisher runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults microsoft-defender-publisher runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults microsoft-defender-publisher runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults microsoft-defender-publisher runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults retina runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults retina runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults retina runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults retina runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults retina runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults retina runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults admission-controller runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults admission-controller runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults recommender runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults updater runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: Missing one or more secure defaults webserver-simple Missing securityContext No securityContext defined webserver-simple Missing securityContext No securityContext defined webserver-simple Missing securityContext No securityContext defined order-service Missing securityContext No securityContext defined product-service Missing securityContext No securityContext defined rabbitmq Missing securityContext No securityContext defined store-front Missing securityContext No securityContext defined webserver-simple Missing securityContext No securityContext defined webserver-simple Missing securityContext No securityContext defined webserver-simple Missing securityContext No securityContext defined Category: Pod Security Severity: Medium Recommendation: Set runAsNonRoot=true, readOnlyRootFilesystem=true, and allowPrivilegeEscalation=false for all pods and containers. URL: https://kubernetes.io/docs/concepts/security/pod-security-standards/ SEC007 - Missing Pod Security Admission Labels Total Issues: 32 Audit Issue Namespace Warn ----- ----- --------- ---- N/A No pod security labels 1 N/A N/A No pod security labels 10 N/A N/A No pod security labels 2 N/A N/A No pod security labels 3 N/A N/A No pod security labels 4 N/A N/A No pod security labels 5 N/A N/A No pod security labels 6 N/A N/A No pod security labels 7 N/A N/A No pod security labels 8 N/A N/A No pod security labels 9 N/A N/A No pod security labels aks-istio-egress N/A N/A No pod security labels aks-istio-ingress N/A N/A No pod security labels aks-istio-system N/A N/A No pod security labels app-routing-system N/A N/A No pod security labels argo-rollouts N/A N/A No pod security labels argo-workflows N/A N/A No pod security labels argocd N/A N/A No pod security labels cert-manager N/A N/A No pod security labels default N/A N/A No pod security labels gatekeeper-system N/A N/A No pod security labels grafana N/A N/A No pod security labels kiali-operator N/A N/A No pod security labels kube-node-lease N/A N/A No pod security labels kube-public N/A N/A No pod security labels kube-system N/A N/A No pod security labels kubeview N/A N/A No pod security labels linkerd N/A N/A No pod security labels nginx N/A N/A No pod security labels pets N/A N/A No pod security labels prometheus N/A N/A No pod security labels sealed-secrets N/A N/A No pod security labels test N/A Category: Pod Security Severity: Low Recommendation: Add 'pod-security.kubernetes.io/enforce' labels to your namespaces to enforce Pod Security standards. Use values like 'baseline' or 'restricted'. URL: https://kubernetes.io/docs/concepts/security/pod-security-admission/ SEC008 - Secrets in Environment Variables Total Issues: 20 EnvVar Issue Namespace Pod ------ ----- --------- --- env: REDIS_PASSWORD Secret argocd-redis exposed via env var in container argocd-application-controller argocd pod/argocd-application-controller-0 env: AUTH Secret argocd-redis exposed via env var in container haproxy argocd pod/argocd-redis-ha-haproxy-fb657456c-… env: AUTH Secret argocd-redis exposed via env var in container haproxy argocd pod/argocd-redis-ha-haproxy-fb657456c-… env: AUTH Secret argocd-redis exposed via env var in container haproxy argocd pod/argocd-redis-ha-haproxy-fb657456c-… env: AUTH Secret argocd-redis exposed via env var in container redis argocd pod/argocd-redis-ha-server-0 env: AUTH Secret argocd-redis exposed via env var in container sentinel argocd pod/argocd-redis-ha-server-0 env: AUTH Secret argocd-redis exposed via env var in container split-brain-fix argocd pod/argocd-redis-ha-server-0 env: AUTH Secret argocd-redis exposed via env var in container config-init argocd pod/argocd-redis-ha-server-0 env: AUTH Secret argocd-redis exposed via env var in container redis argocd pod/argocd-redis-ha-server-1 env: AUTH Secret argocd-redis exposed via env var in container sentinel argocd pod/argocd-redis-ha-server-1 env: AUTH Secret argocd-redis exposed via env var in container split-brain-fix argocd pod/argocd-redis-ha-server-1 env: AUTH Secret argocd-redis exposed via env var in container config-init argocd pod/argocd-redis-ha-server-1 env: AUTH Secret argocd-redis exposed via env var in container redis argocd pod/argocd-redis-ha-server-2 env: AUTH Secret argocd-redis exposed via env var in container sentinel argocd pod/argocd-redis-ha-server-2 env: AUTH Secret argocd-redis exposed via env var in container split-brain-fix argocd pod/argocd-redis-ha-server-2 env: AUTH Secret argocd-redis exposed via env var in container config-init argocd pod/argocd-redis-ha-server-2 env: REDIS_PASSWORD Secret argocd-redis exposed via env var in container argocd-repo-server argocd pod/argocd-repo-server-8568fc89b5-sx6ks env: REDIS_PASSWORD Secret argocd-redis exposed via env var in container argocd-repo-server argocd pod/argocd-repo-server-8568fc89b5-xrzzn env: REDIS_PASSWORD Secret argocd-redis exposed via env var in container argocd-server argocd pod/argocd-server-54f9645b87-k4rz8 env: REDIS_PASSWORD Secret argocd-redis exposed via env var in container argocd-server argocd pod/argocd-server-54f9645b87-wwzgz Category: Pod Security Severity: High Recommendation: Avoid exposing secrets in environment variables. Mount secrets as volumes instead. URL: https://kubernetes.io/docs/concepts/configuration/secret/#using-secrets-as-environment-variables SEC009 - Missing Capabilities Drop Total Issues: 42 Container Issue Namespace Pod --------- ----- --------- --- webserver-simple Does not drop ALL capabilities argo-rollouts simple-deployment-74fd649f8d-996vt webserver-simple Does not drop ALL capabilities argo-workflows simple-deployment-74fd649f8d-24t56 webserver-simple Does not drop ALL capabilities cert-manager simple-deployment-74fd649f8d-7cht8 webserver-simple Does not drop ALL capabilities grafana simple-deployment-74fd649f8d-l7wrd node-driver-registrar Does not drop ALL capabilities kube-system aks-secrets-store-csi-driver-2l2wl secrets-store Does not drop ALL capabilities kube-system aks-secrets-store-csi-driver-2l2wl liveness-probe Does not drop ALL capabilities kube-system aks-secrets-store-csi-driver-2l2wl node-driver-registrar Does not drop ALL capabilities kube-system aks-secrets-store-csi-driver-6w2vp secrets-store Does not drop ALL capabilities kube-system aks-secrets-store-csi-driver-6w2vp liveness-probe Does not drop ALL capabilities kube-system aks-secrets-store-csi-driver-6w2vp node-driver-registrar Does not drop ALL capabilities kube-system aks-secrets-store-csi-driver-7879c secrets-store Does not drop ALL capabilities kube-system aks-secrets-store-csi-driver-7879c liveness-probe Does not drop ALL capabilities kube-system aks-secrets-store-csi-driver-7879c node-driver-registrar Does not drop ALL capabilities kube-system aks-secrets-store-csi-driver-m8m29 secrets-store Does not drop ALL capabilities kube-system aks-secrets-store-csi-driver-m8m29 liveness-probe Does not drop ALL capabilities kube-system aks-secrets-store-csi-driver-m8m29 node-driver-registrar Does not drop ALL capabilities kube-system aks-secrets-store-csi-driver-vnmcd secrets-store Does not drop ALL capabilities kube-system aks-secrets-store-csi-driver-vnmcd liveness-probe Does not drop ALL capabilities kube-system aks-secrets-store-csi-driver-vnmcd node-driver-registrar Does not drop ALL capabilities kube-system aks-secrets-store-csi-driver-zrfbz secrets-store Does not drop ALL capabilities kube-system aks-secrets-store-csi-driver-zrfbz liveness-probe Does not drop ALL capabilities kube-system aks-secrets-store-csi-driver-zrfbz extension-agent Does not drop ALL capabilities kube-system extension-agent-66c4486d68-46cqq fluent-bit Does not drop ALL capabilities kube-system extension-agent-66c4486d68-46cqq manager Does not drop ALL capabilities kube-system extension-operator-d95fd449b-ssrcx fluent-bit Does not drop ALL capabilities kube-system extension-operator-d95fd449b-ssrcx kube-proxy Does not drop ALL capabilities kube-system kube-proxy-26xkd kube-proxy Does not drop ALL capabilities kube-system kube-proxy-6mrql kube-proxy Does not drop ALL capabilities kube-system kube-proxy-9rbxf kube-proxy Does not drop ALL capabilities kube-system kube-proxy-njzgk kube-proxy Does not drop ALL capabilities kube-system kube-proxy-rvmxl kube-proxy Does not drop ALL capabilities kube-system kube-proxy-vp7xj webserver-simple Does not drop ALL capabilities kubeview simple-deployment-74fd649f8d-qxp2r webserver-simple Does not drop ALL capabilities linkerd simple-deployment-74fd649f8d-mkmst webserver-simple Does not drop ALL capabilities nginx simple-deployment-74fd649f8d-hlcdk order-service Does not drop ALL capabilities pets order-service-6c5bfb6946-b58xq product-service Does not drop ALL capabilities pets product-service-5dd87dfb8-ssfxc rabbitmq Does not drop ALL capabilities pets rabbitmq-0 store-front Does not drop ALL capabilities pets store-front-658994fd95-pk9qn webserver-simple Does not drop ALL capabilities prometheus simple-deployment-74fd649f8d-2x6w5 webserver-simple Does not drop ALL capabilities sealed-secrets simple-deployment-74fd649f8d-stktp webserver-simple Does not drop ALL capabilities test simple-deployment-74fd649f8d-lhlkx Category: Pod Security Severity: Medium Recommendation: Explicitly drop all Linux capabilities unless specific ones are needed. URL: https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted SEC010 - HostPath Volume Usage Total Issues: 309 Issue Namespace Path Pod Volume ----- --------- ---- --- ------ hostPath volume used kube-system /var/lib/kubelet/pods aks-secrets-store-csi-driver-2l2wl mountpoint-dir hostPath volume used kube-system /var/lib/kubelet/plugins_registry/ aks-secrets-store-csi-driver-2l2wl registration-dir hostPath volume used kube-system /var/lib/kubelet/plugins/csi-secrets-store/ aks-secrets-store-csi-driver-2l2wl plugin-dir hostPath volume used kube-system /var/run/secrets-store-csi-providers aks-secrets-store-csi-driver-2l2wl providers-dir hostPath volume used kube-system /etc/kubernetes/secrets-store-csi-providers aks-secrets-store-csi-driver-2l2wl providers-dir-0 hostPath volume used kube-system /var/lib/kubelet/pods aks-secrets-store-csi-driver-6w2vp mountpoint-dir hostPath volume used kube-system /var/lib/kubelet/plugins_registry/ aks-secrets-store-csi-driver-6w2vp registration-dir hostPath volume used kube-system /var/lib/kubelet/plugins/csi-secrets-store/ aks-secrets-store-csi-driver-6w2vp plugin-dir hostPath volume used kube-system /var/run/secrets-store-csi-providers aks-secrets-store-csi-driver-6w2vp providers-dir hostPath volume used kube-system /etc/kubernetes/secrets-store-csi-providers aks-secrets-store-csi-driver-6w2vp providers-dir-0 hostPath volume used kube-system /var/lib/kubelet/pods aks-secrets-store-csi-driver-7879c mountpoint-dir hostPath volume used kube-system /var/lib/kubelet/plugins_registry/ aks-secrets-store-csi-driver-7879c registration-dir hostPath volume used kube-system /var/lib/kubelet/plugins/csi-secrets-store/ aks-secrets-store-csi-driver-7879c plugin-dir hostPath volume used kube-system /var/run/secrets-store-csi-providers aks-secrets-store-csi-driver-7879c providers-dir hostPath volume used kube-system /etc/kubernetes/secrets-store-csi-providers aks-secrets-store-csi-driver-7879c providers-dir-0 hostPath volume used kube-system /var/lib/kubelet/pods aks-secrets-store-csi-driver-m8m29 mountpoint-dir hostPath volume used kube-system /var/lib/kubelet/plugins_registry/ aks-secrets-store-csi-driver-m8m29 registration-dir hostPath volume used kube-system /var/lib/kubelet/plugins/csi-secrets-store/ aks-secrets-store-csi-driver-m8m29 plugin-dir hostPath volume used kube-system /var/run/secrets-store-csi-providers aks-secrets-store-csi-driver-m8m29 providers-dir hostPath volume used kube-system /etc/kubernetes/secrets-store-csi-providers aks-secrets-store-csi-driver-m8m29 providers-dir-0 hostPath volume used kube-system /var/lib/kubelet/pods aks-secrets-store-csi-driver-vnmcd mountpoint-dir hostPath volume used kube-system /var/lib/kubelet/plugins_registry/ aks-secrets-store-csi-driver-vnmcd registration-dir hostPath volume used kube-system /var/lib/kubelet/plugins/csi-secrets-store/ aks-secrets-store-csi-driver-vnmcd plugin-dir hostPath volume used kube-system /var/run/secrets-store-csi-providers aks-secrets-store-csi-driver-vnmcd providers-dir hostPath volume used kube-system /etc/kubernetes/secrets-store-csi-providers aks-secrets-store-csi-driver-vnmcd providers-dir-0 hostPath volume used kube-system /var/lib/kubelet/pods aks-secrets-store-csi-driver-zrfbz mountpoint-dir hostPath volume used kube-system /var/lib/kubelet/plugins_registry/ aks-secrets-store-csi-driver-zrfbz registration-dir hostPath volume used kube-system /var/lib/kubelet/plugins/csi-secrets-store/ aks-secrets-store-csi-driver-zrfbz plugin-dir hostPath volume used kube-system /var/run/secrets-store-csi-providers aks-secrets-store-csi-driver-zrfbz providers-dir hostPath volume used kube-system /etc/kubernetes/secrets-store-csi-providers aks-secrets-store-csi-driver-zrfbz providers-dir-0 hostPath volume used kube-system /var/run/secrets-store-csi-providers aks-secrets-store-provider-azure-68nhw provider-vol hostPath volume used kube-system /var/run/secrets-store-csi-providers aks-secrets-store-provider-azure-7bqmn provider-vol hostPath volume used kube-system /var/run/secrets-store-csi-providers aks-secrets-store-provider-azure-7r458 provider-vol hostPath volume used kube-system /var/run/secrets-store-csi-providers aks-secrets-store-provider-azure-k9tdc provider-vol hostPath volume used kube-system /var/run/secrets-store-csi-providers aks-secrets-store-provider-azure-n952g provider-vol hostPath volume used kube-system /var/run/secrets-store-csi-providers aks-secrets-store-provider-azure-njpqh provider-vol hostPath volume used kube-system / ama-logs-4v8mz host-root hostPath volume used kube-system /etc/hostname ama-logs-4v8mz container-hostname hostPath volume used kube-system /var/log ama-logs-4v8mz host-log hostPath volume used kube-system /var/run/mdsd-ci ama-logs-4v8mz mdsd-sock hostPath volume used kube-system /var/lib/docker/containers ama-logs-4v8mz containerlog-path hostPath volume used kube-system /mnt/docker ama-logs-4v8mz containerlog-path-2 hostPath volume used kube-system /mnt/containers ama-logs-4v8mz containerlog-path-3 hostPath volume used kube-system /etc/kubernetes ama-logs-4v8mz azure-json-path hostPath volume used kube-system / ama-logs-5vr2w host-root hostPath volume used kube-system /etc/hostname ama-logs-5vr2w container-hostname hostPath volume used kube-system /var/log ama-logs-5vr2w host-log hostPath volume used kube-system /var/run/mdsd-ci ama-logs-5vr2w mdsd-sock hostPath volume used kube-system /var/lib/docker/containers ama-logs-5vr2w containerlog-path hostPath volume used kube-system /mnt/docker ama-logs-5vr2w containerlog-path-2 hostPath volume used kube-system /mnt/containers ama-logs-5vr2w containerlog-path-3 hostPath volume used kube-system /etc/kubernetes ama-logs-5vr2w azure-json-path hostPath volume used kube-system / ama-logs-fmd7b host-root hostPath volume used kube-system /etc/hostname ama-logs-fmd7b container-hostname hostPath volume used kube-system /var/log ama-logs-fmd7b host-log hostPath volume used kube-system /var/run/mdsd-ci ama-logs-fmd7b mdsd-sock hostPath volume used kube-system /var/lib/docker/containers ama-logs-fmd7b containerlog-path hostPath volume used kube-system /mnt/docker ama-logs-fmd7b containerlog-path-2 hostPath volume used kube-system /mnt/containers ama-logs-fmd7b containerlog-path-3 hostPath volume used kube-system /etc/kubernetes ama-logs-fmd7b azure-json-path hostPath volume used kube-system / ama-logs-fpkw6 host-root hostPath volume used kube-system /etc/hostname ama-logs-fpkw6 container-hostname hostPath volume used kube-system /var/log ama-logs-fpkw6 host-log hostPath volume used kube-system /var/run/mdsd-ci ama-logs-fpkw6 mdsd-sock hostPath volume used kube-system /var/lib/docker/containers ama-logs-fpkw6 containerlog-path hostPath volume used kube-system /mnt/docker ama-logs-fpkw6 containerlog-path-2 hostPath volume used kube-system /mnt/containers ama-logs-fpkw6 containerlog-path-3 hostPath volume used kube-system /etc/kubernetes ama-logs-fpkw6 azure-json-path hostPath volume used kube-system / ama-logs-gqs28 host-root hostPath volume used kube-system /etc/hostname ama-logs-gqs28 container-hostname hostPath volume used kube-system /var/log ama-logs-gqs28 host-log hostPath volume used kube-system /var/run/mdsd-ci ama-logs-gqs28 mdsd-sock hostPath volume used kube-system /var/lib/docker/containers ama-logs-gqs28 containerlog-path hostPath volume used kube-system /mnt/docker ama-logs-gqs28 containerlog-path-2 hostPath volume used kube-system /mnt/containers ama-logs-gqs28 containerlog-path-3 hostPath volume used kube-system /etc/kubernetes ama-logs-gqs28 azure-json-path hostPath volume used kube-system / ama-logs-ndxrw host-root hostPath volume used kube-system /etc/hostname ama-logs-ndxrw container-hostname hostPath volume used kube-system /var/log ama-logs-ndxrw host-log hostPath volume used kube-system /var/run/mdsd-ci ama-logs-ndxrw mdsd-sock hostPath volume used kube-system /var/lib/docker/containers ama-logs-ndxrw containerlog-path hostPath volume used kube-system /mnt/docker ama-logs-ndxrw containerlog-path-2 hostPath volume used kube-system /mnt/containers ama-logs-ndxrw containerlog-path-3 hostPath volume used kube-system /etc/kubernetes ama-logs-ndxrw azure-json-path hostPath volume used kube-system /etc/hostname ama-logs-rs-64765bd4b9-ldxwl container-hostname hostPath volume used kube-system /var/log ama-logs-rs-64765bd4b9-ldxwl host-log hostPath volume used kube-system /etc/kubernetes ama-logs-rs-64765bd4b9-ldxwl azure-json-path hostPath volume used kube-system /var/log/containers ama-metrics-7f878d975f-hlggb host-log-containers hostPath volume used kube-system /var/log/pods ama-metrics-7f878d975f-hlggb host-log-pods hostPath volume used kube-system /etc/pki/ca-trust/anchors/ ama-metrics-7f878d975f-hlggb anchors-mariner hostPath volume used kube-system /usr/local/share/ca-certificates/ ama-metrics-7f878d975f-hlggb anchors-ubuntu hostPath volume used kube-system /var/log/containers ama-metrics-7f878d975f-q2mlg host-log-containers hostPath volume used kube-system /var/log/pods ama-metrics-7f878d975f-q2mlg host-log-pods hostPath volume used kube-system /etc/pki/ca-trust/anchors/ ama-metrics-7f878d975f-q2mlg anchors-mariner hostPath volume used kube-system /usr/local/share/ca-certificates/ ama-metrics-7f878d975f-q2mlg anchors-ubuntu hostPath volume used kube-system /var/log/containers ama-metrics-node-2ssrw host-log-containers hostPath volume used kube-system /var/log/pods ama-metrics-node-2ssrw host-log-pods hostPath volume used kube-system /etc/pki/ca-trust/anchors/ ama-metrics-node-2ssrw anchors-mariner hostPath volume used kube-system /usr/local/share/ca-certificates/ ama-metrics-node-2ssrw anchors-ubuntu hostPath volume used kube-system /var/log/containers ama-metrics-node-6kkz8 host-log-containers hostPath volume used kube-system /var/log/pods ama-metrics-node-6kkz8 host-log-pods hostPath volume used kube-system /etc/pki/ca-trust/anchors/ ama-metrics-node-6kkz8 anchors-mariner hostPath volume used kube-system /usr/local/share/ca-certificates/ ama-metrics-node-6kkz8 anchors-ubuntu hostPath volume used kube-system /var/log/containers ama-metrics-node-9h44h host-log-containers hostPath volume used kube-system /var/log/pods ama-metrics-node-9h44h host-log-pods hostPath volume used kube-system /etc/pki/ca-trust/anchors/ ama-metrics-node-9h44h anchors-mariner hostPath volume used kube-system /usr/local/share/ca-certificates/ ama-metrics-node-9h44h anchors-ubuntu hostPath volume used kube-system /var/log/containers ama-metrics-node-lhk42 host-log-containers hostPath volume used kube-system /var/log/pods ama-metrics-node-lhk42 host-log-pods hostPath volume used kube-system /etc/pki/ca-trust/anchors/ ama-metrics-node-lhk42 anchors-mariner hostPath volume used kube-system /usr/local/share/ca-certificates/ ama-metrics-node-lhk42 anchors-ubuntu hostPath volume used kube-system /var/log/containers ama-metrics-node-nm5bf host-log-containers hostPath volume used kube-system /var/log/pods ama-metrics-node-nm5bf host-log-pods hostPath volume used kube-system /etc/pki/ca-trust/anchors/ ama-metrics-node-nm5bf anchors-mariner hostPath volume used kube-system /usr/local/share/ca-certificates/ ama-metrics-node-nm5bf anchors-ubuntu hostPath volume used kube-system /var/log/containers ama-metrics-node-pqcz5 host-log-containers hostPath volume used kube-system /var/log/pods ama-metrics-node-pqcz5 host-log-pods hostPath volume used kube-system /etc/pki/ca-trust/anchors/ ama-metrics-node-pqcz5 anchors-mariner hostPath volume used kube-system /usr/local/share/ca-certificates/ ama-metrics-node-pqcz5 anchors-ubuntu hostPath volume used kube-system /run/xtables.lock azure-ip-masq-agent-4522j iptableslock hostPath volume used kube-system /run/xtables.lock azure-ip-masq-agent-4c7cr iptableslock hostPath volume used kube-system /run/xtables.lock azure-ip-masq-agent-78rnw iptableslock hostPath volume used kube-system /run/xtables.lock azure-ip-masq-agent-84ltn iptableslock hostPath volume used kube-system /run/xtables.lock azure-ip-masq-agent-t4c2w iptableslock hostPath volume used kube-system /run/xtables.lock azure-ip-masq-agent-vbdd8 iptableslock hostPath volume used kube-system /var/log azure-npm-jsbbh log hostPath volume used kube-system /run/xtables.lock azure-npm-jsbbh xtables-lock hostPath volume used kube-system /etc/protocols azure-npm-jsbbh protocols hostPath volume used kube-system /var/log azure-npm-lp6sf log hostPath volume used kube-system /run/xtables.lock azure-npm-lp6sf xtables-lock hostPath volume used kube-system /etc/protocols azure-npm-lp6sf protocols hostPath volume used kube-system /var/log azure-npm-nv6xx log hostPath volume used kube-system /run/xtables.lock azure-npm-nv6xx xtables-lock hostPath volume used kube-system /etc/protocols azure-npm-nv6xx protocols hostPath volume used kube-system /var/log azure-npm-p6fpw log hostPath volume used kube-system /run/xtables.lock azure-npm-p6fpw xtables-lock hostPath volume used kube-system /etc/protocols azure-npm-p6fpw protocols hostPath volume used kube-system /var/log azure-npm-vsrfp log hostPath volume used kube-system /run/xtables.lock azure-npm-vsrfp xtables-lock hostPath volume used kube-system /etc/protocols azure-npm-vsrfp protocols hostPath volume used kube-system /var/log azure-npm-z8mcz log hostPath volume used kube-system /run/xtables.lock azure-npm-z8mcz xtables-lock hostPath volume used kube-system /etc/protocols azure-npm-z8mcz protocols hostPath volume used kube-system /etc/kubernetes/azure.json azure-policy-698f7c86b4-nnff2 acs-credential hostPath volume used kube-system /etc/ssl/certs azure-policy-698f7c86b4-nnff2 ca-certs hostPath volume used kube-system /etc/pki/ca-trust/extracted azure-policy-698f7c86b4-nnff2 etc-pki-ca-certs hostPath volume used kube-system /var/log extension-agent-66c4486d68-46cqq varlog hostPath volume used kube-system /var/lib/docker/containers extension-agent-66c4486d68-46cqq varlibdockercontainers hostPath volume used kube-system /etc/kubernetes/azure.json extension-agent-66c4486d68-46cqq acs-credential hostPath volume used kube-system /var/log extension-operator-d95fd449b-ssrcx varlog hostPath volume used kube-system /var/lib/docker/containers extension-operator-d95fd449b-ssrcx varlibdockercontainers hostPath volume used kube-system /etc/kubernetes/azure.json extension-operator-d95fd449b-ssrcx acs-credential hostPath volume used kube-system /run/xtables.lock kube-proxy-26xkd iptableslock hostPath volume used kube-system /etc/sysctl.d kube-proxy-26xkd sysctls hostPath volume used kube-system /lib/modules kube-proxy-26xkd modules hostPath volume used kube-system /run/xtables.lock kube-proxy-6mrql iptableslock hostPath volume used kube-system /etc/sysctl.d kube-proxy-6mrql sysctls hostPath volume used kube-system /lib/modules kube-proxy-6mrql modules hostPath volume used kube-system /run/xtables.lock kube-proxy-9rbxf iptableslock hostPath volume used kube-system /etc/sysctl.d kube-proxy-9rbxf sysctls hostPath volume used kube-system /lib/modules kube-proxy-9rbxf modules hostPath volume used kube-system /run/xtables.lock kube-proxy-njzgk iptableslock hostPath volume used kube-system /etc/sysctl.d kube-proxy-njzgk sysctls hostPath volume used kube-system /lib/modules kube-proxy-njzgk modules hostPath volume used kube-system /run/xtables.lock kube-proxy-rvmxl iptableslock hostPath volume used kube-system /etc/sysctl.d kube-proxy-rvmxl sysctls hostPath volume used kube-system /lib/modules kube-proxy-rvmxl modules hostPath volume used kube-system /run/xtables.lock kube-proxy-vp7xj iptableslock hostPath volume used kube-system /etc/sysctl.d kube-proxy-vp7xj sysctls hostPath volume used kube-system /lib/modules kube-proxy-vp7xj modules hostPath volume used kube-system /var/log microsoft-defender-collector-ds-6xdfq host-log hostPath volume used kube-system /sys/kernel microsoft-defender-collector-ds-6xdfq debugfs hostPath volume used kube-system /lib/modules microsoft-defender-collector-ds-6xdfq modules hostPath volume used kube-system /usr/src microsoft-defender-collector-ds-6xdfq usr-src hostPath volume used kube-system /run/containerd/containerd.sock microsoft-defender-collector-ds-6xdfq containerd-file-sock hostPath volume used kube-system /proc microsoft-defender-collector-ds-6xdfq proc hostPath volume used kube-system /bin microsoft-defender-collector-ds-6xdfq bin hostPath volume used kube-system /etc microsoft-defender-collector-ds-6xdfq etc hostPath volume used kube-system /opt microsoft-defender-collector-ds-6xdfq opt hostPath volume used kube-system /usr microsoft-defender-collector-ds-6xdfq usr hostPath volume used kube-system /run microsoft-defender-collector-ds-6xdfq run hostPath volume used kube-system /sys/fs/bpf microsoft-defender-collector-ds-6xdfq bpffs hostPath volume used kube-system /var/log microsoft-defender-collector-ds-89l74 host-log hostPath volume used kube-system /sys/kernel microsoft-defender-collector-ds-89l74 debugfs hostPath volume used kube-system /lib/modules microsoft-defender-collector-ds-89l74 modules hostPath volume used kube-system /usr/src microsoft-defender-collector-ds-89l74 usr-src hostPath volume used kube-system /run/containerd/containerd.sock microsoft-defender-collector-ds-89l74 containerd-file-sock hostPath volume used kube-system /proc microsoft-defender-collector-ds-89l74 proc hostPath volume used kube-system /bin microsoft-defender-collector-ds-89l74 bin hostPath volume used kube-system /etc microsoft-defender-collector-ds-89l74 etc hostPath volume used kube-system /opt microsoft-defender-collector-ds-89l74 opt hostPath volume used kube-system /usr microsoft-defender-collector-ds-89l74 usr hostPath volume used kube-system /run microsoft-defender-collector-ds-89l74 run hostPath volume used kube-system /sys/fs/bpf microsoft-defender-collector-ds-89l74 bpffs hostPath volume used kube-system /var/log microsoft-defender-collector-ds-d7gwk host-log hostPath volume used kube-system /sys/kernel microsoft-defender-collector-ds-d7gwk debugfs hostPath volume used kube-system /lib/modules microsoft-defender-collector-ds-d7gwk modules hostPath volume used kube-system /usr/src microsoft-defender-collector-ds-d7gwk usr-src hostPath volume used kube-system /run/containerd/containerd.sock microsoft-defender-collector-ds-d7gwk containerd-file-sock hostPath volume used kube-system /proc microsoft-defender-collector-ds-d7gwk proc hostPath volume used kube-system /bin microsoft-defender-collector-ds-d7gwk bin hostPath volume used kube-system /etc microsoft-defender-collector-ds-d7gwk etc hostPath volume used kube-system /opt microsoft-defender-collector-ds-d7gwk opt hostPath volume used kube-system /usr microsoft-defender-collector-ds-d7gwk usr hostPath volume used kube-system /run microsoft-defender-collector-ds-d7gwk run hostPath volume used kube-system /sys/fs/bpf microsoft-defender-collector-ds-d7gwk bpffs hostPath volume used kube-system /var/log microsoft-defender-collector-ds-mdcs8 host-log hostPath volume used kube-system /sys/kernel microsoft-defender-collector-ds-mdcs8 debugfs hostPath volume used kube-system /lib/modules microsoft-defender-collector-ds-mdcs8 modules hostPath volume used kube-system /usr/src microsoft-defender-collector-ds-mdcs8 usr-src hostPath volume used kube-system /run/containerd/containerd.sock microsoft-defender-collector-ds-mdcs8 containerd-file-sock hostPath volume used kube-system /proc microsoft-defender-collector-ds-mdcs8 proc hostPath volume used kube-system /bin microsoft-defender-collector-ds-mdcs8 bin hostPath volume used kube-system /etc microsoft-defender-collector-ds-mdcs8 etc hostPath volume used kube-system /opt microsoft-defender-collector-ds-mdcs8 opt hostPath volume used kube-system /usr microsoft-defender-collector-ds-mdcs8 usr hostPath volume used kube-system /run microsoft-defender-collector-ds-mdcs8 run hostPath volume used kube-system /sys/fs/bpf microsoft-defender-collector-ds-mdcs8 bpffs hostPath volume used kube-system /var/log microsoft-defender-collector-ds-q6d6c host-log hostPath volume used kube-system /sys/kernel microsoft-defender-collector-ds-q6d6c debugfs hostPath volume used kube-system /lib/modules microsoft-defender-collector-ds-q6d6c modules hostPath volume used kube-system /usr/src microsoft-defender-collector-ds-q6d6c usr-src hostPath volume used kube-system /run/containerd/containerd.sock microsoft-defender-collector-ds-q6d6c containerd-file-sock hostPath volume used kube-system /proc microsoft-defender-collector-ds-q6d6c proc hostPath volume used kube-system /bin microsoft-defender-collector-ds-q6d6c bin hostPath volume used kube-system /etc microsoft-defender-collector-ds-q6d6c etc hostPath volume used kube-system /opt microsoft-defender-collector-ds-q6d6c opt hostPath volume used kube-system /usr microsoft-defender-collector-ds-q6d6c usr hostPath volume used kube-system /run microsoft-defender-collector-ds-q6d6c run hostPath volume used kube-system /sys/fs/bpf microsoft-defender-collector-ds-q6d6c bpffs hostPath volume used kube-system /var/log microsoft-defender-collector-ds-wb5dm host-log hostPath volume used kube-system /sys/kernel microsoft-defender-collector-ds-wb5dm debugfs hostPath volume used kube-system /lib/modules microsoft-defender-collector-ds-wb5dm modules hostPath volume used kube-system /usr/src microsoft-defender-collector-ds-wb5dm usr-src hostPath volume used kube-system /run/containerd/containerd.sock microsoft-defender-collector-ds-wb5dm containerd-file-sock hostPath volume used kube-system /proc microsoft-defender-collector-ds-wb5dm proc hostPath volume used kube-system /bin microsoft-defender-collector-ds-wb5dm bin hostPath volume used kube-system /etc microsoft-defender-collector-ds-wb5dm etc hostPath volume used kube-system /opt microsoft-defender-collector-ds-wb5dm opt hostPath volume used kube-system /usr microsoft-defender-collector-ds-wb5dm usr hostPath volume used kube-system /run microsoft-defender-collector-ds-wb5dm run hostPath volume used kube-system /sys/fs/bpf microsoft-defender-collector-ds-wb5dm bpffs hostPath volume used kube-system /var/log microsoft-defender-collector-misc-7df6776447-bcbph host-log hostPath volume used kube-system /var/microsoft/microsoft-defender-for-cloud microsoft-defender-publisher-ds-2ql5b cert-onboarding hostPath volume used kube-system / microsoft-defender-publisher-ds-2ql5b host-root hostPath volume used kube-system /var/run microsoft-defender-publisher-ds-2ql5b docker-sock hostPath volume used kube-system /etc/hostname microsoft-defender-publisher-ds-2ql5b container-hostname hostPath volume used kube-system /var/log microsoft-defender-publisher-ds-2ql5b host-log hostPath volume used kube-system /etc/kubernetes microsoft-defender-publisher-ds-2ql5b azure-json-path hostPath volume used kube-system /var/microsoft/microsoft-defender-for-cloud microsoft-defender-publisher-ds-2rsrw cert-onboarding hostPath volume used kube-system / microsoft-defender-publisher-ds-2rsrw host-root hostPath volume used kube-system /var/run microsoft-defender-publisher-ds-2rsrw docker-sock hostPath volume used kube-system /etc/hostname microsoft-defender-publisher-ds-2rsrw container-hostname hostPath volume used kube-system /var/log microsoft-defender-publisher-ds-2rsrw host-log hostPath volume used kube-system /etc/kubernetes microsoft-defender-publisher-ds-2rsrw azure-json-path hostPath volume used kube-system /var/microsoft/microsoft-defender-for-cloud microsoft-defender-publisher-ds-jj6dh cert-onboarding hostPath volume used kube-system / microsoft-defender-publisher-ds-jj6dh host-root hostPath volume used kube-system /var/run microsoft-defender-publisher-ds-jj6dh docker-sock hostPath volume used kube-system /etc/hostname microsoft-defender-publisher-ds-jj6dh container-hostname hostPath volume used kube-system /var/log microsoft-defender-publisher-ds-jj6dh host-log hostPath volume used kube-system /etc/kubernetes microsoft-defender-publisher-ds-jj6dh azure-json-path hostPath volume used kube-system /var/microsoft/microsoft-defender-for-cloud microsoft-defender-publisher-ds-l5crs cert-onboarding hostPath volume used kube-system / microsoft-defender-publisher-ds-l5crs host-root hostPath volume used kube-system /var/run microsoft-defender-publisher-ds-l5crs docker-sock hostPath volume used kube-system /etc/hostname microsoft-defender-publisher-ds-l5crs container-hostname hostPath volume used kube-system /var/log microsoft-defender-publisher-ds-l5crs host-log hostPath volume used kube-system /etc/kubernetes microsoft-defender-publisher-ds-l5crs azure-json-path hostPath volume used kube-system /var/microsoft/microsoft-defender-for-cloud microsoft-defender-publisher-ds-lfk8h cert-onboarding hostPath volume used kube-system / microsoft-defender-publisher-ds-lfk8h host-root hostPath volume used kube-system /var/run microsoft-defender-publisher-ds-lfk8h docker-sock hostPath volume used kube-system /etc/hostname microsoft-defender-publisher-ds-lfk8h container-hostname hostPath volume used kube-system /var/log microsoft-defender-publisher-ds-lfk8h host-log hostPath volume used kube-system /etc/kubernetes microsoft-defender-publisher-ds-lfk8h azure-json-path hostPath volume used kube-system /var/microsoft/microsoft-defender-for-cloud microsoft-defender-publisher-ds-vz2c6 cert-onboarding hostPath volume used kube-system / microsoft-defender-publisher-ds-vz2c6 host-root hostPath volume used kube-system /var/run microsoft-defender-publisher-ds-vz2c6 docker-sock hostPath volume used kube-system /etc/hostname microsoft-defender-publisher-ds-vz2c6 container-hostname hostPath volume used kube-system /var/log microsoft-defender-publisher-ds-vz2c6 host-log hostPath volume used kube-system /etc/kubernetes microsoft-defender-publisher-ds-vz2c6 azure-json-path hostPath volume used kube-system /sys/kernel/debug retina-agent-cgv48 debug hostPath volume used kube-system /sys/kernel/tracing retina-agent-cgv48 trace hostPath volume used kube-system /sys/fs/bpf retina-agent-cgv48 bpf hostPath volume used kube-system /sys/fs/cgroup retina-agent-cgv48 cgroup hostPath volume used kube-system /var/run/cilium retina-agent-cgv48 cilium hostPath volume used kube-system /sys/kernel/debug retina-agent-gjxk8 debug hostPath volume used kube-system /sys/kernel/tracing retina-agent-gjxk8 trace hostPath volume used kube-system /sys/fs/bpf retina-agent-gjxk8 bpf hostPath volume used kube-system /sys/fs/cgroup retina-agent-gjxk8 cgroup hostPath volume used kube-system /var/run/cilium retina-agent-gjxk8 cilium hostPath volume used kube-system /sys/kernel/debug retina-agent-js76w debug hostPath volume used kube-system /sys/kernel/tracing retina-agent-js76w trace hostPath volume used kube-system /sys/fs/bpf retina-agent-js76w bpf hostPath volume used kube-system /sys/fs/cgroup retina-agent-js76w cgroup hostPath volume used kube-system /var/run/cilium retina-agent-js76w cilium hostPath volume used kube-system /sys/kernel/debug retina-agent-lfn7d debug hostPath volume used kube-system /sys/kernel/tracing retina-agent-lfn7d trace hostPath volume used kube-system /sys/fs/bpf retina-agent-lfn7d bpf hostPath volume used kube-system /sys/fs/cgroup retina-agent-lfn7d cgroup hostPath volume used kube-system /var/run/cilium retina-agent-lfn7d cilium hostPath volume used kube-system /sys/kernel/debug retina-agent-qc9bs debug hostPath volume used kube-system /sys/kernel/tracing retina-agent-qc9bs trace hostPath volume used kube-system /sys/fs/bpf retina-agent-qc9bs bpf hostPath volume used kube-system /sys/fs/cgroup retina-agent-qc9bs cgroup hostPath volume used kube-system /var/run/cilium retina-agent-qc9bs cilium hostPath volume used kube-system /sys/kernel/debug retina-agent-wlt7b debug hostPath volume used kube-system /sys/kernel/tracing retina-agent-wlt7b trace hostPath volume used kube-system /sys/fs/bpf retina-agent-wlt7b bpf hostPath volume used kube-system /sys/fs/cgroup retina-agent-wlt7b cgroup hostPath volume used kube-system /var/run/cilium retina-agent-wlt7b cilium Category: Pod Security Severity: High Recommendation: Avoid using hostPath unless absolutely necessary. Use persistent volumes instead. URL: https://kubernetes.io/docs/concepts/storage/volumes/#hostpath SEC011 - Containers Running as UID 0 Total Issues: 13 Container Issue Namespace Pod --------- ----- --------- --- provider-azure-installer Container runs as UID 0 kube-system aks-secrets-store-provider-azure-68nhw provider-azure-installer Container runs as UID 0 kube-system aks-secrets-store-provider-azure-7bqmn provider-azure-installer Container runs as UID 0 kube-system aks-secrets-store-provider-azure-7r458 provider-azure-installer Container runs as UID 0 kube-system aks-secrets-store-provider-azure-k9tdc provider-azure-installer Container runs as UID 0 kube-system aks-secrets-store-provider-azure-n952g provider-azure-installer Container runs as UID 0 kube-system aks-secrets-store-provider-azure-njpqh azure-policy Container runs as UID 0 kube-system azure-policy-698f7c86b4-nnff2 retina Container runs as UID 0 kube-system retina-agent-cgv48 retina Container runs as UID 0 kube-system retina-agent-gjxk8 retina Container runs as UID 0 kube-system retina-agent-js76w retina Container runs as UID 0 kube-system retina-agent-lfn7d retina Container runs as UID 0 kube-system retina-agent-qc9bs retina Container runs as UID 0 kube-system retina-agent-wlt7b Category: Pod Security Severity: High Recommendation: Avoid setting runAsUser to 0. Use non-root UIDs for better isolation. URL: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ SEC012 - Added Linux Capabilities Total Issues: 70 Capabilities Container Issue Namespace ------------ --------- ----- --------- NET_BIND_SERVICE controller Added Linux capabilities app-routing-s… NET_BIND_SERVICE controller Added Linux capabilities app-routing-s… DAC_OVERRIDE ama-logs Added Linux capabilities kube-system DAC_OVERRIDE ama-logs-prometheus Added Linux capabilities kube-system DAC_OVERRIDE ama-logs Added Linux capabilities kube-system DAC_OVERRIDE ama-logs-prometheus Added Linux capabilities kube-system DAC_OVERRIDE ama-logs Added Linux capabilities kube-system DAC_OVERRIDE ama-logs-prometheus Added Linux capabilities kube-system DAC_OVERRIDE ama-logs Added Linux capabilities kube-system DAC_OVERRIDE ama-logs-prometheus Added Linux capabilities kube-system DAC_OVERRIDE ama-logs Added Linux capabilities kube-system DAC_OVERRIDE ama-logs-prometheus Added Linux capabilities kube-system DAC_OVERRIDE ama-logs Added Linux capabilities kube-system DAC_OVERRIDE ama-logs-prometheus Added Linux capabilities kube-system DAC_OVERRIDE ama-logs Added Linux capabilities kube-system DAC_OVERRIDE prometheus-collector Added Linux capabilities kube-system NET_ADMIN, NET_RAW addon-token-adapter Added Linux capabilities kube-system DAC_OVERRIDE prometheus-collector Added Linux capabilities kube-system NET_ADMIN, NET_RAW addon-token-adapter Added Linux capabilities kube-system DAC_OVERRIDE prometheus-collector Added Linux capabilities kube-system NET_ADMIN, NET_RAW addon-token-adapter Added Linux capabilities kube-system DAC_OVERRIDE prometheus-collector Added Linux capabilities kube-system NET_ADMIN, NET_RAW addon-token-adapter Added Linux capabilities kube-system DAC_OVERRIDE prometheus-collector Added Linux capabilities kube-system NET_ADMIN, NET_RAW addon-token-adapter Added Linux capabilities kube-system DAC_OVERRIDE prometheus-collector Added Linux capabilities kube-system NET_ADMIN, NET_RAW addon-token-adapter Added Linux capabilities kube-system DAC_OVERRIDE prometheus-collector Added Linux capabilities kube-system NET_ADMIN, NET_RAW addon-token-adapter Added Linux capabilities kube-system DAC_OVERRIDE prometheus-collector Added Linux capabilities kube-system NET_ADMIN, NET_RAW addon-token-adapter Added Linux capabilities kube-system NET_ADMIN, NET_RAW azure-ip-masq-agent Added Linux capabilities kube-system NET_ADMIN, NET_RAW azure-ip-masq-agent Added Linux capabilities kube-system NET_ADMIN, NET_RAW azure-ip-masq-agent Added Linux capabilities kube-system NET_ADMIN, NET_RAW azure-ip-masq-agent Added Linux capabilities kube-system NET_ADMIN, NET_RAW azure-ip-masq-agent Added Linux capabilities kube-system NET_ADMIN, NET_RAW azure-ip-masq-agent Added Linux capabilities kube-system NET_ADMIN, NET_RAW azure-npm Added Linux capabilities kube-system NET_ADMIN, NET_RAW azure-npm Added Linux capabilities kube-system NET_ADMIN, NET_RAW azure-npm Added Linux capabilities kube-system NET_ADMIN, NET_RAW azure-npm Added Linux capabilities kube-system NET_ADMIN, NET_RAW azure-npm Added Linux capabilities kube-system NET_ADMIN, NET_RAW azure-npm Added Linux capabilities kube-system NET_BIND_SERVICE coredns Added Linux capabilities kube-system NET_BIND_SERVICE coredns Added Linux capabilities kube-system NET_RAW, NET_ADMIN microsoft-defender-pod-collector Added Linux capabilities kube-system SYS_ADMIN, SYS_RESOURCE, SYS_PTRACE, SYSLOG, IPC_LOCK, NET_ADMIN, NET_RAW microsoft-defender-low-level-collector Added Linux capabilities kube-system NET_RAW, NET_ADMIN microsoft-defender-pod-collector Added Linux capabilities kube-system SYS_ADMIN, SYS_RESOURCE, SYS_PTRACE, SYSLOG, IPC_LOCK, NET_ADMIN, NET_RAW microsoft-defender-low-level-collector Added Linux capabilities kube-system NET_RAW, NET_ADMIN microsoft-defender-pod-collector Added Linux capabilities kube-system SYS_ADMIN, SYS_RESOURCE, SYS_PTRACE, SYSLOG, IPC_LOCK, NET_ADMIN, NET_RAW microsoft-defender-low-level-collector Added Linux capabilities kube-system NET_RAW, NET_ADMIN microsoft-defender-pod-collector Added Linux capabilities kube-system SYS_ADMIN, SYS_RESOURCE, SYS_PTRACE, SYSLOG, IPC_LOCK, NET_ADMIN, NET_RAW microsoft-defender-low-level-collector Added Linux capabilities kube-system NET_RAW, NET_ADMIN microsoft-defender-pod-collector Added Linux capabilities kube-system SYS_ADMIN, SYS_RESOURCE, SYS_PTRACE, SYSLOG, IPC_LOCK, NET_ADMIN, NET_RAW microsoft-defender-low-level-collector Added Linux capabilities kube-system NET_RAW, NET_ADMIN microsoft-defender-pod-collector Added Linux capabilities kube-system SYS_ADMIN, SYS_RESOURCE, SYS_PTRACE, SYSLOG, IPC_LOCK, NET_ADMIN, NET_RAW microsoft-defender-low-level-collector Added Linux capabilities kube-system NET_RAW, NET_ADMIN microsoft-defender-pod-collector Added Linux capabilities kube-system NET_RAW, NET_ADMIN microsoft-defender-publisher Added Linux capabilities kube-system NET_RAW, NET_ADMIN microsoft-defender-publisher Added Linux capabilities kube-system NET_RAW, NET_ADMIN microsoft-defender-publisher Added Linux capabilities kube-system NET_RAW, NET_ADMIN microsoft-defender-publisher Added Linux capabilities kube-system NET_RAW, NET_ADMIN microsoft-defender-publisher Added Linux capabilities kube-system NET_RAW, NET_ADMIN microsoft-defender-publisher Added Linux capabilities kube-system SYS_ADMIN, SYS_RESOURCE, NET_ADMIN, NET_RAW, IPC_LOCK retina Added Linux capabilities kube-system SYS_ADMIN, SYS_RESOURCE, NET_ADMIN, NET_RAW, IPC_LOCK retina Added Linux capabilities kube-system SYS_ADMIN, SYS_RESOURCE, NET_ADMIN, NET_RAW, IPC_LOCK retina Added Linux capabilities kube-system SYS_ADMIN, SYS_RESOURCE, NET_ADMIN, NET_RAW, IPC_LOCK retina Added Linux capabilities kube-system SYS_ADMIN, SYS_RESOURCE, NET_ADMIN, NET_RAW, IPC_LOCK retina Added Linux capabilities kube-system SYS_ADMIN, SYS_RESOURCE, NET_ADMIN, NET_RAW, IPC_LOCK retina Added Linux capabilities kube-system Category: Pod Security Severity: Medium Recommendation: Avoid adding capabilities unless necessary. Most apps don’t need them. URL: https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted SEC013 - EmptyDir Volume Usage Total Issues: 98 Issue Namespace Pod Volume ----- --------- --- ------ EmptyDir volume used aks-istio-ingress aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-hdfn4 workload-socket EmptyDir volume used aks-istio-ingress aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-hdfn4 credential-socket EmptyDir volume used aks-istio-ingress aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-hdfn4 workload-certs EmptyDir volume used aks-istio-ingress aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-hdfn4 istio-envoy EmptyDir volume used aks-istio-ingress aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-hdfn4 istio-data EmptyDir volume used aks-istio-ingress aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-zqwtb workload-socket EmptyDir volume used aks-istio-ingress aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-zqwtb credential-socket EmptyDir volume used aks-istio-ingress aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-zqwtb workload-certs EmptyDir volume used aks-istio-ingress aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-zqwtb istio-envoy EmptyDir volume used aks-istio-ingress aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-zqwtb istio-data EmptyDir volume used aks-istio-system istiod-asm-1-23-7744d5fbf4-9572m local-certs EmptyDir volume used aks-istio-system istiod-asm-1-23-7744d5fbf4-rqzvt local-certs EmptyDir volume used argocd argocd-application-controller-0 argocd-home EmptyDir volume used argocd argocd-application-controller-0 argocd-application-controller-tmp EmptyDir volume used argocd argocd-applicationset-controller-6fdf84dbb6-msffz gpg-keyring EmptyDir volume used argocd argocd-applicationset-controller-6fdf84dbb6-msffz tmp EmptyDir volume used argocd argocd-dex-server-556c76889-h4kxj static-files EmptyDir volume used argocd argocd-dex-server-556c76889-h4kxj dexconfig EmptyDir volume used argocd argocd-redis-ha-haproxy-fb657456c-kjbkq shared-socket EmptyDir volume used argocd argocd-redis-ha-haproxy-fb657456c-kjbkq data EmptyDir volume used argocd argocd-redis-ha-haproxy-fb657456c-kjlpf shared-socket EmptyDir volume used argocd argocd-redis-ha-haproxy-fb657456c-kjlpf data EmptyDir volume used argocd argocd-redis-ha-haproxy-fb657456c-tnjmb shared-socket EmptyDir volume used argocd argocd-redis-ha-haproxy-fb657456c-tnjmb data EmptyDir volume used argocd argocd-redis-ha-server-0 data EmptyDir volume used argocd argocd-redis-ha-server-1 data EmptyDir volume used argocd argocd-redis-ha-server-2 data EmptyDir volume used argocd argocd-repo-server-8568fc89b5-sx6ks gpg-keyring EmptyDir volume used argocd argocd-repo-server-8568fc89b5-sx6ks tmp EmptyDir volume used argocd argocd-repo-server-8568fc89b5-sx6ks helm-working-dir EmptyDir volume used argocd argocd-repo-server-8568fc89b5-sx6ks var-files EmptyDir volume used argocd argocd-repo-server-8568fc89b5-sx6ks plugins EmptyDir volume used argocd argocd-repo-server-8568fc89b5-xrzzn gpg-keyring EmptyDir volume used argocd argocd-repo-server-8568fc89b5-xrzzn tmp EmptyDir volume used argocd argocd-repo-server-8568fc89b5-xrzzn helm-working-dir EmptyDir volume used argocd argocd-repo-server-8568fc89b5-xrzzn var-files EmptyDir volume used argocd argocd-repo-server-8568fc89b5-xrzzn plugins EmptyDir volume used argocd argocd-server-54f9645b87-k4rz8 plugins-home EmptyDir volume used argocd argocd-server-54f9645b87-k4rz8 tmp EmptyDir volume used argocd argocd-server-54f9645b87-wwzgz plugins-home EmptyDir volume used argocd argocd-server-54f9645b87-wwzgz tmp EmptyDir volume used gatekeeper-system gatekeeper-audit-77858c8f69-7k782 tmp-volume EmptyDir volume used kiali-operator kiali-operator-696bd54db-mr8md tmp EmptyDir volume used kube-system ama-logs-4v8mz mdsd-prometheus-sock EmptyDir volume used kube-system ama-logs-5vr2w mdsd-prometheus-sock EmptyDir volume used kube-system ama-logs-fmd7b mdsd-prometheus-sock EmptyDir volume used kube-system ama-logs-fpkw6 mdsd-prometheus-sock EmptyDir volume used kube-system ama-logs-gqs28 mdsd-prometheus-sock EmptyDir volume used kube-system ama-logs-ndxrw mdsd-prometheus-sock EmptyDir volume used kube-system ama-metrics-operator-targets-66fb46c8d6-vskdg ta-config-shared EmptyDir volume used kube-system azure-npm-jsbbh tmp EmptyDir volume used kube-system azure-npm-lp6sf tmp EmptyDir volume used kube-system azure-npm-nv6xx tmp EmptyDir volume used kube-system azure-npm-p6fpw tmp EmptyDir volume used kube-system azure-npm-vsrfp tmp EmptyDir volume used kube-system azure-npm-z8mcz tmp EmptyDir volume used kube-system coredns-658d6d767d-757xp tmp EmptyDir volume used kube-system coredns-658d6d767d-pt6l6 tmp EmptyDir volume used kube-system metrics-server-5f9ccffcc4-jsrjl tmp-dir EmptyDir volume used kube-system metrics-server-5f9ccffcc4-v88pw tmp-dir EmptyDir volume used kube-system microsoft-defender-collector-ds-6xdfq ebpf EmptyDir volume used kube-system microsoft-defender-collector-ds-89l74 ebpf EmptyDir volume used kube-system microsoft-defender-collector-ds-d7gwk ebpf EmptyDir volume used kube-system microsoft-defender-collector-ds-mdcs8 ebpf EmptyDir volume used kube-system microsoft-defender-collector-ds-q6d6c ebpf EmptyDir volume used kube-system microsoft-defender-collector-ds-wb5dm ebpf EmptyDir volume used kube-system microsoft-defender-publisher-ds-2ql5b fluent-bit-conf EmptyDir volume used kube-system microsoft-defender-publisher-ds-2rsrw fluent-bit-conf EmptyDir volume used kube-system microsoft-defender-publisher-ds-jj6dh fluent-bit-conf EmptyDir volume used kube-system microsoft-defender-publisher-ds-l5crs fluent-bit-conf EmptyDir volume used kube-system microsoft-defender-publisher-ds-lfk8h fluent-bit-conf EmptyDir volume used kube-system microsoft-defender-publisher-ds-vz2c6 fluent-bit-conf EmptyDir volume used kube-system retina-agent-cgv48 tmp EmptyDir volume used kube-system retina-agent-gjxk8 tmp EmptyDir volume used kube-system retina-agent-js76w tmp EmptyDir volume used kube-system retina-agent-lfn7d tmp EmptyDir volume used kube-system retina-agent-qc9bs tmp EmptyDir volume used kube-system retina-agent-wlt7b tmp EmptyDir volume used pets order-service-6c5bfb6946-b58xq workload-socket EmptyDir volume used pets order-service-6c5bfb6946-b58xq credential-socket EmptyDir volume used pets order-service-6c5bfb6946-b58xq workload-certs EmptyDir volume used pets order-service-6c5bfb6946-b58xq istio-envoy EmptyDir volume used pets order-service-6c5bfb6946-b58xq istio-data EmptyDir volume used pets product-service-5dd87dfb8-ssfxc workload-socket EmptyDir volume used pets product-service-5dd87dfb8-ssfxc credential-socket EmptyDir volume used pets product-service-5dd87dfb8-ssfxc workload-certs EmptyDir volume used pets product-service-5dd87dfb8-ssfxc istio-envoy EmptyDir volume used pets product-service-5dd87dfb8-ssfxc istio-data EmptyDir volume used pets rabbitmq-0 workload-socket EmptyDir volume used pets rabbitmq-0 credential-socket EmptyDir volume used pets rabbitmq-0 workload-certs EmptyDir volume used pets rabbitmq-0 istio-envoy EmptyDir volume used pets rabbitmq-0 istio-data EmptyDir volume used pets store-front-658994fd95-pk9qn workload-socket EmptyDir volume used pets store-front-658994fd95-pk9qn credential-socket EmptyDir volume used pets store-front-658994fd95-pk9qn workload-certs EmptyDir volume used pets store-front-658994fd95-pk9qn istio-envoy EmptyDir volume used pets store-front-658994fd95-pk9qn istio-data Category: Pod Security Severity: Low Recommendation: Use persistent volumes or configMaps instead of EmptyDir when persistence is required. URL: https://kubernetes.io/docs/concepts/storage/volumes/#emptydir SEC014 - Untrusted Image Registries Total Issues: 180 Container Image --------- ----- istio-proxy mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless istio-proxy mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless discovery mcr.microsoft.com/oss/istio/pilot:1.23.5-distroless discovery mcr.microsoft.com/oss/istio/pilot:1.23.5-distroless controller mcr.microsoft.com/oss/kubernetes/ingress/nginx-ingress-controller:v1.11.5 controller mcr.microsoft.com/oss/kubernetes/ingress/nginx-ingress-controller:v1.11.5 webserver-simple docker.io/kostiscodefresh/gitops-simple-app:v1.0 webserver-simple docker.io/kostiscodefresh/gitops-simple-app:v1.0 argocd-application-controller mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 argocd-applicationset-controller mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 dex mcr.microsoft.com/oss/v2/dexidp/dex:v2.41.1 argocd-notifications-controller mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 haproxy mcr.microsoft.com/oss/v2/haproxy/haproxy:v2.9.11 haproxy mcr.microsoft.com/oss/v2/haproxy/haproxy:v2.9.11 haproxy mcr.microsoft.com/oss/v2/haproxy/haproxy:v2.9.11 redis mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 sentinel mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 split-brain-fix mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 redis mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 sentinel mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 split-brain-fix mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 redis mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 sentinel mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 split-brain-fix mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 argocd-repo-server mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 argocd-repo-server mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 argocd-server mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 argocd-server mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 webserver-simple docker.io/kostiscodefresh/gitops-simple-app:v1.0 gatekeeper-audit-container mcr.microsoft.com/oss/v2/open-policy-agent/gatekeeper:v3.18.2-1 gatekeeper-controller-container mcr.microsoft.com/oss/v2/open-policy-agent/gatekeeper:v3.18.2-1 gatekeeper-controller-container mcr.microsoft.com/oss/v2/open-policy-agent/gatekeeper:v3.18.2-1 webserver-simple docker.io/kostiscodefresh/gitops-simple-app:v1.0 kiali quay.io/kiali/kiali:v2.7.1 operator quay.io/kiali/kiali-operator:v2.7.1 node-driver-registrar mcr.microsoft.com/oss/kubernetes-csi/csi-node-driver-registrar:v2.11.1 secrets-store mcr.microsoft.com/oss/kubernetes-csi/secrets-store/driver:v1.4.8 liveness-probe mcr.microsoft.com/oss/kubernetes-csi/livenessprobe:v2.13.1 node-driver-registrar mcr.microsoft.com/oss/kubernetes-csi/csi-node-driver-registrar:v2.11.1 secrets-store mcr.microsoft.com/oss/kubernetes-csi/secrets-store/driver:v1.4.8 liveness-probe mcr.microsoft.com/oss/kubernetes-csi/livenessprobe:v2.13.1 node-driver-registrar mcr.microsoft.com/oss/kubernetes-csi/csi-node-driver-registrar:v2.11.1 secrets-store mcr.microsoft.com/oss/kubernetes-csi/secrets-store/driver:v1.4.8 liveness-probe mcr.microsoft.com/oss/kubernetes-csi/livenessprobe:v2.13.1 node-driver-registrar mcr.microsoft.com/oss/kubernetes-csi/csi-node-driver-registrar:v2.11.1 secrets-store mcr.microsoft.com/oss/kubernetes-csi/secrets-store/driver:v1.4.8 liveness-probe mcr.microsoft.com/oss/kubernetes-csi/livenessprobe:v2.13.1 node-driver-registrar mcr.microsoft.com/oss/kubernetes-csi/csi-node-driver-registrar:v2.11.1 secrets-store mcr.microsoft.com/oss/kubernetes-csi/secrets-store/driver:v1.4.8 liveness-probe mcr.microsoft.com/oss/kubernetes-csi/livenessprobe:v2.13.1 node-driver-registrar mcr.microsoft.com/oss/kubernetes-csi/csi-node-driver-registrar:v2.11.1 secrets-store mcr.microsoft.com/oss/kubernetes-csi/secrets-store/driver:v1.4.8 liveness-probe mcr.microsoft.com/oss/kubernetes-csi/livenessprobe:v2.13.1 provider-azure-installer mcr.microsoft.com/oss/azure/secrets-store/provider-azure:v1.6.2 provider-azure-installer mcr.microsoft.com/oss/azure/secrets-store/provider-azure:v1.6.2 provider-azure-installer mcr.microsoft.com/oss/azure/secrets-store/provider-azure:v1.6.2 provider-azure-installer mcr.microsoft.com/oss/azure/secrets-store/provider-azure:v1.6.2 provider-azure-installer mcr.microsoft.com/oss/azure/secrets-store/provider-azure:v1.6.2 provider-azure-installer mcr.microsoft.com/oss/azure/secrets-store/provider-azure:v1.6.2 ama-logs mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26 ama-logs-prometheus mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26 ama-logs mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26 ama-logs-prometheus mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26 ama-logs mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26 ama-logs-prometheus mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26 ama-logs mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26 ama-logs-prometheus mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26 ama-logs mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26 ama-logs-prometheus mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26 ama-logs mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26 ama-logs-prometheus mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26 ama-logs mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26 prometheus-collector mcr.microsoft.com/azuremonitor/containerinsights/ciprod/prometheus-collector/images:6.15.0-main-02-21-2025-4acb2… addon-token-adapter mcr.microsoft.com/aks/msi/addon-token-adapter:master.250224.1 prometheus-collector mcr.microsoft.com/azuremonitor/containerinsights/ciprod/prometheus-collector/images:6.15.0-main-02-21-2025-4acb2… addon-token-adapter mcr.microsoft.com/aks/msi/addon-token-adapter:master.250224.1 ama-metrics-ksm mcr.microsoft.com/oss/kubernetes/kube-state-metrics:v2.12.0 prometheus-collector mcr.microsoft.com/azuremonitor/containerinsights/ciprod/prometheus-collector/images:6.15.0-main-02-21-2025-4acb2… addon-token-adapter mcr.microsoft.com/aks/msi/addon-token-adapter:master.250224.1 prometheus-collector mcr.microsoft.com/azuremonitor/containerinsights/ciprod/prometheus-collector/images:6.15.0-main-02-21-2025-4acb2… addon-token-adapter mcr.microsoft.com/aks/msi/addon-token-adapter:master.250224.1 prometheus-collector mcr.microsoft.com/azuremonitor/containerinsights/ciprod/prometheus-collector/images:6.15.0-main-02-21-2025-4acb2… addon-token-adapter mcr.microsoft.com/aks/msi/addon-token-adapter:master.250224.1 prometheus-collector mcr.microsoft.com/azuremonitor/containerinsights/ciprod/prometheus-collector/images:6.15.0-main-02-21-2025-4acb2… addon-token-adapter mcr.microsoft.com/aks/msi/addon-token-adapter:master.250224.1 prometheus-collector mcr.microsoft.com/azuremonitor/containerinsights/ciprod/prometheus-collector/images:6.15.0-main-02-21-2025-4acb2… addon-token-adapter mcr.microsoft.com/aks/msi/addon-token-adapter:master.250224.1 prometheus-collector mcr.microsoft.com/azuremonitor/containerinsights/ciprod/prometheus-collector/images:6.15.0-main-02-21-2025-4acb2… addon-token-adapter mcr.microsoft.com/aks/msi/addon-token-adapter:master.250224.1 targetallocator mcr.microsoft.com/azuremonitor/containerinsights/ciprod/prometheus-collector/images:6.15.0-main-02-21-2025-4acb2… config-reader mcr.microsoft.com/azuremonitor/containerinsights/ciprod/prometheus-collector/images:6.15.0-main-02-21-2025-4acb2… azure-ip-masq-agent mcr.microsoft.com/oss/v2/azure/ip-masq-agent-v2:v0.1.15-2 azure-ip-masq-agent mcr.microsoft.com/oss/v2/azure/ip-masq-agent-v2:v0.1.15-2 azure-ip-masq-agent mcr.microsoft.com/oss/v2/azure/ip-masq-agent-v2:v0.1.15-2 azure-ip-masq-agent mcr.microsoft.com/oss/v2/azure/ip-masq-agent-v2:v0.1.15-2 azure-ip-masq-agent mcr.microsoft.com/oss/v2/azure/ip-masq-agent-v2:v0.1.15-2 azure-ip-masq-agent mcr.microsoft.com/oss/v2/azure/ip-masq-agent-v2:v0.1.15-2 azure-npm mcr.microsoft.com/containernetworking/azure-npm:v1.5.45 azure-npm mcr.microsoft.com/containernetworking/azure-npm:v1.5.45 azure-npm mcr.microsoft.com/containernetworking/azure-npm:v1.5.45 azure-npm mcr.microsoft.com/containernetworking/azure-npm:v1.5.45 azure-npm mcr.microsoft.com/containernetworking/azure-npm:v1.5.45 azure-npm mcr.microsoft.com/containernetworking/azure-npm:v1.5.45 azure-policy mcr.microsoft.com/azure-policy/policy-kubernetes-addon-prod:1.10.1 azure-policy-webhook mcr.microsoft.com/azure-policy/policy-kubernetes-webhook:1.10.0 manager mcr.microsoft.com/oss/azure/workload-identity/webhook:v1.4.0 manager mcr.microsoft.com/oss/azure/workload-identity/webhook:v1.4.0 cloud-node-manager mcr.microsoft.com/oss/kubernetes/azure-cloud-node-manager:v1.30.10 cloud-node-manager mcr.microsoft.com/oss/kubernetes/azure-cloud-node-manager:v1.30.10 cloud-node-manager mcr.microsoft.com/oss/kubernetes/azure-cloud-node-manager:v1.30.10 cloud-node-manager mcr.microsoft.com/oss/kubernetes/azure-cloud-node-manager:v1.30.10 cloud-node-manager mcr.microsoft.com/oss/kubernetes/azure-cloud-node-manager:v1.30.10 cloud-node-manager mcr.microsoft.com/oss/kubernetes/azure-cloud-node-manager:v1.30.10 coredns mcr.microsoft.com/oss/v2/kubernetes/coredns:v1.9.4-5 coredns mcr.microsoft.com/oss/v2/kubernetes/coredns:v1.9.4-5 autoscaler mcr.microsoft.com/oss/v2/kubernetes/autoscaler/cluster-proportional-autoscaler:v1.8.11-5 manager mcr.microsoft.com/oss/v2/eraser/eraser-manager:v1.4.0-2 extension-agent mcr.microsoft.com/azurearck8s/aks/stable/config-agent:1.23.3 fluent-bit mcr.microsoft.com/azurearck8s/aks/stable/fluent-bit-collector:1.23.3 manager mcr.microsoft.com/azurearck8s/aks/stable/extensionoperator:1.23.3 fluent-bit mcr.microsoft.com/azurearck8s/aks/stable/fluent-bit-collector:1.23.3 keda-admission-webhooks mcr.microsoft.com/oss/kedacore/keda-admission-webhooks:2.14.1 keda-admission-webhooks mcr.microsoft.com/oss/kedacore/keda-admission-webhooks:2.14.1 keda-operator mcr.microsoft.com/oss/kedacore/keda:2.14.1 keda-operator mcr.microsoft.com/oss/kedacore/keda:2.14.1 keda-operator-metrics-apiserver mcr.microsoft.com/oss/kedacore/keda-metrics-apiserver:2.14.1 keda-operator-metrics-apiserver mcr.microsoft.com/oss/kedacore/keda-metrics-apiserver:2.14.1 konnectivity-agent mcr.microsoft.com/oss/kubernetes/apiserver-network-proxy/agent:v0.30.3-hotfix.20240819 konnectivity-agent mcr.microsoft.com/oss/kubernetes/apiserver-network-proxy/agent:v0.30.3-hotfix.20240819 autoscaler mcr.microsoft.com/oss/v2/kubernetes/autoscaler/cluster-proportional-autoscaler:v1.8.11-5 kube-proxy mcr.microsoft.com/oss/kubernetes/kube-proxy:v1.30.11 kube-proxy mcr.microsoft.com/oss/kubernetes/kube-proxy:v1.30.11 kube-proxy mcr.microsoft.com/oss/kubernetes/kube-proxy:v1.30.11 kube-proxy mcr.microsoft.com/oss/kubernetes/kube-proxy:v1.30.11 kube-proxy mcr.microsoft.com/oss/kubernetes/kube-proxy:v1.30.11 kube-proxy mcr.microsoft.com/oss/kubernetes/kube-proxy:v1.30.11 metrics-server-vpa mcr.microsoft.com/oss/v2/kubernetes/autoscaler/addon-resizer:v1.8.23-2 metrics-server mcr.microsoft.com/oss/v2/kubernetes/metrics-server:v0.6.3-5 metrics-server-vpa mcr.microsoft.com/oss/v2/kubernetes/autoscaler/addon-resizer:v1.8.23-2 metrics-server mcr.microsoft.com/oss/v2/kubernetes/metrics-server:v0.6.3-5 microsoft-defender-pod-collector mcr.microsoft.com/azuredefender/stable/pod-collector:1.0.164 microsoft-defender-low-level-collector mcr.microsoft.com/azuredefender/stable/low-level-collector:2.0.198 microsoft-defender-pod-collector mcr.microsoft.com/azuredefender/stable/pod-collector:1.0.164 microsoft-defender-low-level-collector mcr.microsoft.com/azuredefender/stable/low-level-collector:2.0.198 microsoft-defender-pod-collector mcr.microsoft.com/azuredefender/stable/pod-collector:1.0.164 microsoft-defender-low-level-collector mcr.microsoft.com/azuredefender/stable/low-level-collector:2.0.198 microsoft-defender-pod-collector mcr.microsoft.com/azuredefender/stable/pod-collector:1.0.164 microsoft-defender-low-level-collector mcr.microsoft.com/azuredefender/stable/low-level-collector:2.0.198 microsoft-defender-pod-collector mcr.microsoft.com/azuredefender/stable/pod-collector:1.0.164 microsoft-defender-low-level-collector mcr.microsoft.com/azuredefender/stable/low-level-collector:2.0.198 microsoft-defender-pod-collector mcr.microsoft.com/azuredefender/stable/pod-collector:1.0.164 microsoft-defender-low-level-collector mcr.microsoft.com/azuredefender/stable/low-level-collector:2.0.198 microsoft-defender-pod-collector mcr.microsoft.com/azuredefender/stable/pod-collector:1.0.164 microsoft-defender-publisher mcr.microsoft.com/azuredefender/stable/security-publisher:1.0.204 microsoft-defender-publisher mcr.microsoft.com/azuredefender/stable/security-publisher:1.0.204 microsoft-defender-publisher mcr.microsoft.com/azuredefender/stable/security-publisher:1.0.204 microsoft-defender-publisher mcr.microsoft.com/azuredefender/stable/security-publisher:1.0.204 microsoft-defender-publisher mcr.microsoft.com/azuredefender/stable/security-publisher:1.0.204 microsoft-defender-publisher mcr.microsoft.com/azuredefender/stable/security-publisher:1.0.204 retina mcr.microsoft.com/containernetworking/retina-agent:v0.0.30 retina mcr.microsoft.com/containernetworking/retina-agent:v0.0.30 retina mcr.microsoft.com/containernetworking/retina-agent:v0.0.30 retina mcr.microsoft.com/containernetworking/retina-agent:v0.0.30 retina mcr.microsoft.com/containernetworking/retina-agent:v0.0.30 retina mcr.microsoft.com/containernetworking/retina-agent:v0.0.30 admission-controller mcr.microsoft.com/oss/kubernetes/autoscaler/vpa-admission-controller:1.0.0 admission-controller mcr.microsoft.com/oss/kubernetes/autoscaler/vpa-admission-controller:1.0.0 recommender mcr.microsoft.com/oss/kubernetes/autoscaler/vpa-recommender:1.0.0 updater mcr.microsoft.com/oss/kubernetes/autoscaler/vpa-updater:1.0.0 webserver-simple docker.io/kostiscodefresh/gitops-simple-app:v1.0 webserver-simple docker.io/kostiscodefresh/gitops-simple-app:v1.0 webserver-simple docker.io/kostiscodefresh/gitops-simple-app:v1.0 istio-proxy mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless istio-proxy mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless rabbitmq mcr.microsoft.com/mirror/docker/library/rabbitmq:3.10-management-alpine istio-proxy mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless istio-proxy mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless webserver-simple docker.io/kostiscodefresh/gitops-simple-app:v1.0 webserver-simple docker.io/kostiscodefresh/gitops-simple-app:v1.0 webserver-simple docker.io/kostiscodefresh/gitops-simple-app:v1.0 Category: Pod Security Severity: High Recommendation: Use only trusted registries. Restrict deployment sources via policy. URL: https://kubernetes.io/docs/concepts/containers/images/ SEC015 - Pods Using Default ServiceAccount Total Issues: 20 Issue Namespace Pod ServiceAccount ----- --------- --- -------------- Using default ServiceAccount argo-rollouts simple-deployment-74fd649f8d-996vt default Using default ServiceAccount argo-workflows simple-deployment-74fd649f8d-24t56 default Using default ServiceAccount cert-manager simple-deployment-74fd649f8d-7cht8 default Using default ServiceAccount grafana simple-deployment-74fd649f8d-l7wrd default Using default ServiceAccount kube-system azure-ip-masq-agent-4522j default Using default ServiceAccount kube-system azure-ip-masq-agent-4c7cr default Using default ServiceAccount kube-system azure-ip-masq-agent-78rnw default Using default ServiceAccount kube-system azure-ip-masq-agent-84ltn default Using default ServiceAccount kube-system azure-ip-masq-agent-t4c2w default Using default ServiceAccount kube-system azure-ip-masq-agent-vbdd8 default Using default ServiceAccount kubeview simple-deployment-74fd649f8d-qxp2r default Using default ServiceAccount linkerd simple-deployment-74fd649f8d-mkmst default Using default ServiceAccount nginx simple-deployment-74fd649f8d-hlcdk default Using default ServiceAccount pets order-service-6c5bfb6946-b58xq default Using default ServiceAccount pets product-service-5dd87dfb8-ssfxc default Using default ServiceAccount pets rabbitmq-0 default Using default ServiceAccount pets store-front-658994fd95-pk9qn default Using default ServiceAccount prometheus simple-deployment-74fd649f8d-2x6w5 default Using default ServiceAccount sealed-secrets simple-deployment-74fd649f8d-stktp default Using default ServiceAccount test simple-deployment-74fd649f8d-lhlkx default Category: Pod Security Severity: Medium Recommendation: Assign a dedicated ServiceAccount to each workload with least-privilege permissions. URL: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/ SEC016 - Non-Existent Secret References Total Issues: 33 Issue Namespace Pod Secret Volume ----- --------- --- ------ ------ Missing secret reference in volume aks-istio-system istiod-asm-1-23-7744d5fbf4-9572m cacerts cacerts Missing secret reference in volume aks-istio-system istiod-asm-1-23-7744d5fbf4-9572m istio-kubeconfig istio-kubeconfig Missing secret reference in volume aks-istio-system istiod-asm-1-23-7744d5fbf4-9572m istiod-tls istio-csr-dns-cert Missing secret reference in volume aks-istio-system istiod-asm-1-23-7744d5fbf4-rqzvt cacerts cacerts Missing secret reference in volume aks-istio-system istiod-asm-1-23-7744d5fbf4-rqzvt istio-kubeconfig istio-kubeconfig Missing secret reference in volume aks-istio-system istiod-asm-1-23-7744d5fbf4-rqzvt istiod-tls istio-csr-dns-cert Missing secret reference in volume argocd argocd-application-controller-0 argocd-repo-server-tls argocd-repo-server-tls Missing secret reference in volume argocd argocd-applicationset-controller-6fdf84dbb6-msffz argocd-repo-server-tls argocd-repo-server-tls Missing secret reference in volume argocd argocd-dex-server-556c76889-h4kxj argocd-dex-server-tls argocd-dex-server-tls Missing secret reference in volume argocd argocd-notifications-controller-6ff6bf8dd6-nbktr argocd-repo-server-tls argocd-repo-server-tls Missing secret reference in volume argocd argocd-repo-server-8568fc89b5-sx6ks argocd-repo-server-tls argocd-repo-server-tls Missing secret reference in volume argocd argocd-repo-server-8568fc89b5-xrzzn argocd-repo-server-tls argocd-repo-server-tls Missing secret reference in volume argocd argocd-server-54f9645b87-k4rz8 argocd-repo-server-tls argocd-repo-server-tls Missing secret reference in volume argocd argocd-server-54f9645b87-k4rz8 argocd-dex-server-tls argocd-dex-server-tls Missing secret reference in volume argocd argocd-server-54f9645b87-wwzgz argocd-repo-server-tls argocd-repo-server-tls Missing secret reference in volume argocd argocd-server-54f9645b87-wwzgz argocd-dex-server-tls argocd-dex-server-tls Missing secret reference in volume kiali-operator kiali-5b88cfb6f8-cm8dz kiali kiali-secret Missing secret reference in volume kube-system ama-logs-4v8mz ama-logs-adx-secret ama-logs-adx-secret Missing secret reference in volume kube-system ama-logs-5vr2w ama-logs-adx-secret ama-logs-adx-secret Missing secret reference in volume kube-system ama-logs-fmd7b ama-logs-adx-secret ama-logs-adx-secret Missing secret reference in volume kube-system ama-logs-fpkw6 ama-logs-adx-secret ama-logs-adx-secret Missing secret reference in volume kube-system ama-logs-gqs28 ama-logs-adx-secret ama-logs-adx-secret Missing secret reference in volume kube-system ama-logs-ndxrw ama-logs-adx-secret ama-logs-adx-secret Missing secret reference in volume kube-system ama-logs-rs-64765bd4b9-ldxwl ama-logs-adx-secret ama-logs-adx-secret Missing secret reference in volume kube-system ama-metrics-7f878d975f-hlggb ama-metrics-mtls-secret ama-metrics-tls-secret-vo… Missing secret reference in volume kube-system ama-metrics-7f878d975f-q2mlg ama-metrics-mtls-secret ama-metrics-tls-secret-vo… Missing secret reference in volume kube-system ama-metrics-node-2ssrw ama-metrics-mtls-secret ama-metrics-tls-secret-vo… Missing secret reference in volume kube-system ama-metrics-node-6kkz8 ama-metrics-mtls-secret ama-metrics-tls-secret-vo… Missing secret reference in volume kube-system ama-metrics-node-9h44h ama-metrics-mtls-secret ama-metrics-tls-secret-vo… Missing secret reference in volume kube-system ama-metrics-node-lhk42 ama-metrics-mtls-secret ama-metrics-tls-secret-vo… Missing secret reference in volume kube-system ama-metrics-node-nm5bf ama-metrics-mtls-secret ama-metrics-tls-secret-vo… Missing secret reference in volume kube-system ama-metrics-node-pqcz5 ama-metrics-mtls-secret ama-metrics-tls-secret-vo… Missing secret reference in volume kube-system ama-metrics-operator-targets-66fb46c8d6-vskdg ama-metrics-mtls-secret ama-metrics-tls-secret-vo… Category: Pod Security Severity: High Recommendation: Verify that all Secrets referenced by pods exist in the target namespace. URL: https://kubernetes.io/docs/concepts/configuration/secret/ WRK001 - DaemonSets Not Fully Running Total Issues: 0 ✅ No issues detected for DaemonSets Not Fully Running. Category: Workloads Severity: Warning Recommendation: Investigate DaemonSets not fully running. Common causes include taints, node issues, or resource constraints. URL: https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/ WRK002 - Deployment Missing Replicas Total Issues: 0 ✅ No issues detected for Deployment Missing Replicas. Category: Workloads Severity: Warning Recommendation: Check Deployments that are not meeting their replica count. This may indicate rollout issues or failed pods. URL: https://kubernetes.io/docs/concepts/workloads/controllers/deployment/ WRK003 - StatefulSet Incomplete Rollout Total Issues: 0 ✅ No issues detected for StatefulSet Incomplete Rollout. Category: Workloads Severity: Warning Recommendation: Investigate StatefulSets with missing ready replicas. This may indicate issues with pod readiness or volume binding. URL: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/ WRK004 - HPA Misconfiguration or Inactivity Total Issues: 0 ✅ No issues detected for HPA Misconfiguration or Inactivity. Category: Workloads Severity: Warning Recommendation: Review HorizontalPodAutoscalers with missing targets, no metrics, or disabled scaling. URL: https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/ WRK005 - Missing Resource Requests or Limits Total Issues: 94 Message Namespace Resource Value ------- --------- -------- ----- CPU and Memory Requests and CPU and Memory Limits missing aks-istio-ingress Deployment/aks-istio-ingressgateway-external-asm-1-23 istio-proxy CPU and Memory Requests and CPU and Memory Limits missing aks-istio-system Deployment/istiod-asm-1-23 discovery CPU and Memory Requests and CPU and Memory Limits missing app-routing-system Deployment/nginx controller CPU and Memory Requests and CPU and Memory Limits missing argo-rollouts Deployment/simple-deployment webserver-simple CPU and Memory Requests and CPU and Memory Limits missing argo-workflows Deployment/simple-deployment webserver-simple CPU and Memory Requests and CPU and Memory Limits missing argocd Deployment/argocd-applicationset-controller argocd-applicationse… CPU and Memory Requests and CPU and Memory Limits missing argocd Deployment/argocd-dex-server dex CPU and Memory Requests and CPU and Memory Limits missing argocd Deployment/argocd-dex-server copyutil CPU and Memory Requests and CPU and Memory Limits missing argocd Deployment/argocd-notifications-controller argocd-notifications… CPU and Memory Requests and CPU and Memory Limits missing argocd Deployment/argocd-redis-ha-haproxy haproxy CPU and Memory Requests and CPU and Memory Limits missing argocd Deployment/argocd-redis-ha-haproxy secret-init CPU and Memory Requests and CPU and Memory Limits missing argocd Deployment/argocd-redis-ha-haproxy config-init CPU and Memory Requests and CPU and Memory Limits missing argocd Deployment/argocd-repo-server argocd-repo-server CPU and Memory Requests and CPU and Memory Limits missing argocd Deployment/argocd-repo-server copyutil CPU and Memory Requests and CPU and Memory Limits missing argocd Deployment/argocd-server argocd-server CPU and Memory Requests and CPU and Memory Limits missing cert-manager Deployment/simple-deployment webserver-simple CPU and Memory Requests and CPU and Memory Limits missing gatekeeper-system Deployment/gatekeeper-audit gatekeeper-audit-con… CPU and Memory Requests and CPU and Memory Limits missing gatekeeper-system Deployment/gatekeeper-controller gatekeeper-controlle… CPU and Memory Requests and CPU and Memory Limits missing grafana Deployment/simple-deployment webserver-simple CPU and Memory Requests and CPU and Memory Limits missing kiali-operator Deployment/kiali kiali CPU and Memory Requests and CPU and Memory Limits missing kiali-operator Deployment/kiali-operator operator CPU and Memory Requests and CPU and Memory Limits missing kube-system Deployment/ama-logs-rs ama-logs CPU and Memory Requests and CPU and Memory Limits missing kube-system Deployment/ama-metrics prometheus-collector CPU and Memory Requests and CPU and Memory Limits missing kube-system Deployment/ama-metrics addon-token-adapter CPU and Memory Requests and CPU and Memory Limits missing kube-system Deployment/ama-metrics-ksm ama-metrics-ksm CPU and Memory Requests and CPU and Memory Limits missing kube-system Deployment/ama-metrics-operator-targets targetallocator CPU and Memory Requests and CPU and Memory Limits missing kube-system Deployment/ama-metrics-operator-targets config-reader CPU and Memory Requests and CPU and Memory Limits missing kube-system Deployment/azure-policy azure-policy CPU and Memory Requests and CPU and Memory Limits missing kube-system Deployment/azure-policy-webhook azure-policy-webhook CPU and Memory Requests and CPU and Memory Limits missing kube-system Deployment/azure-wi-webhook-controller-manager manager CPU and Memory Requests and CPU and Memory Limits missing kube-system Deployment/coredns coredns CPU and Memory Requests and CPU and Memory Limits missing kube-system Deployment/coredns-autoscaler autoscaler CPU and Memory Requests and CPU and Memory Limits missing kube-system Deployment/eraser-controller-manager manager CPU and Memory Requests and CPU and Memory Limits missing kube-system Deployment/extension-agent extension-agent CPU and Memory Requests and CPU and Memory Limits missing kube-system Deployment/extension-agent fluent-bit CPU and Memory Requests and CPU and Memory Limits missing kube-system Deployment/extension-operator manager CPU and Memory Requests and CPU and Memory Limits missing kube-system Deployment/extension-operator fluent-bit CPU and Memory Requests and CPU and Memory Limits missing kube-system Deployment/keda-admission-webhooks keda-admission-webho… CPU and Memory Requests and CPU and Memory Limits missing kube-system Deployment/keda-operator keda-operator CPU and Memory Requests and CPU and Memory Limits missing kube-system Deployment/keda-operator-metrics-apiserver keda-operator-metric… CPU and Memory Requests and CPU and Memory Limits missing kube-system Deployment/konnectivity-agent konnectivity-agent CPU and Memory Requests and CPU and Memory Limits missing kube-system Deployment/konnectivity-agent-autoscaler autoscaler CPU and Memory Requests and CPU and Memory Limits missing kube-system Deployment/metrics-server metrics-server-vpa CPU and Memory Requests and CPU and Memory Limits missing kube-system Deployment/metrics-server metrics-server CPU and Memory Requests and CPU and Memory Limits missing kube-system Deployment/microsoft-defender-collector-misc microsoft-defender-p… CPU and Memory Requests and CPU and Memory Limits missing kube-system Deployment/vpa-admission-controller admission-controller CPU and Memory Requests and CPU and Memory Limits missing kube-system Deployment/vpa-recommender recommender CPU and Memory Requests and CPU and Memory Limits missing kube-system Deployment/vpa-updater updater CPU and Memory Requests and CPU and Memory Limits missing kubeview Deployment/simple-deployment webserver-simple CPU and Memory Requests and CPU and Memory Limits missing linkerd Deployment/simple-deployment webserver-simple CPU and Memory Requests and CPU and Memory Limits missing nginx Deployment/simple-deployment webserver-simple CPU and Memory Requests and CPU and Memory Limits missing pets Deployment/order-service order-service CPU and Memory Requests and CPU and Memory Limits missing pets Deployment/order-service wait-for-rabbitmq CPU and Memory Requests and CPU and Memory Limits missing pets Deployment/product-service product-service CPU and Memory Requests and CPU and Memory Limits missing pets Deployment/store-front store-front CPU and Memory Requests and CPU and Memory Limits missing prometheus Deployment/simple-deployment webserver-simple CPU and Memory Requests and CPU and Memory Limits missing sealed-secrets Deployment/simple-deployment webserver-simple CPU and Memory Requests and CPU and Memory Limits missing test Deployment/simple-deployment webserver-simple CPU and Memory Requests and CPU and Memory Limits missing argocd StatefulSet/argocd-application-controller argocd-application-c… CPU and Memory Requests and CPU and Memory Limits missing argocd StatefulSet/argocd-redis-ha-server redis CPU and Memory Requests and CPU and Memory Limits missing argocd StatefulSet/argocd-redis-ha-server sentinel CPU and Memory Requests and CPU and Memory Limits missing argocd StatefulSet/argocd-redis-ha-server split-brain-fix CPU and Memory Requests and CPU and Memory Limits missing argocd StatefulSet/argocd-redis-ha-server config-init CPU and Memory Requests and CPU and Memory Limits missing pets StatefulSet/rabbitmq rabbitmq CPU and Memory Requests and CPU and Memory Limits missing kube-system DaemonSet/aks-secrets-store-csi-driver node-driver-registrar CPU and Memory Requests and CPU and Memory Limits missing kube-system DaemonSet/aks-secrets-store-csi-driver secrets-store CPU and Memory Requests and CPU and Memory Limits missing kube-system DaemonSet/aks-secrets-store-csi-driver liveness-probe CPU and Memory Requests and CPU and Memory Limits missing kube-system DaemonSet/aks-secrets-store-csi-driver-windows node-driver-registrar CPU and Memory Requests and CPU and Memory Limits missing kube-system DaemonSet/aks-secrets-store-csi-driver-windows secrets-store CPU and Memory Requests and CPU and Memory Limits missing kube-system DaemonSet/aks-secrets-store-csi-driver-windows liveness-probe CPU and Memory Requests and CPU and Memory Limits missing kube-system DaemonSet/aks-secrets-store-provider-azure provider-azure-insta… CPU and Memory Requests and CPU and Memory Limits missing kube-system DaemonSet/aks-secrets-store-provider-azure-windows provider-azure-insta… CPU and Memory Requests and CPU and Memory Limits missing kube-system DaemonSet/ama-logs ama-logs CPU and Memory Requests and CPU and Memory Limits missing kube-system DaemonSet/ama-logs ama-logs-prometheus CPU and Memory Requests and CPU and Memory Limits missing kube-system DaemonSet/ama-logs-windows ama-logs-windows CPU and Memory Requests and CPU and Memory Limits missing kube-system DaemonSet/ama-metrics-node prometheus-collector CPU and Memory Requests and CPU and Memory Limits missing kube-system DaemonSet/ama-metrics-node addon-token-adapter CPU and Memory Requests and CPU and Memory Limits missing kube-system DaemonSet/ama-metrics-win-node prometheus-collector CPU and Memory Requests and CPU and Memory Limits missing kube-system DaemonSet/ama-metrics-win-node addon-token-adapter-… CPU and Memory Requests and CPU and Memory Limits missing kube-system DaemonSet/azure-ip-masq-agent azure-ip-masq-agent CPU and Memory Requests and CPU and Memory Limits missing kube-system DaemonSet/azure-npm azure-npm CPU and Memory Requests and CPU and Memory Limits missing kube-system DaemonSet/azure-npm block-wireserver CPU and Memory Requests and CPU and Memory Limits missing kube-system DaemonSet/cloud-node-manager cloud-node-manager CPU and Memory Requests and CPU and Memory Limits missing kube-system DaemonSet/cloud-node-manager-windows cloud-node-manager CPU and Memory Requests and CPU and Memory Limits missing kube-system DaemonSet/kube-proxy kube-proxy CPU and Memory Requests and CPU and Memory Limits missing kube-system DaemonSet/kube-proxy kube-proxy-bootstrap CPU and Memory Requests and CPU and Memory Limits missing kube-system DaemonSet/microsoft-defender-collector-ds microsoft-defender-p… CPU and Memory Requests and CPU and Memory Limits missing kube-system DaemonSet/microsoft-defender-collector-ds microsoft-defender-l… CPU and Memory Requests and CPU and Memory Limits missing kube-system DaemonSet/microsoft-defender-publisher-ds microsoft-defender-p… CPU and Memory Requests and CPU and Memory Limits missing kube-system DaemonSet/microsoft-defender-publisher-ds old-file-cleaner CPU and Memory Requests and CPU and Memory Limits missing kube-system DaemonSet/retina-agent retina CPU and Memory Requests and CPU and Memory Limits missing kube-system DaemonSet/retina-agent retina-agent-init CPU and Memory Requests and CPU and Memory Limits missing kube-system DaemonSet/retina-agent-win retinawin CPU and Memory Requests and CPU and Memory Limits missing kube-system DaemonSet/windows-kube-proxy-initializer pause Category: Workloads Severity: Warning Recommendation: Specify resource requests and limits on all containers. URL: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/ WRK006 - PDB Coverage and Effectiveness Total Issues: 25 Issue Kind Name Namespace ----- ---- ---- --------- ⚠️ maxUnavailable = 100% PDB nginx app-routing-system ❌ No matching PDB Deployment simple-deployment argo-rollouts ❌ No matching PDB Deployment simple-deployment argo-workflows ❌ No matching PDB Deployment argocd-applicationset-controller argocd ❌ No matching PDB Deployment argocd-dex-server argocd ❌ No matching PDB Deployment argocd-notifications-controller argocd ❌ No matching PDB Deployment argocd-redis-ha-haproxy argocd ❌ No matching PDB Deployment argocd-repo-server argocd ❌ No matching PDB Deployment argocd-server argocd ❌ No matching PDB Deployment simple-deployment cert-manager ❌ No matching PDB Deployment simple-deployment grafana ❌ No matching PDB Deployment kiali kiali-operator ❌ No matching PDB Deployment kiali-operator kiali-operator ❌ No matching PDB Deployment simple-deployment kubeview ❌ No matching PDB Deployment simple-deployment linkerd ❌ No matching PDB Deployment simple-deployment nginx ❌ No matching PDB Deployment order-service pets ❌ No matching PDB Deployment product-service pets ❌ No matching PDB Deployment store-front pets ❌ No matching PDB Deployment simple-deployment prometheus ❌ No matching PDB Deployment simple-deployment sealed-secrets ❌ No matching PDB Deployment simple-deployment test ❌ No matching PDB StatefulSet argocd-application-controller argocd ❌ No matching PDB StatefulSet argocd-redis-ha-server argocd ❌ No matching PDB StatefulSet rabbitmq pets Category: PDBs Severity: High Recommendation: Workloads should have a valid PDB to prevent availability issues during disruptions. URL: https://kubernetes.io/docs/tasks/run-application/configure-pdb/ WRK007 - Missing Readiness and Liveness Probes Total Issues: 60 Container Kind Missing Namespace Workload --------- ---- ------- --------- -------- istio-proxy Deployment readiness, liveness aks-istio-ingress aks-istio-ingressgateway-external-asm-1-23 discovery Deployment liveness aks-istio-system istiod-asm-1-23 webserver-simple Deployment readiness, liveness argo-rollouts simple-deployment webserver-simple Deployment readiness, liveness argo-workflows simple-deployment argocd-applicationset-controller Deployment readiness, liveness argocd argocd-applicationset-controller dex Deployment readiness, liveness argocd argocd-dex-server argocd-notifications-controller Deployment readiness argocd argocd-notifications-controller webserver-simple Deployment readiness, liveness cert-manager simple-deployment webserver-simple Deployment readiness, liveness grafana simple-deployment ama-logs Deployment readiness kube-system ama-logs-rs prometheus-collector Deployment readiness kube-system ama-metrics addon-token-adapter Deployment readiness kube-system ama-metrics targetallocator Deployment readiness kube-system ama-metrics-operator-targets config-reader Deployment readiness kube-system ama-metrics-operator-targets autoscaler Deployment readiness kube-system coredns-autoscaler extension-agent Deployment readiness, liveness kube-system extension-agent fluent-bit Deployment readiness, liveness kube-system extension-agent manager Deployment readiness, liveness kube-system extension-operator fluent-bit Deployment readiness, liveness kube-system extension-operator autoscaler Deployment readiness kube-system konnectivity-agent-autoscaler metrics-server-vpa Deployment readiness, liveness kube-system metrics-server microsoft-defender-pod-collector Deployment readiness, liveness kube-system microsoft-defender-collector-misc admission-controller Deployment readiness, liveness kube-system vpa-admission-controller recommender Deployment readiness, liveness kube-system vpa-recommender updater Deployment readiness, liveness kube-system vpa-updater webserver-simple Deployment readiness, liveness kubeview simple-deployment webserver-simple Deployment readiness, liveness linkerd simple-deployment webserver-simple Deployment readiness, liveness nginx simple-deployment webserver-simple Deployment readiness, liveness prometheus simple-deployment webserver-simple Deployment readiness, liveness sealed-secrets simple-deployment webserver-simple Deployment readiness, liveness test simple-deployment argocd-application-controller StatefulSet liveness argocd argocd-application-controller split-brain-fix StatefulSet readiness, liveness argocd argocd-redis-ha-server rabbitmq StatefulSet readiness, liveness pets rabbitmq node-driver-registrar DaemonSet readiness kube-system aks-secrets-store-csi-driver secrets-store DaemonSet readiness kube-system aks-secrets-store-csi-driver liveness-probe DaemonSet readiness, liveness kube-system aks-secrets-store-csi-driver node-driver-registrar DaemonSet readiness kube-system aks-secrets-store-csi-driver-windows secrets-store DaemonSet readiness kube-system aks-secrets-store-csi-driver-windows liveness-probe DaemonSet readiness, liveness kube-system aks-secrets-store-csi-driver-windows provider-azure-installer DaemonSet readiness kube-system aks-secrets-store-provider-azure provider-azure-installer DaemonSet readiness kube-system aks-secrets-store-provider-azure-windows ama-logs DaemonSet readiness kube-system ama-logs ama-logs-prometheus DaemonSet readiness kube-system ama-logs ama-logs-windows DaemonSet readiness kube-system ama-logs-windows prometheus-collector DaemonSet readiness kube-system ama-metrics-node addon-token-adapter DaemonSet readiness kube-system ama-metrics-node prometheus-collector DaemonSet readiness kube-system ama-metrics-win-node addon-token-adapter-win DaemonSet readiness kube-system ama-metrics-win-node azure-ip-masq-agent DaemonSet readiness, liveness kube-system azure-ip-masq-agent azure-npm DaemonSet readiness, liveness kube-system azure-npm cloud-node-manager DaemonSet readiness, liveness kube-system cloud-node-manager cloud-node-manager DaemonSet readiness, liveness kube-system cloud-node-manager-windows kube-proxy DaemonSet readiness, liveness kube-system kube-proxy microsoft-defender-pod-collector DaemonSet readiness, liveness kube-system microsoft-defender-collector-ds microsoft-defender-low-level-collector DaemonSet readiness, liveness kube-system microsoft-defender-collector-ds microsoft-defender-publisher DaemonSet readiness, liveness kube-system microsoft-defender-publisher-ds retina DaemonSet liveness kube-system retina-agent retinawin DaemonSet readiness, liveness kube-system retina-agent-win pause DaemonSet readiness, liveness kube-system windows-kube-proxy-initializer Category: Probes Severity: Medium Recommendation: Add readiness and liveness probes to all containers to improve availability and fault detection. URL: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/ WRK008 - Deployment Selector Without Matching Pods Total Issues: 0 ✅ No issues detected for Deployment Selector Without Matching Pods. Category: Workloads Severity: Medium Recommendation: Ensure that pod labels match the Deployment selector. URL: https://kubernetes.io/docs/concepts/workloads/controllers/deployment/ [CFG001 - Orphaned ConfigMaps] Section: Configuration Hygiene Category: Best Practices Severity: Medium Recommendation: Delete unused ConfigMaps to clean up the cluster and reduce confusion. URL: https://kubernetes.io/docs/concepts/configuration/configmap/ ⚠️ Total Issues: 20 - Message: ConfigMap is not used by any workloads or services. | Namespace: aks-istio-system | Resource: configmap/istio-asm-1-23 | Value: - - Message: ConfigMap is not used by any workloads or services. | Namespace: aks-istio-system | Resource: configmap/istio-gateway-status-leader | Value: - - Message: ConfigMap is not used by any workloads or services. | Namespace: aks-istio-system | Resource: configmap/istio-leader | Value: - - Message: ConfigMap is not used by any workloads or services. | Namespace: aks-istio-system | Resource: configmap/istio-namespace-controller-election | Value: - - Message: ConfigMap is not used by any workloads or services. | Namespace: aks-istio-system | Resource: configmap/istio-sidecar-injector-asm-1-23 | Value: - - Message: ConfigMap is not used by any workloads or services. | Namespace: app-routing-system | Resource: configmap/nginx | Value: - - Message: ConfigMap is not used by any workloads or services. | Namespace: argocd | Resource: configmap/argocd-notifications-cm | Value: - - Message: ConfigMap is not used by any workloads or services. | Namespace: argocd | Resource: configmap/argocd-rbac-cm | Value: - - Message: ConfigMap is not used by any workloads or services. | Namespace: kube-system | Resource: configmap/azure-ip-masq-agent-config-reconciled | Value: - - Message: ConfigMap is not used by any workloads or services. | Namespace: kube-system | Resource: configmap/cluster-autoscaler-status | Value: - - Message: ConfigMap is not used by any workloads or services. | Namespace: kube-system | Resource: configmap/container-azm-ms-aks-k8scluster | Value: - - Message: ConfigMap is not used by any workloads or services. | Namespace: kube-system | Resource: configmap/coredns-autoscaler | Value: - - Message: ConfigMap is not used by any workloads or services. | Namespace: kube-system | Resource: configmap/eraser-system-exclusion | Value: - - Message: ConfigMap is not used by any workloads or services. | Namespace: kube-system | Resource: configmap/extension-apiserver-authentication | Value: - - Message: ConfigMap is not used by any workloads or services. | Namespace: kube-system | Resource: configmap/extension-immutable-values | Value: - - Message: ConfigMap is not used by any workloads or services. | Namespace: kube-system | Resource: configmap/extensioncontrollerleaderid-lock | Value: - - Message: ConfigMap is not used by any workloads or services. | Namespace: kube-system | Resource: configmap/konnectivity-agent-autoscaler | Value: - - Message: ConfigMap is not used by any workloads or services. | Namespace: kube-system | Resource: configmap/kube-apiserver-legacy-service-account-token-tracking | Value: - - Message: ConfigMap is not used by any workloads or services. | Namespace: kube-system | Resource: configmap/overlay-upgrade-data | Value: - - Message: ConfigMap is not used by any workloads or services. | Namespace: kube-system | Resource: configmap/retina-config-win | Value: - [CFG002 - Duplicate ConfigMap Names] Section: Configuration Hygiene Category: Best Practices Severity: Medium Recommendation: Avoid using the same ConfigMap name across namespaces to reduce confusion and misconfiguration risk. URL: https://kubernetes.io/docs/concepts/configuration/configmap/ ⚠️ Total Issues: 2 - Message: Found in namespaces: 1, 10, 2, 3, 4, 5, 6, 7, 8, 9, aks-istio-egress, aks-istio-ingress, aks-istio-system, app-routing-system, argo-rollouts, argo-workflows, argocd, cert-manager, default, gatekeeper-system, grafana, kiali-operator, kube-system, kubeview, linkerd, nginx, pets, prometheus, sealed-secrets, test | Namespace: - | Resource: istio-ca-root-cert | Value: - - Message: Found in namespaces: 1, 10, 2, 3, 4, 5, 6, 7, 8, 9, aks-istio-egress, aks-istio-ingress, aks-istio-system, app-routing-system, argo-rollouts, argo-workflows, argocd, cert-manager, default, gatekeeper-system, grafana, kiali-operator, kube-node-lease, kube-public, kube-system, kubeview, linkerd, nginx, pets, prometheus, sealed-secrets, test | Namespace: - | Resource: kube-root-ca.crt | Value: - [CFG003 - Large ConfigMaps] Section: Configuration Hygiene Category: Best Practices Severity: Medium Recommendation: Avoid storing large data in ConfigMaps. Consider using PersistentVolumes or Secrets instead. URL: https://kubernetes.io/docs/concepts/configuration/configmap/ ✅ No issues detected for Large ConfigMaps. [EVENT001 - Grouped Warning Events] Section: Kubernetes Events Category: Events Severity: medium Recommendation: Check for recurring issues. Investigate sources using `kubectl describe` or logs. URL: https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.28/#event-v1-core ✅ No issues detected for Grouped Warning Events. [EVENT002 - Full Warning Event Log] Section: Kubernetes Events Category: Events Severity: medium Recommendation: Review recent warnings. Correlate events with impacted resources. URL: https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.28/#event-v1-core ✅ No issues detected for Full Warning Event Log. [JOB001 - Stuck Kubernetes Jobs] Section: Jobs Category: Jobs Severity: medium Recommendation: Jobs that haven't completed may be stuck due to node issues, misconfiguration, or missing pods. URL: https://kubernetes.io/docs/concepts/workloads/controllers/job/#pod-backoff-failure-policy ✅ No issues detected for Stuck Kubernetes Jobs. [JOB002 - Failed Kubernetes Jobs] Section: Jobs Category: Jobs Severity: high Recommendation: Review job logs and resource constraints to identify cause of failure. URL: https://kubernetes.io/docs/concepts/workloads/controllers/job/#handling-pod-and-container-failures ✅ No issues detected for Failed Kubernetes Jobs. [NET001 - Services Without Endpoints] Section: Networking Category: Networking Severity: High Recommendation: Check if the service selector matches any pods. Ensure the backing pods are running and ready. URL: https://kubernetes.io/docs/concepts/services-networking/service/ ⚠️ Total Issues: 3 - Message: No endpoints available | Namespace: kube-system | Resource: service/extension-agent-metrics-service | Value: extension-agent-metrics-service - Message: No endpoints available | Namespace: kube-system | Resource: service/extension-operator-metrics-service | Value: extension-operator-metrics-service - Message: No endpoints available | Namespace: kube-system | Resource: service/network-observability | Value: network-observability [NET002 - Publicly Accessible Services] Section: Networking Category: Networking Severity: High Recommendation: Audit services of type LoadBalancer or NodePort. Limit exposure with firewalls or internal IP ranges. URL: https://kubernetes.io/docs/concepts/services-networking/service/#publishing-services ⚠️ Total Issues: 4 - Message: Exposed via external IP: 131.145.32.126 | Namespace: aks-istio-ingress | Resource: service/aks-istio-ingressgateway-external | Value: LoadBalancer - Message: Exposed via external IP: 4.250.59.60 | Namespace: app-routing-system | Resource: service/nginx | Value: LoadBalancer - Message: Exposed via external IP: 85.210.102.171 | Namespace: pets | Resource: service/store-front | Value: LoadBalancer - Message: Exposed via NodePort | Namespace: test | Resource: service/simple-service | Value: NodePort [NET003 - Ingress Health Validation] Section: Networking Category: Networking Severity: High Recommendation: Fix invalid ingress definitions including missing TLS secrets, backend services, and path issues. URL: https://kubernetes.io/docs/concepts/services-networking/ingress/ ✅ No issues detected for Ingress Health Validation. [NET004 - Namespace Missing Network Policy] Section: Networking Category: Security Severity: Medium Recommendation: Apply a default deny-all ingress/egress NetworkPolicy in each namespace that hosts workloads, then selectively allow traffic as needed. URL: https://kubernetes.io/docs/concepts/services-networking/network-policies/ ⚠️ Total Issues: 16 - Issue: No NetworkPolicy in active namespace | Namespace: aks-istio-ingress | Pods: 2 | Policies: 0 - Issue: No NetworkPolicy in active namespace | Namespace: aks-istio-system | Pods: 2 | Policies: 0 - Issue: No NetworkPolicy in active namespace | Namespace: app-routing-system | Pods: 2 | Policies: 0 - Issue: No NetworkPolicy in active namespace | Namespace: argo-rollouts | Pods: 1 | Policies: 0 - Issue: No NetworkPolicy in active namespace | Namespace: argo-workflows | Pods: 1 | Policies: 0 - Issue: No NetworkPolicy in active namespace | Namespace: cert-manager | Pods: 1 | Policies: 0 - Issue: No NetworkPolicy in active namespace | Namespace: gatekeeper-system | Pods: 3 | Policies: 0 - Issue: No NetworkPolicy in active namespace | Namespace: grafana | Pods: 1 | Policies: 0 - Issue: No NetworkPolicy in active namespace | Namespace: kiali-operator | Pods: 2 | Policies: 0 - Issue: No NetworkPolicy in active namespace | Namespace: kubeview | Pods: 1 | Policies: 0 - Issue: No NetworkPolicy in active namespace | Namespace: linkerd | Pods: 1 | Policies: 0 - Issue: No NetworkPolicy in active namespace | Namespace: nginx | Pods: 1 | Policies: 0 - Issue: No NetworkPolicy in active namespace | Namespace: pets | Pods: 4 | Policies: 0 - Issue: No NetworkPolicy in active namespace | Namespace: prometheus | Pods: 1 | Policies: 0 - Issue: No NetworkPolicy in active namespace | Namespace: sealed-secrets | Pods: 1 | Policies: 0 - Issue: No NetworkPolicy in active namespace | Namespace: test | Pods: 1 | Policies: 0 [NODE001 - Node Readiness and Conditions] Section: Nodes Category: Nodes Severity: High Recommendation: Investigate NotReady nodes to avoid workload disruption. URL: https://kubernetes.io/docs/concepts/architecture/nodes/ ✅ No issues detected for Node Readiness and Conditions. [NODE002 - Node Resource Pressure] Section: Nodes Category: Nodes Severity: Medium Recommendation: Investigate and rebalance workloads on nodes with high resource usage. URL: https://kubernetes.io/docs/tasks/debug/debug-cluster/resource-usage-monitoring/ ⚠️ Total Issues: 2 - CPU %: 9.26% | CPU Status: ✅ Normal | CPU Total: 1900 mC | CPU Used: 176 mC | Disk %: 52% | Disk Status: ✅ Normal | Mem %: 52.17% | Mem Status: 🟡 Warning | Mem Total: 6533 Mi | Mem Used: 3408 Mi | Node: aks-systempool-19995743-vmss00000m - CPU %: 8.68% | CPU Status: ✅ Normal | CPU Total: 1900 mC | CPU Used: 165 mC | Disk %: 50% | Disk Status: ✅ Normal | Mem %: 50.16% | Mem Status: 🟡 Warning | Mem Total: 6533 Mi | Mem Used: 3277 Mi | Node: aks-systempool-19995743-vmss00000n - CPU %: 7.68% | CPU Status: ✅ Normal | CPU Total: 1900 mC | CPU Used: 146 mC | Disk %: 49% | Disk Status: ✅ Normal | Mem %: 49.17% | Mem Status: ✅ Normal | Mem Total: 6533 Mi | Mem Used: 3212 Mi | Node: aks-systempool-19995743-vmss00000o - CPU %: 31.11% | CPU Status: ✅ Normal | CPU Total: 3860 mC | CPU Used: 1201 mC | Disk %: 22% | Disk Status: ✅ Normal | Mem %: 22.69% | Mem Status: ✅ Normal | Mem Total: 14584 Mi | Mem Used: 3309 Mi | Node: aks-workloadpool-10479701-vmss00000e - CPU %: 30.23% | CPU Status: ✅ Normal | CPU Total: 3860 mC | CPU Used: 1167 mC | Disk %: 16% | Disk Status: ✅ Normal | Mem %: 16.99% | Mem Status: ✅ Normal | Mem Total: 14584 Mi | Mem Used: 2478 Mi | Node: aks-workloadpool-10479701-vmss00000f - CPU %: 3.68% | CPU Status: ✅ Normal | CPU Total: 3860 mC | CPU Used: 142 mC | Disk %: 14% | Disk Status: ✅ Normal | Mem %: 14.11% | Mem Status: ✅ Normal | Mem Total: 14584 Mi | Mem Used: 2058 Mi | Node: aks-workloadpool-10479701-vmss00000g [NS001 - Empty Namespaces] Section: Namespaces Category: Namespaces Severity: low Recommendation: These may be stale or unused and safe to delete after verifying they contain no critical resources. URL: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/ ⚠️ Total Issues: 14 - Namespace: 1 | Status: 📂 Empty - Namespace: 10 | Status: 📂 Empty - Namespace: 2 | Status: 📂 Empty - Namespace: 3 | Status: 📂 Empty - Namespace: 4 | Status: 📂 Empty - Namespace: 5 | Status: 📂 Empty - Namespace: 6 | Status: 📂 Empty - Namespace: 7 | Status: 📂 Empty - Namespace: 8 | Status: 📂 Empty - Namespace: 9 | Status: 📂 Empty - Namespace: aks-istio-egress | Status: 📂 Empty - Namespace: default | Status: 📂 Empty - Namespace: kube-node-lease | Status: 📂 Empty - Namespace: kube-public | Status: 📂 Empty [NS002 - Missing or Weak ResourceQuotas] Section: Namespaces Category: Namespaces Severity: medium Recommendation: Apply CPU, memory, and pod quotas to enforce fair resource usage. URL: https://kubernetes.io/docs/concepts/policy/resource-quotas/ ⚠️ Total Issues: 32 - Issue: ❌ No ResourceQuota | Namespace: 1 - Issue: ❌ No ResourceQuota | Namespace: 10 - Issue: ❌ No ResourceQuota | Namespace: 2 - Issue: ❌ No ResourceQuota | Namespace: 3 - Issue: ❌ No ResourceQuota | Namespace: 4 - Issue: ❌ No ResourceQuota | Namespace: 5 - Issue: ❌ No ResourceQuota | Namespace: 6 - Issue: ❌ No ResourceQuota | Namespace: 7 - Issue: ❌ No ResourceQuota | Namespace: 8 - Issue: ❌ No ResourceQuota | Namespace: 9 - Issue: ❌ No ResourceQuota | Namespace: aks-istio-egress - Issue: ❌ No ResourceQuota | Namespace: aks-istio-ingress - Issue: ❌ No ResourceQuota | Namespace: aks-istio-system - Issue: ❌ No ResourceQuota | Namespace: app-routing-system - Issue: ❌ No ResourceQuota | Namespace: argo-rollouts - Issue: ❌ No ResourceQuota | Namespace: argo-workflows - Issue: ❌ No ResourceQuota | Namespace: argocd - Issue: ❌ No ResourceQuota | Namespace: cert-manager - Issue: ❌ No ResourceQuota | Namespace: default - Issue: ❌ No ResourceQuota | Namespace: gatekeeper-system - Issue: ❌ No ResourceQuota | Namespace: grafana - Issue: ❌ No ResourceQuota | Namespace: kiali-operator - Issue: ❌ No ResourceQuota | Namespace: kube-node-lease - Issue: ❌ No ResourceQuota | Namespace: kube-public - Issue: ❌ No ResourceQuota | Namespace: kube-system - Issue: ❌ No ResourceQuota | Namespace: kubeview - Issue: ❌ No ResourceQuota | Namespace: linkerd - Issue: ❌ No ResourceQuota | Namespace: nginx - Issue: ❌ No ResourceQuota | Namespace: pets - Issue: ❌ No ResourceQuota | Namespace: prometheus - Issue: ❌ No ResourceQuota | Namespace: sealed-secrets - Issue: ❌ No ResourceQuota | Namespace: test [NS003 - Missing LimitRanges] Section: Namespaces Category: Namespaces Severity: medium Recommendation: Define default CPU and memory limits to avoid unbounded pod usage. URL: https://kubernetes.io/docs/concepts/policy/limit-range/ ⚠️ Total Issues: 32 - Issue: ❌ No LimitRange | Namespace: 1 - Issue: ❌ No LimitRange | Namespace: 10 - Issue: ❌ No LimitRange | Namespace: 2 - Issue: ❌ No LimitRange | Namespace: 3 - Issue: ❌ No LimitRange | Namespace: 4 - Issue: ❌ No LimitRange | Namespace: 5 - Issue: ❌ No LimitRange | Namespace: 6 - Issue: ❌ No LimitRange | Namespace: 7 - Issue: ❌ No LimitRange | Namespace: 8 - Issue: ❌ No LimitRange | Namespace: 9 - Issue: ❌ No LimitRange | Namespace: aks-istio-egress - Issue: ❌ No LimitRange | Namespace: aks-istio-ingress - Issue: ❌ No LimitRange | Namespace: aks-istio-system - Issue: ❌ No LimitRange | Namespace: app-routing-system - Issue: ❌ No LimitRange | Namespace: argo-rollouts - Issue: ❌ No LimitRange | Namespace: argo-workflows - Issue: ❌ No LimitRange | Namespace: argocd - Issue: ❌ No LimitRange | Namespace: cert-manager - Issue: ❌ No LimitRange | Namespace: default - Issue: ❌ No LimitRange | Namespace: gatekeeper-system - Issue: ❌ No LimitRange | Namespace: grafana - Issue: ❌ No LimitRange | Namespace: kiali-operator - Issue: ❌ No LimitRange | Namespace: kube-node-lease - Issue: ❌ No LimitRange | Namespace: kube-public - Issue: ❌ No LimitRange | Namespace: kube-system - Issue: ❌ No LimitRange | Namespace: kubeview - Issue: ❌ No LimitRange | Namespace: linkerd - Issue: ❌ No LimitRange | Namespace: nginx - Issue: ❌ No LimitRange | Namespace: pets - Issue: ❌ No LimitRange | Namespace: prometheus - Issue: ❌ No LimitRange | Namespace: sealed-secrets - Issue: ❌ No LimitRange | Namespace: test [POD001 - Pods with High Restarts] Section: Pods Category: Workloads Severity: Warning Recommendation: Review logs and events for frequently restarting pods and address root causes such as crashes, missing configs, or failing probes. URL: https://kubernetes.io/docs/tasks/debug/debug-application/debug-running-pod/#application-crashes ✅ No issues detected for Pods with High Restarts. [POD002 - Long Running Pods] Section: Pods Category: Workloads Severity: Warning Recommendation: Review long-running pods and determine if they should be restarted or replaced by updated deployments. URL: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#pod-phase ✅ No issues detected for Long Running Pods. [POD003 - Failed Pods] Section: Pods Category: Workloads Severity: Error Recommendation: Investigate failed pods for common issues like image errors, resource constraints, or crash loops. URL: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#pod-phase ✅ No issues detected for Failed Pods. [POD004 - Pending Pods] Section: Pods Category: Workloads Severity: Warning Recommendation: Inspect scheduling constraints, resource availability, and missing dependencies. URL: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#pod-phase ✅ No issues detected for Pending Pods. [POD005 - CrashLoopBackOff Pods] Section: Pods Category: Workloads Severity: Error Recommendation: Check logs, investigate container errors, and fix misconfigurations. URL: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#restart-policy ✅ No issues detected for CrashLoopBackOff Pods. [POD006 - Leftover Debug Pods] Section: Pods Category: Workloads Severity: Warning Recommendation: Delete any leftover debug pods and review your debugging practices. URL: https://kubernetes.io/docs/tasks/debug/debug-cluster/debug-running-pod/ ✅ No issues detected for Leftover Debug Pods. [POD007 - Container images do not use latest tag] Section: Pods Category: Resource Management Severity: High Recommendation: Specify an explicit image tag (e.g., ':v1.2.3') to ensure consistent deployments. URL: https://kubernetes.io/docs/concepts/containers/images/#image-tags ⚠️ Total Issues: 3 - Message: Container image uses the 'latest' tag, which can lead to unpredictable deployments. | Namespace: pets | Resource: pod/order-service-6c5bfb6946-b58xq | Value: ghcr.io/azure-samples/aks-store-demo/order-service:latest, mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless - Message: Container image uses the 'latest' tag, which can lead to unpredictable deployments. | Namespace: pets | Resource: pod/product-service-5dd87dfb8-ssfxc | Value: ghcr.io/azure-samples/aks-store-demo/product-service:latest, mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless - Message: Container image uses the 'latest' tag, which can lead to unpredictable deployments. | Namespace: pets | Resource: pod/store-front-658994fd95-pk9qn | Value: ghcr.io/azure-samples/aks-store-demo/store-front:latest, mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless [PVC001 - Unused Persistent Volume Claims] Section: Storage Category: Volumes Severity: Medium Recommendation: Review and delete unused PVCs to reclaim storage. URL: https://kubernetes.io/docs/concepts/storage/persistent-volumes/ ✅ No issues detected for Unused Persistent Volume Claims. [RBAC001 - RBAC Misconfigurations] Section: Security Category: RBAC Severity: High Recommendation: Fix missing roleRefs, service accounts, and invalid namespaces in RoleBindings and ClusterRoleBindings. URL: https://kubernetes.io/docs/reference/access-authn-authz/rbac/ ⚠️ Total Issues: 10 - Message: ServiceAccount not found | Namespace: kube-system | Resource: RoleBinding/system::leader-locking-kube-controller-manager | Value: ServiceAccount/kube-controller-manager - Message: ServiceAccount not found | Namespace: kube-system | Resource: RoleBinding/system::leader-locking-kube-scheduler | Value: ServiceAccount/kube-scheduler - Message: ServiceAccount not found | Namespace: kube-system | Resource: RoleBinding/system:controller:cloud-provider | Value: ServiceAccount/cloud-provider - Message: ServiceAccount not found | Namespace: aks-istio-system | Resource: ClusterRoleBinding/istio-reader-clusterrole-asm-1-23-aks-istio-system | Value: ServiceAccount/istio-reader-service-account - Message: ServiceAccount not found | Namespace: kube-system | Resource: ClusterRoleBinding/secretproviderrotation-rolebinding | Value: ServiceAccount/secrets-store-csi-driver - Message: ServiceAccount not found | Namespace: kube-system | Resource: ClusterRoleBinding/system:azure-cloud-provider | Value: ServiceAccount/azure-cloud-provider - Message: ServiceAccount not found | Namespace: kube-system | Resource: ClusterRoleBinding/system:azure-cloud-provider-secret-getter | Value: ServiceAccount/azure-cloud-provider - Message: ServiceAccount not found | Namespace: kube-system | Resource: ClusterRoleBinding/system:controller:route-controller | Value: ServiceAccount/route-controller - Message: ServiceAccount not found | Namespace: kube-system | Resource: ClusterRoleBinding/system:controller:service-controller | Value: ServiceAccount/service-controller - Message: ServiceAccount not found | Namespace: kube-system | Resource: ClusterRoleBinding/system:kube-dns | Value: ServiceAccount/kube-dns [RBAC002 - RBAC Overexposure] Section: Security Category: RBAC Severity: Critical Recommendation: Avoid cluster-admin, wildcard, and sensitive resource access in roles. Use least privilege. URL: https://kubernetes.io/docs/reference/access-authn-authz/rbac/ ⚠️ Total Issues: 21 - Message: cluster-admin binding (built-in) | Namespace: 🌍 Cluster-Wide | Resource: ClusterRoleBinding/aks-cluster-admin-binding | Value: User/clusterAdmin - Message: cluster-admin binding (built-in) | Namespace: 🌍 Cluster-Wide | Resource: ClusterRoleBinding/aks-cluster-admin-binding | Value: User/clusterUser - Message: cluster-admin binding (built-in) | Namespace: 🌍 Cluster-Wide | Resource: ClusterRoleBinding/aks-cluster-admin-binding-aad | Value: Group/e591c663-c79c-47a4-94b8-f646b8647046 - Message: Access to sensitive resources | Namespace: 🌍 Cluster-Wide | Resource: ClusterRoleBinding/aks-secretprovidersyncing-rolebinding | Value: ServiceAccount/aks-secrets-store-csi-driver - Message: Access to sensitive resources | Namespace: 🌍 Cluster-Wide | Resource: ClusterRoleBinding/aks-service-rolebinding | Value: User/aks-support - Message: Wildcard permission role | Namespace: 🌍 Cluster-Wide | Resource: ClusterRoleBinding/argocd-application-controller | Value: ServiceAccount/argocd-application-controller - Message: cluster-admin binding (built-in) | Namespace: 🌍 Cluster-Wide | Resource: ClusterRoleBinding/cluster-admin | Value: Group/system:masters - Message: cluster-admin binding (built-in) | Namespace: 🌍 Cluster-Wide | Resource: ClusterRoleBinding/extension-operator | Value: ServiceAccount/extension-operatorsa - Message: Access to sensitive resources | Namespace: 🌍 Cluster-Wide | Resource: ClusterRoleBinding/kiali-operator | Value: ServiceAccount/kiali-operator - Message: Access to sensitive resources (built-in) | Namespace: 🌍 Cluster-Wide | Resource: ClusterRoleBinding/system:controller:clusterrole-aggregation-controller | Value: ServiceAccount/clusterrole-aggregation-controller - Message: Access to sensitive resources (built-in) | Namespace: 🌍 Cluster-Wide | Resource: ClusterRoleBinding/system:controller:legacy-service-account-token-cleaner | Value: ServiceAccount/legacy-service-account-token-cleaner - Message: Access to sensitive resources (built-in) | Namespace: 🌍 Cluster-Wide | Resource: ClusterRoleBinding/system:kube-controller-manager | Value: User/system:kube-controller-manager - Message: Access to sensitive resources (built-in) | Namespace: 🌍 Cluster-Wide | Resource: ClusterRoleBinding/system:kube-scheduler | Value: User/system:kube-scheduler - Message: Access to sensitive resources (built-in) | Namespace: 🌍 Cluster-Wide | Resource: ClusterRoleBinding/system:persistent-volume-binding | Value: ServiceAccount/persistent-volume-binder - Message: Access to sensitive resources | Namespace: aks-istio-system | Resource: RoleBinding/istiod-asm-1-23 | Value: ServiceAccount/istiod-asm-1-23 - Message: Access to sensitive resources | Namespace: argocd | Resource: RoleBinding/argocd-redis-ha-haproxy | Value: ServiceAccount/argocd-redis-ha-haproxy - Message: Access to sensitive resources | Namespace: argocd | Resource: RoleBinding/argocd-server | Value: ServiceAccount/argocd-server - Message: Access to sensitive resources | Namespace: gatekeeper-system | Resource: RoleBinding/gatekeeper-manager-rolebinding | Value: ServiceAccount/gatekeeper-admin - Message: Access to sensitive resources | Namespace: kube-system | Resource: RoleBinding/azure-policy-webhook-rolebinding | Value: ServiceAccount/azure-policy-webhook-account - Message: Access to sensitive resources | Namespace: kube-system | Resource: RoleBinding/keda-operator-certs | Value: ServiceAccount/keda-operator - Message: Access to sensitive resources | Namespace: kube-system | Resource: RoleBinding/system:controller:token-cleaner | Value: ServiceAccount/token-cleaner [RBAC003 - Orphaned ServiceAccounts] Section: Security Category: RBAC Severity: Medium Recommendation: Clean up unused ServiceAccounts to avoid confusion and reduce RBAC clutter. URL: https://kubernetes.io/docs/reference/access-authn-authz/service-accounts-admin/ ⚠️ Total Issues: 20 - Message: ServiceAccount not used by pods or RBAC bindings | Namespace: 1 | Resource: serviceaccount/default | Value: default - Message: ServiceAccount not used by pods or RBAC bindings | Namespace: 10 | Resource: serviceaccount/default | Value: default - Message: ServiceAccount not used by pods or RBAC bindings | Namespace: 2 | Resource: serviceaccount/default | Value: default - Message: ServiceAccount not used by pods or RBAC bindings | Namespace: 3 | Resource: serviceaccount/default | Value: default - Message: ServiceAccount not used by pods or RBAC bindings | Namespace: 4 | Resource: serviceaccount/default | Value: default - Message: ServiceAccount not used by pods or RBAC bindings | Namespace: 5 | Resource: serviceaccount/default | Value: default - Message: ServiceAccount not used by pods or RBAC bindings | Namespace: 6 | Resource: serviceaccount/default | Value: default - Message: ServiceAccount not used by pods or RBAC bindings | Namespace: 7 | Resource: serviceaccount/default | Value: default - Message: ServiceAccount not used by pods or RBAC bindings | Namespace: 8 | Resource: serviceaccount/default | Value: default - Message: ServiceAccount not used by pods or RBAC bindings | Namespace: 9 | Resource: serviceaccount/default | Value: default - Message: ServiceAccount not used by pods or RBAC bindings | Namespace: aks-istio-egress | Resource: serviceaccount/default | Value: default - Message: ServiceAccount not used by pods or RBAC bindings | Namespace: aks-istio-ingress | Resource: serviceaccount/default | Value: default - Message: ServiceAccount not used by pods or RBAC bindings | Namespace: aks-istio-system | Resource: serviceaccount/default | Value: default - Message: ServiceAccount not used by pods or RBAC bindings | Namespace: app-routing-system | Resource: serviceaccount/default | Value: default - Message: ServiceAccount not used by pods or RBAC bindings | Namespace: argocd | Resource: serviceaccount/default | Value: default - Message: ServiceAccount not used by pods or RBAC bindings | Namespace: default | Resource: serviceaccount/default | Value: default - Message: ServiceAccount not used by pods or RBAC bindings | Namespace: gatekeeper-system | Resource: serviceaccount/default | Value: default - Message: ServiceAccount not used by pods or RBAC bindings | Namespace: kiali-operator | Resource: serviceaccount/default | Value: default - Message: ServiceAccount not used by pods or RBAC bindings | Namespace: kube-node-lease | Resource: serviceaccount/default | Value: default - Message: ServiceAccount not used by pods or RBAC bindings | Namespace: kube-public | Resource: serviceaccount/default | Value: default [RBAC004 - Orphaned and Ineffective Roles] Section: Security Category: RBAC Severity: Low Recommendation: Delete Roles and ClusterRoles that are not bound or do not define any rules. URL: https://kubernetes.io/docs/reference/access-authn-authz/rbac/ ⚠️ Total Issues: 4 - Message: ClusterRoleBinding has no subjects | Namespace: cluster-wide | Resource: clusterrolebinding/system:node | Value: system:node - Message: Unused ClusterRole | Namespace: cluster-wide | Resource: clusterrole/aks-secretproviderclasses-admin-role | Value: aks-secretproviderclasses-admin-role - Message: Unused ClusterRole | Namespace: cluster-wide | Resource: clusterrole/aks-secretproviderclasses-viewer-role | Value: aks-secretproviderclasses-viewer-role - Message: ClusterRole has no rules | Namespace: cluster-wide | Resource: clusterrole/eraser-imagejob-pods-cluster-role | Value: eraser-imagejob-pods-cluster-role [SEC001 - Orphaned Secrets] Section: Security Category: Security Severity: Medium Recommendation: Review and remove unused Secrets to reduce surface area and limit stale credentials. URL: https://kubernetes.io/docs/concepts/configuration/secret/ ⚠️ Total Issues: 10 - Message: Secret appears unused across workloads, ingresses, service accounts, or CRs | Namespace: aks-istio-system | Resource: secret/istio-ca-secret | Value: istio-ca-secret - Message: Secret appears unused across workloads, ingresses, service accounts, or CRs | Namespace: argocd | Resource: secret/argocd-initial-admin-secret | Value: argocd-initial-admin-secret - Message: Secret appears unused across workloads, ingresses, service accounts, or CRs | Namespace: argocd | Resource: secret/argocd-notifications-secret | Value: argocd-notifications-secret - Message: Secret appears unused across workloads, ingresses, service accounts, or CRs | Namespace: argocd | Resource: secret/argocd-secret | Value: argocd-secret - Message: Secret appears unused across workloads, ingresses, service accounts, or CRs | Namespace: argocd | Resource: secret/repo-1114886772 | Value: repo-1114886772 - Message: Secret appears unused across workloads, ingresses, service accounts, or CRs | Namespace: argocd | Resource: secret/repo-1952242182 | Value: repo-1952242182 - Message: Secret appears unused across workloads, ingresses, service accounts, or CRs | Namespace: kube-system | Resource: secret/aad-msi-auth-token | Value: aad-msi-auth-token - Message: Secret appears unused across workloads, ingresses, service accounts, or CRs | Namespace: kube-system | Resource: secret/azure-policy-webhook-cert | Value: azure-policy-webhook-cert - Message: Secret appears unused across workloads, ingresses, service accounts, or CRs | Namespace: kube-system | Resource: secret/extensions-aad-msi-token | Value: extensions-aad-msi-token - Message: Secret appears unused across workloads, ingresses, service accounts, or CRs | Namespace: kube-system | Resource: secret/omsagent-aad-msi-token | Value: omsagent-aad-msi-token [SEC002 - Pods using hostPID or hostNetwork] Section: Security Category: Pods Severity: High Recommendation: Avoid using hostPID or hostNetwork unless strictly required. These settings reduce isolation and can expose the host. URL: https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline ⚠️ Total Issues: 36 - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/aks-secrets-store-provider-azure-68nhw | Value: hostPID=False, hostNetwork=True - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/aks-secrets-store-provider-azure-7bqmn | Value: hostPID=False, hostNetwork=True - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/aks-secrets-store-provider-azure-7r458 | Value: hostPID=False, hostNetwork=True - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/aks-secrets-store-provider-azure-k9tdc | Value: hostPID=False, hostNetwork=True - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/aks-secrets-store-provider-azure-n952g | Value: hostPID=False, hostNetwork=True - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/aks-secrets-store-provider-azure-njpqh | Value: hostPID=False, hostNetwork=True - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/azure-ip-masq-agent-4522j | Value: hostPID=False, hostNetwork=True - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/azure-ip-masq-agent-4c7cr | Value: hostPID=False, hostNetwork=True - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/azure-ip-masq-agent-78rnw | Value: hostPID=False, hostNetwork=True - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/azure-ip-masq-agent-84ltn | Value: hostPID=False, hostNetwork=True - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/azure-ip-masq-agent-t4c2w | Value: hostPID=False, hostNetwork=True - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/azure-ip-masq-agent-vbdd8 | Value: hostPID=False, hostNetwork=True - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/azure-npm-jsbbh | Value: hostPID=False, hostNetwork=True - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/azure-npm-lp6sf | Value: hostPID=False, hostNetwork=True - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/azure-npm-nv6xx | Value: hostPID=False, hostNetwork=True - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/azure-npm-p6fpw | Value: hostPID=False, hostNetwork=True - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/azure-npm-vsrfp | Value: hostPID=False, hostNetwork=True - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/azure-npm-z8mcz | Value: hostPID=False, hostNetwork=True - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/cloud-node-manager-57rk2 | Value: hostPID=False, hostNetwork=True - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/cloud-node-manager-gl5xl | Value: hostPID=False, hostNetwork=True - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/cloud-node-manager-l7v5j | Value: hostPID=False, hostNetwork=True - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/cloud-node-manager-lr49d | Value: hostPID=False, hostNetwork=True - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/cloud-node-manager-n5qdr | Value: hostPID=False, hostNetwork=True - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/cloud-node-manager-xwrrd | Value: hostPID=False, hostNetwork=True - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/kube-proxy-26xkd | Value: hostPID=False, hostNetwork=True - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/kube-proxy-6mrql | Value: hostPID=False, hostNetwork=True - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/kube-proxy-9rbxf | Value: hostPID=False, hostNetwork=True - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/kube-proxy-njzgk | Value: hostPID=False, hostNetwork=True - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/kube-proxy-rvmxl | Value: hostPID=False, hostNetwork=True - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/kube-proxy-vp7xj | Value: hostPID=False, hostNetwork=True - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/retina-agent-cgv48 | Value: hostPID=False, hostNetwork=True - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/retina-agent-gjxk8 | Value: hostPID=False, hostNetwork=True - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/retina-agent-js76w | Value: hostPID=False, hostNetwork=True - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/retina-agent-lfn7d | Value: hostPID=False, hostNetwork=True - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/retina-agent-qc9bs | Value: hostPID=False, hostNetwork=True - Message: Pod uses hostNetwork | Namespace: kube-system | Resource: pod/retina-agent-wlt7b | Value: hostPID=False, hostNetwork=True [SEC003 - Pods Running as Root] Section: Security Category: Pod Security Severity: High Recommendation: Avoid running pods as root by explicitly setting runAsUser to a non-zero UID in pod or container securityContext. URL: https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline ⚠️ Total Issues: 380 - Message: Container runs as root or has no runAsUser set | Namespace: aks-istio-ingress | Resource: pod/aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-hdfn4 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: aks-istio-ingress | Resource: pod/aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-hdfn4 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: aks-istio-ingress | Resource: pod/aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-zqwtb | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: aks-istio-ingress | Resource: pod/aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-zqwtb | Value: Not Set (Defaults to root) - Message: Container discovery runs as root or has no runAsUser set | Namespace: aks-istio-system | Resource: pod/istiod-asm-1-23-7744d5fbf4-9572m | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: aks-istio-system | Resource: pod/istiod-asm-1-23-7744d5fbf4-9572m | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: aks-istio-system | Resource: pod/istiod-asm-1-23-7744d5fbf4-9572m | Value: Not Set (Defaults to root) - Message: Container discovery runs as root or has no runAsUser set | Namespace: aks-istio-system | Resource: pod/istiod-asm-1-23-7744d5fbf4-rqzvt | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: aks-istio-system | Resource: pod/istiod-asm-1-23-7744d5fbf4-rqzvt | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: aks-istio-system | Resource: pod/istiod-asm-1-23-7744d5fbf4-rqzvt | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: app-routing-system | Resource: pod/nginx-69fcb489fd-4wgk9 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: app-routing-system | Resource: pod/nginx-69fcb489fd-4wgk9 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: app-routing-system | Resource: pod/nginx-69fcb489fd-64v6k | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: app-routing-system | Resource: pod/nginx-69fcb489fd-64v6k | Value: Not Set (Defaults to root) - Message: Container webserver-simple runs as root or has no runAsUser set | Namespace: argo-rollouts | Resource: pod/simple-deployment-74fd649f8d-996vt | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: argo-rollouts | Resource: pod/simple-deployment-74fd649f8d-996vt | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: argo-rollouts | Resource: pod/simple-deployment-74fd649f8d-996vt | Value: Not Set (Defaults to root) - Message: Container webserver-simple runs as root or has no runAsUser set | Namespace: argo-workflows | Resource: pod/simple-deployment-74fd649f8d-24t56 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: argo-workflows | Resource: pod/simple-deployment-74fd649f8d-24t56 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: argo-workflows | Resource: pod/simple-deployment-74fd649f8d-24t56 | Value: Not Set (Defaults to root) - Message: Container argocd-application-controller runs as root or has no runAsUser set | Namespace: argocd | Resource: pod/argocd-application-controller-0 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: argocd | Resource: pod/argocd-application-controller-0 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: argocd | Resource: pod/argocd-application-controller-0 | Value: Not Set (Defaults to root) - Message: Container argocd-applicationset-controller runs as root or has no runAsUser set | Namespace: argocd | Resource: pod/argocd-applicationset-controller-6fdf84dbb6-msffz | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: argocd | Resource: pod/argocd-applicationset-controller-6fdf84dbb6-msffz | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: argocd | Resource: pod/argocd-applicationset-controller-6fdf84dbb6-msffz | Value: Not Set (Defaults to root) - Message: Container dex runs as root or has no runAsUser set | Namespace: argocd | Resource: pod/argocd-dex-server-556c76889-h4kxj | Value: Not Set (Defaults to root) - Message: Container copyutil runs as root or has no runAsUser set | Namespace: argocd | Resource: pod/argocd-dex-server-556c76889-h4kxj | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: argocd | Resource: pod/argocd-dex-server-556c76889-h4kxj | Value: Not Set (Defaults to root) - Message: Container argocd-notifications-controller runs as root or has no runAsUser set | Namespace: argocd | Resource: pod/argocd-notifications-controller-6ff6bf8dd6-nbktr | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: argocd | Resource: pod/argocd-notifications-controller-6ff6bf8dd6-nbktr | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: argocd | Resource: pod/argocd-notifications-controller-6ff6bf8dd6-nbktr | Value: Not Set (Defaults to root) - Message: Container argocd-repo-server runs as root or has no runAsUser set | Namespace: argocd | Resource: pod/argocd-repo-server-8568fc89b5-sx6ks | Value: Not Set (Defaults to root) - Message: Container copyutil runs as root or has no runAsUser set | Namespace: argocd | Resource: pod/argocd-repo-server-8568fc89b5-sx6ks | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: argocd | Resource: pod/argocd-repo-server-8568fc89b5-sx6ks | Value: Not Set (Defaults to root) - Message: Container argocd-repo-server runs as root or has no runAsUser set | Namespace: argocd | Resource: pod/argocd-repo-server-8568fc89b5-xrzzn | Value: Not Set (Defaults to root) - Message: Container copyutil runs as root or has no runAsUser set | Namespace: argocd | Resource: pod/argocd-repo-server-8568fc89b5-xrzzn | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: argocd | Resource: pod/argocd-repo-server-8568fc89b5-xrzzn | Value: Not Set (Defaults to root) - Message: Container argocd-server runs as root or has no runAsUser set | Namespace: argocd | Resource: pod/argocd-server-54f9645b87-k4rz8 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: argocd | Resource: pod/argocd-server-54f9645b87-k4rz8 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: argocd | Resource: pod/argocd-server-54f9645b87-k4rz8 | Value: Not Set (Defaults to root) - Message: Container argocd-server runs as root or has no runAsUser set | Namespace: argocd | Resource: pod/argocd-server-54f9645b87-wwzgz | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: argocd | Resource: pod/argocd-server-54f9645b87-wwzgz | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: argocd | Resource: pod/argocd-server-54f9645b87-wwzgz | Value: Not Set (Defaults to root) - Message: Container webserver-simple runs as root or has no runAsUser set | Namespace: cert-manager | Resource: pod/simple-deployment-74fd649f8d-7cht8 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: cert-manager | Resource: pod/simple-deployment-74fd649f8d-7cht8 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: cert-manager | Resource: pod/simple-deployment-74fd649f8d-7cht8 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: gatekeeper-system | Resource: pod/gatekeeper-audit-77858c8f69-7k782 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: gatekeeper-system | Resource: pod/gatekeeper-audit-77858c8f69-7k782 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: gatekeeper-system | Resource: pod/gatekeeper-controller-6f97954b4b-7tbnr | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: gatekeeper-system | Resource: pod/gatekeeper-controller-6f97954b4b-7tbnr | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: gatekeeper-system | Resource: pod/gatekeeper-controller-6f97954b4b-gwrgg | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: gatekeeper-system | Resource: pod/gatekeeper-controller-6f97954b4b-gwrgg | Value: Not Set (Defaults to root) - Message: Container webserver-simple runs as root or has no runAsUser set | Namespace: grafana | Resource: pod/simple-deployment-74fd649f8d-l7wrd | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: grafana | Resource: pod/simple-deployment-74fd649f8d-l7wrd | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: grafana | Resource: pod/simple-deployment-74fd649f8d-l7wrd | Value: Not Set (Defaults to root) - Message: Container kiali runs as root or has no runAsUser set | Namespace: kiali-operator | Resource: pod/kiali-5b88cfb6f8-cm8dz | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kiali-operator | Resource: pod/kiali-5b88cfb6f8-cm8dz | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kiali-operator | Resource: pod/kiali-5b88cfb6f8-cm8dz | Value: Not Set (Defaults to root) - Message: Container operator runs as root or has no runAsUser set | Namespace: kiali-operator | Resource: pod/kiali-operator-696bd54db-mr8md | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kiali-operator | Resource: pod/kiali-operator-696bd54db-mr8md | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kiali-operator | Resource: pod/kiali-operator-696bd54db-mr8md | Value: Not Set (Defaults to root) - Message: Container node-driver-registrar runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-2l2wl | Value: Not Set (Defaults to root) - Message: Container secrets-store runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-2l2wl | Value: Not Set (Defaults to root) - Message: Container liveness-probe runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-2l2wl | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-2l2wl | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-2l2wl | Value: Not Set (Defaults to root) - Message: Container node-driver-registrar runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-6w2vp | Value: Not Set (Defaults to root) - Message: Container secrets-store runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-6w2vp | Value: Not Set (Defaults to root) - Message: Container liveness-probe runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-6w2vp | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-6w2vp | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-6w2vp | Value: Not Set (Defaults to root) - Message: Container node-driver-registrar runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-7879c | Value: Not Set (Defaults to root) - Message: Container secrets-store runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-7879c | Value: Not Set (Defaults to root) - Message: Container liveness-probe runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-7879c | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-7879c | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-7879c | Value: Not Set (Defaults to root) - Message: Container node-driver-registrar runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-m8m29 | Value: Not Set (Defaults to root) - Message: Container secrets-store runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-m8m29 | Value: Not Set (Defaults to root) - Message: Container liveness-probe runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-m8m29 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-m8m29 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-m8m29 | Value: Not Set (Defaults to root) - Message: Container node-driver-registrar runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-vnmcd | Value: Not Set (Defaults to root) - Message: Container secrets-store runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-vnmcd | Value: Not Set (Defaults to root) - Message: Container liveness-probe runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-vnmcd | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-vnmcd | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-vnmcd | Value: Not Set (Defaults to root) - Message: Container node-driver-registrar runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-zrfbz | Value: Not Set (Defaults to root) - Message: Container secrets-store runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-zrfbz | Value: Not Set (Defaults to root) - Message: Container liveness-probe runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-zrfbz | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-zrfbz | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-zrfbz | Value: Not Set (Defaults to root) - Message: Container provider-azure-installer runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-provider-azure-68nhw | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-provider-azure-68nhw | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-provider-azure-68nhw | Value: Not Set (Defaults to root) - Message: Container provider-azure-installer runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-provider-azure-7bqmn | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-provider-azure-7bqmn | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-provider-azure-7bqmn | Value: Not Set (Defaults to root) - Message: Container provider-azure-installer runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-provider-azure-7r458 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-provider-azure-7r458 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-provider-azure-7r458 | Value: Not Set (Defaults to root) - Message: Container provider-azure-installer runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-provider-azure-k9tdc | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-provider-azure-k9tdc | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-provider-azure-k9tdc | Value: Not Set (Defaults to root) - Message: Container provider-azure-installer runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-provider-azure-n952g | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-provider-azure-n952g | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-provider-azure-n952g | Value: Not Set (Defaults to root) - Message: Container provider-azure-installer runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-provider-azure-njpqh | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-provider-azure-njpqh | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/aks-secrets-store-provider-azure-njpqh | Value: Not Set (Defaults to root) - Message: Container ama-logs runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-logs-4v8mz | Value: Not Set (Defaults to root) - Message: Container ama-logs-prometheus runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-logs-4v8mz | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-logs-4v8mz | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-logs-4v8mz | Value: Not Set (Defaults to root) - Message: Container ama-logs runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-logs-5vr2w | Value: Not Set (Defaults to root) - Message: Container ama-logs-prometheus runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-logs-5vr2w | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-logs-5vr2w | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-logs-5vr2w | Value: Not Set (Defaults to root) - Message: Container ama-logs runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-logs-fmd7b | Value: Not Set (Defaults to root) - Message: Container ama-logs-prometheus runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-logs-fmd7b | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-logs-fmd7b | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-logs-fmd7b | Value: Not Set (Defaults to root) - Message: Container ama-logs runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-logs-fpkw6 | Value: Not Set (Defaults to root) - Message: Container ama-logs-prometheus runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-logs-fpkw6 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-logs-fpkw6 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-logs-fpkw6 | Value: Not Set (Defaults to root) - Message: Container ama-logs runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-logs-gqs28 | Value: Not Set (Defaults to root) - Message: Container ama-logs-prometheus runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-logs-gqs28 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-logs-gqs28 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-logs-gqs28 | Value: Not Set (Defaults to root) - Message: Container ama-logs runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-logs-ndxrw | Value: Not Set (Defaults to root) - Message: Container ama-logs-prometheus runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-logs-ndxrw | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-logs-ndxrw | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-logs-ndxrw | Value: Not Set (Defaults to root) - Message: Container ama-logs runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-logs-rs-64765bd4b9-ldxwl | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-logs-rs-64765bd4b9-ldxwl | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-logs-rs-64765bd4b9-ldxwl | Value: Not Set (Defaults to root) - Message: Container prometheus-collector runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-7f878d975f-hlggb | Value: Not Set (Defaults to root) - Message: Container addon-token-adapter runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-7f878d975f-hlggb | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-7f878d975f-hlggb | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-7f878d975f-hlggb | Value: Not Set (Defaults to root) - Message: Container prometheus-collector runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-7f878d975f-q2mlg | Value: Not Set (Defaults to root) - Message: Container addon-token-adapter runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-7f878d975f-q2mlg | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-7f878d975f-q2mlg | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-7f878d975f-q2mlg | Value: Not Set (Defaults to root) - Message: Container prometheus-collector runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-node-2ssrw | Value: Not Set (Defaults to root) - Message: Container addon-token-adapter runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-node-2ssrw | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-node-2ssrw | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-node-2ssrw | Value: Not Set (Defaults to root) - Message: Container prometheus-collector runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-node-6kkz8 | Value: Not Set (Defaults to root) - Message: Container addon-token-adapter runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-node-6kkz8 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-node-6kkz8 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-node-6kkz8 | Value: Not Set (Defaults to root) - Message: Container prometheus-collector runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-node-9h44h | Value: Not Set (Defaults to root) - Message: Container addon-token-adapter runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-node-9h44h | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-node-9h44h | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-node-9h44h | Value: Not Set (Defaults to root) - Message: Container prometheus-collector runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-node-lhk42 | Value: Not Set (Defaults to root) - Message: Container addon-token-adapter runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-node-lhk42 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-node-lhk42 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-node-lhk42 | Value: Not Set (Defaults to root) - Message: Container prometheus-collector runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-node-nm5bf | Value: Not Set (Defaults to root) - Message: Container addon-token-adapter runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-node-nm5bf | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-node-nm5bf | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-node-nm5bf | Value: Not Set (Defaults to root) - Message: Container prometheus-collector runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-node-pqcz5 | Value: Not Set (Defaults to root) - Message: Container addon-token-adapter runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-node-pqcz5 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-node-pqcz5 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-node-pqcz5 | Value: Not Set (Defaults to root) - Message: Container targetallocator runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-operator-targets-66fb46c8d6-vskdg | Value: Not Set (Defaults to root) - Message: Container config-reader runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-operator-targets-66fb46c8d6-vskdg | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-operator-targets-66fb46c8d6-vskdg | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/ama-metrics-operator-targets-66fb46c8d6-vskdg | Value: Not Set (Defaults to root) - Message: Container azure-ip-masq-agent runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-ip-masq-agent-4522j | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-ip-masq-agent-4522j | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-ip-masq-agent-4522j | Value: Not Set (Defaults to root) - Message: Container azure-ip-masq-agent runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-ip-masq-agent-4c7cr | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-ip-masq-agent-4c7cr | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-ip-masq-agent-4c7cr | Value: Not Set (Defaults to root) - Message: Container azure-ip-masq-agent runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-ip-masq-agent-78rnw | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-ip-masq-agent-78rnw | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-ip-masq-agent-78rnw | Value: Not Set (Defaults to root) - Message: Container azure-ip-masq-agent runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-ip-masq-agent-84ltn | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-ip-masq-agent-84ltn | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-ip-masq-agent-84ltn | Value: Not Set (Defaults to root) - Message: Container azure-ip-masq-agent runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-ip-masq-agent-t4c2w | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-ip-masq-agent-t4c2w | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-ip-masq-agent-t4c2w | Value: Not Set (Defaults to root) - Message: Container azure-ip-masq-agent runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-ip-masq-agent-vbdd8 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-ip-masq-agent-vbdd8 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-ip-masq-agent-vbdd8 | Value: Not Set (Defaults to root) - Message: Container azure-npm runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-npm-jsbbh | Value: Not Set (Defaults to root) - Message: Container block-wireserver runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-npm-jsbbh | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-npm-jsbbh | Value: Not Set (Defaults to root) - Message: Container azure-npm runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-npm-lp6sf | Value: Not Set (Defaults to root) - Message: Container block-wireserver runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-npm-lp6sf | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-npm-lp6sf | Value: Not Set (Defaults to root) - Message: Container azure-npm runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-npm-nv6xx | Value: Not Set (Defaults to root) - Message: Container block-wireserver runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-npm-nv6xx | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-npm-nv6xx | Value: Not Set (Defaults to root) - Message: Container azure-npm runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-npm-p6fpw | Value: Not Set (Defaults to root) - Message: Container block-wireserver runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-npm-p6fpw | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-npm-p6fpw | Value: Not Set (Defaults to root) - Message: Container azure-npm runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-npm-vsrfp | Value: Not Set (Defaults to root) - Message: Container block-wireserver runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-npm-vsrfp | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-npm-vsrfp | Value: Not Set (Defaults to root) - Message: Container azure-npm runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-npm-z8mcz | Value: Not Set (Defaults to root) - Message: Container block-wireserver runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-npm-z8mcz | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-npm-z8mcz | Value: Not Set (Defaults to root) - Message: Container azure-policy runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-policy-698f7c86b4-nnff2 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-policy-698f7c86b4-nnff2 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-policy-698f7c86b4-nnff2 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-policy-webhook-764fdf5cd5-6vrc5 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-policy-webhook-764fdf5cd5-6vrc5 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-wi-webhook-controller-manager-7f95f666d4-7r44b | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-wi-webhook-controller-manager-7f95f666d4-7r44b | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-wi-webhook-controller-manager-7f95f666d4-xfh2p | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/azure-wi-webhook-controller-manager-7f95f666d4-xfh2p | Value: Not Set (Defaults to root) - Message: Container cloud-node-manager runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/cloud-node-manager-57rk2 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/cloud-node-manager-57rk2 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/cloud-node-manager-57rk2 | Value: Not Set (Defaults to root) - Message: Container cloud-node-manager runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/cloud-node-manager-gl5xl | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/cloud-node-manager-gl5xl | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/cloud-node-manager-gl5xl | Value: Not Set (Defaults to root) - Message: Container cloud-node-manager runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/cloud-node-manager-l7v5j | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/cloud-node-manager-l7v5j | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/cloud-node-manager-l7v5j | Value: Not Set (Defaults to root) - Message: Container cloud-node-manager runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/cloud-node-manager-lr49d | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/cloud-node-manager-lr49d | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/cloud-node-manager-lr49d | Value: Not Set (Defaults to root) - Message: Container cloud-node-manager runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/cloud-node-manager-n5qdr | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/cloud-node-manager-n5qdr | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/cloud-node-manager-n5qdr | Value: Not Set (Defaults to root) - Message: Container cloud-node-manager runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/cloud-node-manager-xwrrd | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/cloud-node-manager-xwrrd | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/cloud-node-manager-xwrrd | Value: Not Set (Defaults to root) - Message: Container coredns runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/coredns-658d6d767d-757xp | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/coredns-658d6d767d-757xp | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/coredns-658d6d767d-757xp | Value: Not Set (Defaults to root) - Message: Container coredns runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/coredns-658d6d767d-pt6l6 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/coredns-658d6d767d-pt6l6 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/coredns-658d6d767d-pt6l6 | Value: Not Set (Defaults to root) - Message: Container autoscaler runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/coredns-autoscaler-5955d6bbdb-mz9kn | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/coredns-autoscaler-5955d6bbdb-mz9kn | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/coredns-autoscaler-5955d6bbdb-mz9kn | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/eraser-controller-manager-864f9476c8-lhdfc | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/eraser-controller-manager-864f9476c8-lhdfc | Value: Not Set (Defaults to root) - Message: Container extension-agent runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/extension-agent-66c4486d68-46cqq | Value: Not Set (Defaults to root) - Message: Container fluent-bit runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/extension-agent-66c4486d68-46cqq | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/extension-agent-66c4486d68-46cqq | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/extension-agent-66c4486d68-46cqq | Value: Not Set (Defaults to root) - Message: Container manager runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/extension-operator-d95fd449b-ssrcx | Value: Not Set (Defaults to root) - Message: Container fluent-bit runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/extension-operator-d95fd449b-ssrcx | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/extension-operator-d95fd449b-ssrcx | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/extension-operator-d95fd449b-ssrcx | Value: Not Set (Defaults to root) - Message: Container konnectivity-agent runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/konnectivity-agent-9f65c5cd8-fzm5q | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/konnectivity-agent-9f65c5cd8-fzm5q | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/konnectivity-agent-9f65c5cd8-fzm5q | Value: Not Set (Defaults to root) - Message: Container konnectivity-agent runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/konnectivity-agent-9f65c5cd8-t9qdj | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/konnectivity-agent-9f65c5cd8-t9qdj | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/konnectivity-agent-9f65c5cd8-t9qdj | Value: Not Set (Defaults to root) - Message: Container autoscaler runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/konnectivity-agent-autoscaler-cdfc7c46-vct7p | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/konnectivity-agent-autoscaler-cdfc7c46-vct7p | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/konnectivity-agent-autoscaler-cdfc7c46-vct7p | Value: Not Set (Defaults to root) - Message: Container kube-proxy runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/kube-proxy-26xkd | Value: Not Set (Defaults to root) - Message: Container kube-proxy-bootstrap runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/kube-proxy-26xkd | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/kube-proxy-26xkd | Value: Not Set (Defaults to root) - Message: Container kube-proxy runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/kube-proxy-6mrql | Value: Not Set (Defaults to root) - Message: Container kube-proxy-bootstrap runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/kube-proxy-6mrql | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/kube-proxy-6mrql | Value: Not Set (Defaults to root) - Message: Container kube-proxy runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/kube-proxy-9rbxf | Value: Not Set (Defaults to root) - Message: Container kube-proxy-bootstrap runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/kube-proxy-9rbxf | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/kube-proxy-9rbxf | Value: Not Set (Defaults to root) - Message: Container kube-proxy runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/kube-proxy-njzgk | Value: Not Set (Defaults to root) - Message: Container kube-proxy-bootstrap runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/kube-proxy-njzgk | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/kube-proxy-njzgk | Value: Not Set (Defaults to root) - Message: Container kube-proxy runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/kube-proxy-rvmxl | Value: Not Set (Defaults to root) - Message: Container kube-proxy-bootstrap runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/kube-proxy-rvmxl | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/kube-proxy-rvmxl | Value: Not Set (Defaults to root) - Message: Container kube-proxy runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/kube-proxy-vp7xj | Value: Not Set (Defaults to root) - Message: Container kube-proxy-bootstrap runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/kube-proxy-vp7xj | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/kube-proxy-vp7xj | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/metrics-server-5f9ccffcc4-jsrjl | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/metrics-server-5f9ccffcc4-jsrjl | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/metrics-server-5f9ccffcc4-v88pw | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/metrics-server-5f9ccffcc4-v88pw | Value: Not Set (Defaults to root) - Message: Container microsoft-defender-pod-collector runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-collector-ds-6xdfq | Value: Not Set (Defaults to root) - Message: Container microsoft-defender-low-level-collector runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-collector-ds-6xdfq | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-collector-ds-6xdfq | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-collector-ds-6xdfq | Value: Not Set (Defaults to root) - Message: Container microsoft-defender-pod-collector runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-collector-ds-89l74 | Value: Not Set (Defaults to root) - Message: Container microsoft-defender-low-level-collector runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-collector-ds-89l74 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-collector-ds-89l74 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-collector-ds-89l74 | Value: Not Set (Defaults to root) - Message: Container microsoft-defender-pod-collector runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-collector-ds-d7gwk | Value: Not Set (Defaults to root) - Message: Container microsoft-defender-low-level-collector runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-collector-ds-d7gwk | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-collector-ds-d7gwk | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-collector-ds-d7gwk | Value: Not Set (Defaults to root) - Message: Container microsoft-defender-pod-collector runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-collector-ds-mdcs8 | Value: Not Set (Defaults to root) - Message: Container microsoft-defender-low-level-collector runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-collector-ds-mdcs8 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-collector-ds-mdcs8 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-collector-ds-mdcs8 | Value: Not Set (Defaults to root) - Message: Container microsoft-defender-pod-collector runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-collector-ds-q6d6c | Value: Not Set (Defaults to root) - Message: Container microsoft-defender-low-level-collector runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-collector-ds-q6d6c | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-collector-ds-q6d6c | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-collector-ds-q6d6c | Value: Not Set (Defaults to root) - Message: Container microsoft-defender-pod-collector runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-collector-ds-wb5dm | Value: Not Set (Defaults to root) - Message: Container microsoft-defender-low-level-collector runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-collector-ds-wb5dm | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-collector-ds-wb5dm | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-collector-ds-wb5dm | Value: Not Set (Defaults to root) - Message: Container microsoft-defender-pod-collector runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-collector-misc-7df6776447-bcbph | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-collector-misc-7df6776447-bcbph | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-collector-misc-7df6776447-bcbph | Value: Not Set (Defaults to root) - Message: Container microsoft-defender-publisher runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-publisher-ds-2ql5b | Value: Not Set (Defaults to root) - Message: Container old-file-cleaner runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-publisher-ds-2ql5b | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-publisher-ds-2ql5b | Value: Not Set (Defaults to root) - Message: Container microsoft-defender-publisher runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-publisher-ds-2rsrw | Value: Not Set (Defaults to root) - Message: Container old-file-cleaner runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-publisher-ds-2rsrw | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-publisher-ds-2rsrw | Value: Not Set (Defaults to root) - Message: Container microsoft-defender-publisher runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-publisher-ds-jj6dh | Value: Not Set (Defaults to root) - Message: Container old-file-cleaner runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-publisher-ds-jj6dh | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-publisher-ds-jj6dh | Value: Not Set (Defaults to root) - Message: Container microsoft-defender-publisher runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-publisher-ds-l5crs | Value: Not Set (Defaults to root) - Message: Container old-file-cleaner runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-publisher-ds-l5crs | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-publisher-ds-l5crs | Value: Not Set (Defaults to root) - Message: Container microsoft-defender-publisher runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-publisher-ds-lfk8h | Value: Not Set (Defaults to root) - Message: Container old-file-cleaner runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-publisher-ds-lfk8h | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-publisher-ds-lfk8h | Value: Not Set (Defaults to root) - Message: Container microsoft-defender-publisher runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-publisher-ds-vz2c6 | Value: Not Set (Defaults to root) - Message: Container old-file-cleaner runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-publisher-ds-vz2c6 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/microsoft-defender-publisher-ds-vz2c6 | Value: Not Set (Defaults to root) - Message: Container retina runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/retina-agent-cgv48 | Value: Not Set (Defaults to root) - Message: Container retina-agent-init runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/retina-agent-cgv48 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/retina-agent-cgv48 | Value: Not Set (Defaults to root) - Message: Container retina runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/retina-agent-gjxk8 | Value: Not Set (Defaults to root) - Message: Container retina-agent-init runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/retina-agent-gjxk8 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/retina-agent-gjxk8 | Value: Not Set (Defaults to root) - Message: Container retina runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/retina-agent-js76w | Value: Not Set (Defaults to root) - Message: Container retina-agent-init runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/retina-agent-js76w | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/retina-agent-js76w | Value: Not Set (Defaults to root) - Message: Container retina runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/retina-agent-lfn7d | Value: Not Set (Defaults to root) - Message: Container retina-agent-init runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/retina-agent-lfn7d | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/retina-agent-lfn7d | Value: Not Set (Defaults to root) - Message: Container retina runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/retina-agent-qc9bs | Value: Not Set (Defaults to root) - Message: Container retina-agent-init runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/retina-agent-qc9bs | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/retina-agent-qc9bs | Value: Not Set (Defaults to root) - Message: Container retina runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/retina-agent-wlt7b | Value: Not Set (Defaults to root) - Message: Container retina-agent-init runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/retina-agent-wlt7b | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kube-system | Resource: pod/retina-agent-wlt7b | Value: Not Set (Defaults to root) - Message: Container webserver-simple runs as root or has no runAsUser set | Namespace: kubeview | Resource: pod/simple-deployment-74fd649f8d-qxp2r | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kubeview | Resource: pod/simple-deployment-74fd649f8d-qxp2r | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: kubeview | Resource: pod/simple-deployment-74fd649f8d-qxp2r | Value: Not Set (Defaults to root) - Message: Container webserver-simple runs as root or has no runAsUser set | Namespace: linkerd | Resource: pod/simple-deployment-74fd649f8d-mkmst | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: linkerd | Resource: pod/simple-deployment-74fd649f8d-mkmst | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: linkerd | Resource: pod/simple-deployment-74fd649f8d-mkmst | Value: Not Set (Defaults to root) - Message: Container webserver-simple runs as root or has no runAsUser set | Namespace: nginx | Resource: pod/simple-deployment-74fd649f8d-hlcdk | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: nginx | Resource: pod/simple-deployment-74fd649f8d-hlcdk | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: nginx | Resource: pod/simple-deployment-74fd649f8d-hlcdk | Value: Not Set (Defaults to root) - Message: Container order-service runs as root or has no runAsUser set | Namespace: pets | Resource: pod/order-service-6c5bfb6946-b58xq | Value: Not Set (Defaults to root) - Message: Container wait-for-rabbitmq runs as root or has no runAsUser set | Namespace: pets | Resource: pod/order-service-6c5bfb6946-b58xq | Value: Not Set (Defaults to root) - Message: Container istio-init runs as root or has no runAsUser set | Namespace: pets | Resource: pod/order-service-6c5bfb6946-b58xq | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: pets | Resource: pod/order-service-6c5bfb6946-b58xq | Value: Not Set (Defaults to root) - Message: Container product-service runs as root or has no runAsUser set | Namespace: pets | Resource: pod/product-service-5dd87dfb8-ssfxc | Value: Not Set (Defaults to root) - Message: Container istio-init runs as root or has no runAsUser set | Namespace: pets | Resource: pod/product-service-5dd87dfb8-ssfxc | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: pets | Resource: pod/product-service-5dd87dfb8-ssfxc | Value: Not Set (Defaults to root) - Message: Container rabbitmq runs as root or has no runAsUser set | Namespace: pets | Resource: pod/rabbitmq-0 | Value: Not Set (Defaults to root) - Message: Container istio-init runs as root or has no runAsUser set | Namespace: pets | Resource: pod/rabbitmq-0 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: pets | Resource: pod/rabbitmq-0 | Value: Not Set (Defaults to root) - Message: Container store-front runs as root or has no runAsUser set | Namespace: pets | Resource: pod/store-front-658994fd95-pk9qn | Value: Not Set (Defaults to root) - Message: Container istio-init runs as root or has no runAsUser set | Namespace: pets | Resource: pod/store-front-658994fd95-pk9qn | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: pets | Resource: pod/store-front-658994fd95-pk9qn | Value: Not Set (Defaults to root) - Message: Container webserver-simple runs as root or has no runAsUser set | Namespace: prometheus | Resource: pod/simple-deployment-74fd649f8d-2x6w5 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: prometheus | Resource: pod/simple-deployment-74fd649f8d-2x6w5 | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: prometheus | Resource: pod/simple-deployment-74fd649f8d-2x6w5 | Value: Not Set (Defaults to root) - Message: Container webserver-simple runs as root or has no runAsUser set | Namespace: sealed-secrets | Resource: pod/simple-deployment-74fd649f8d-stktp | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: sealed-secrets | Resource: pod/simple-deployment-74fd649f8d-stktp | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: sealed-secrets | Resource: pod/simple-deployment-74fd649f8d-stktp | Value: Not Set (Defaults to root) - Message: Container webserver-simple runs as root or has no runAsUser set | Namespace: test | Resource: pod/simple-deployment-74fd649f8d-lhlkx | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: test | Resource: pod/simple-deployment-74fd649f8d-lhlkx | Value: Not Set (Defaults to root) - Message: Container runs as root or has no runAsUser set | Namespace: test | Resource: pod/simple-deployment-74fd649f8d-lhlkx | Value: Not Set (Defaults to root) [SEC004 - Privileged Containers] Section: Security Category: Pod Security Severity: High Recommendation: Avoid using privileged containers unless absolutely necessary, as they grant broad access to host resources. URL: https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted ⚠️ Total Issues: 37 - Message: Container 'secrets-store' is running in privileged mode | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-2l2wl | Value: privileged=true - Message: Container 'secrets-store' is running in privileged mode | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-6w2vp | Value: privileged=true - Message: Container 'secrets-store' is running in privileged mode | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-7879c | Value: privileged=true - Message: Container 'secrets-store' is running in privileged mode | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-m8m29 | Value: privileged=true - Message: Container 'secrets-store' is running in privileged mode | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-vnmcd | Value: privileged=true - Message: Container 'secrets-store' is running in privileged mode | Namespace: kube-system | Resource: pod/aks-secrets-store-csi-driver-zrfbz | Value: privileged=true - Message: Container 'ama-logs' is running in privileged mode | Namespace: kube-system | Resource: pod/ama-logs-4v8mz | Value: privileged=true - Message: Container 'ama-logs-prometheus' is running in privileged mode | Namespace: kube-system | Resource: pod/ama-logs-4v8mz | Value: privileged=true - Message: Container 'ama-logs' is running in privileged mode | Namespace: kube-system | Resource: pod/ama-logs-5vr2w | Value: privileged=true - Message: Container 'ama-logs-prometheus' is running in privileged mode | Namespace: kube-system | Resource: pod/ama-logs-5vr2w | Value: privileged=true - Message: Container 'ama-logs' is running in privileged mode | Namespace: kube-system | Resource: pod/ama-logs-fmd7b | Value: privileged=true - Message: Container 'ama-logs-prometheus' is running in privileged mode | Namespace: kube-system | Resource: pod/ama-logs-fmd7b | Value: privileged=true - Message: Container 'ama-logs' is running in privileged mode | Namespace: kube-system | Resource: pod/ama-logs-fpkw6 | Value: privileged=true - Message: Container 'ama-logs-prometheus' is running in privileged mode | Namespace: kube-system | Resource: pod/ama-logs-fpkw6 | Value: privileged=true - Message: Container 'ama-logs' is running in privileged mode | Namespace: kube-system | Resource: pod/ama-logs-gqs28 | Value: privileged=true - Message: Container 'ama-logs-prometheus' is running in privileged mode | Namespace: kube-system | Resource: pod/ama-logs-gqs28 | Value: privileged=true - Message: Container 'ama-logs' is running in privileged mode | Namespace: kube-system | Resource: pod/ama-logs-ndxrw | Value: privileged=true - Message: Container 'ama-logs-prometheus' is running in privileged mode | Namespace: kube-system | Resource: pod/ama-logs-ndxrw | Value: privileged=true - Message: Container 'ama-logs' is running in privileged mode | Namespace: kube-system | Resource: pod/ama-logs-rs-64765bd4b9-ldxwl | Value: privileged=true - Message: Container 'kube-proxy' is running in privileged mode | Namespace: kube-system | Resource: pod/kube-proxy-26xkd | Value: privileged=true - Message: Container 'kube-proxy-bootstrap' is running in privileged mode | Namespace: kube-system | Resource: pod/kube-proxy-26xkd | Value: privileged=true - Message: Container 'kube-proxy' is running in privileged mode | Namespace: kube-system | Resource: pod/kube-proxy-6mrql | Value: privileged=true - Message: Container 'kube-proxy-bootstrap' is running in privileged mode | Namespace: kube-system | Resource: pod/kube-proxy-6mrql | Value: privileged=true - Message: Container 'kube-proxy' is running in privileged mode | Namespace: kube-system | Resource: pod/kube-proxy-9rbxf | Value: privileged=true - Message: Container 'kube-proxy-bootstrap' is running in privileged mode | Namespace: kube-system | Resource: pod/kube-proxy-9rbxf | Value: privileged=true - Message: Container 'kube-proxy' is running in privileged mode | Namespace: kube-system | Resource: pod/kube-proxy-njzgk | Value: privileged=true - Message: Container 'kube-proxy-bootstrap' is running in privileged mode | Namespace: kube-system | Resource: pod/kube-proxy-njzgk | Value: privileged=true - Message: Container 'kube-proxy' is running in privileged mode | Namespace: kube-system | Resource: pod/kube-proxy-rvmxl | Value: privileged=true - Message: Container 'kube-proxy-bootstrap' is running in privileged mode | Namespace: kube-system | Resource: pod/kube-proxy-rvmxl | Value: privileged=true - Message: Container 'kube-proxy' is running in privileged mode | Namespace: kube-system | Resource: pod/kube-proxy-vp7xj | Value: privileged=true - Message: Container 'kube-proxy-bootstrap' is running in privileged mode | Namespace: kube-system | Resource: pod/kube-proxy-vp7xj | Value: privileged=true - Message: Container 'retina-agent-init' is running in privileged mode | Namespace: kube-system | Resource: pod/retina-agent-cgv48 | Value: privileged=true - Message: Container 'retina-agent-init' is running in privileged mode | Namespace: kube-system | Resource: pod/retina-agent-gjxk8 | Value: privileged=true - Message: Container 'retina-agent-init' is running in privileged mode | Namespace: kube-system | Resource: pod/retina-agent-js76w | Value: privileged=true - Message: Container 'retina-agent-init' is running in privileged mode | Namespace: kube-system | Resource: pod/retina-agent-lfn7d | Value: privileged=true - Message: Container 'retina-agent-init' is running in privileged mode | Namespace: kube-system | Resource: pod/retina-agent-qc9bs | Value: privileged=true - Message: Container 'retina-agent-init' is running in privileged mode | Namespace: kube-system | Resource: pod/retina-agent-wlt7b | Value: privileged=true [SEC005 - Pods Using hostIPC] Section: Security Category: Pod Security Severity: High Recommendation: Avoid using hostIPC in pods unless absolutely required for specific functionality. URL: https://kubernetes.io/docs/concepts/security/pod-security-standards/#host-namespaces ✅ No issues detected for Pods Using hostIPC. [SEC006 - Pods Missing Secure Defaults] Section: Security Category: Pod Security Severity: Medium Recommendation: Set runAsNonRoot=true, readOnlyRootFilesystem=true, and allowPrivilegeEscalation=false for all pods and containers. URL: https://kubernetes.io/docs/concepts/security/pod-security-standards/ ⚠️ Total Issues: 155 - Container: controller | Flags: runAsNonRoot: True, readOnlyRootFilesystem: , allowPrivilegeEscalation: False | Issue: Missing one or more secure defaults | Namespace: app-routing-system | Pod: nginx-69fcb489fd-4wgk9 - Container: controller | Flags: runAsNonRoot: True, readOnlyRootFilesystem: , allowPrivilegeEscalation: False | Issue: Missing one or more secure defaults | Namespace: app-routing-system | Pod: nginx-69fcb489fd-64v6k - Container: webserver-simple | Flags: Missing securityContext | Issue: No securityContext defined | Namespace: argo-rollouts | Pod: simple-deployment-74fd649f8d-996vt - Container: webserver-simple | Flags: Missing securityContext | Issue: No securityContext defined | Namespace: argo-workflows | Pod: simple-deployment-74fd649f8d-24t56 - Container: argocd-notifications-controller | Flags: runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False | Issue: Missing one or more secure defaults | Namespace: argocd | Pod: argocd-notifications-controller-6ff6bf8dd6-nbktr - Container: haproxy | Flags: runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False | Issue: Missing one or more secure defaults | Namespace: argocd | Pod: argocd-redis-ha-haproxy-fb657456c-kjbkq - Container: haproxy | Flags: runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False | Issue: Missing one or more secure defaults | Namespace: argocd | Pod: argocd-redis-ha-haproxy-fb657456c-kjlpf - Container: haproxy | Flags: runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False | Issue: Missing one or more secure defaults | Namespace: argocd | Pod: argocd-redis-ha-haproxy-fb657456c-tnjmb - Container: redis | Flags: runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False | Issue: Missing one or more secure defaults | Namespace: argocd | Pod: argocd-redis-ha-server-0 - Container: sentinel | Flags: runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False | Issue: Missing one or more secure defaults | Namespace: argocd | Pod: argocd-redis-ha-server-0 - Container: split-brain-fix | Flags: runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False | Issue: Missing one or more secure defaults | Namespace: argocd | Pod: argocd-redis-ha-server-0 - Container: redis | Flags: runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False | Issue: Missing one or more secure defaults | Namespace: argocd | Pod: argocd-redis-ha-server-1 - Container: sentinel | Flags: runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False | Issue: Missing one or more secure defaults | Namespace: argocd | Pod: argocd-redis-ha-server-1 - Container: split-brain-fix | Flags: runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False | Issue: Missing one or more secure defaults | Namespace: argocd | Pod: argocd-redis-ha-server-1 - Container: redis | Flags: runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False | Issue: Missing one or more secure defaults | Namespace: argocd | Pod: argocd-redis-ha-server-2 - Container: sentinel | Flags: runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False | Issue: Missing one or more secure defaults | Namespace: argocd | Pod: argocd-redis-ha-server-2 - Container: split-brain-fix | Flags: runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False | Issue: Missing one or more secure defaults | Namespace: argocd | Pod: argocd-redis-ha-server-2 - Container: webserver-simple | Flags: Missing securityContext | Issue: No securityContext defined | Namespace: cert-manager | Pod: simple-deployment-74fd649f8d-7cht8 - Container: webserver-simple | Flags: Missing securityContext | Issue: No securityContext defined | Namespace: grafana | Pod: simple-deployment-74fd649f8d-l7wrd - Container: node-driver-registrar | Flags: Missing securityContext | Issue: No securityContext defined | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-2l2wl - Container: secrets-store | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-2l2wl - Container: liveness-probe | Flags: Missing securityContext | Issue: No securityContext defined | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-2l2wl - Container: node-driver-registrar | Flags: Missing securityContext | Issue: No securityContext defined | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-6w2vp - Container: secrets-store | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-6w2vp - Container: liveness-probe | Flags: Missing securityContext | Issue: No securityContext defined | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-6w2vp - Container: node-driver-registrar | Flags: Missing securityContext | Issue: No securityContext defined | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-7879c - Container: secrets-store | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-7879c - Container: liveness-probe | Flags: Missing securityContext | Issue: No securityContext defined | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-7879c - Container: node-driver-registrar | Flags: Missing securityContext | Issue: No securityContext defined | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-m8m29 - Container: secrets-store | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-m8m29 - Container: liveness-probe | Flags: Missing securityContext | Issue: No securityContext defined | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-m8m29 - Container: node-driver-registrar | Flags: Missing securityContext | Issue: No securityContext defined | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-vnmcd - Container: secrets-store | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-vnmcd - Container: liveness-probe | Flags: Missing securityContext | Issue: No securityContext defined | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-vnmcd - Container: node-driver-registrar | Flags: Missing securityContext | Issue: No securityContext defined | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-zrfbz - Container: secrets-store | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-zrfbz - Container: liveness-probe | Flags: Missing securityContext | Issue: No securityContext defined | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-zrfbz - Container: provider-azure-installer | Flags: runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: aks-secrets-store-provider-azure-68nhw - Container: provider-azure-installer | Flags: runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: aks-secrets-store-provider-azure-7bqmn - Container: provider-azure-installer | Flags: runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: aks-secrets-store-provider-azure-7r458 - Container: provider-azure-installer | Flags: runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: aks-secrets-store-provider-azure-k9tdc - Container: provider-azure-installer | Flags: runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: aks-secrets-store-provider-azure-n952g - Container: provider-azure-installer | Flags: runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: aks-secrets-store-provider-azure-njpqh - Container: ama-logs | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: ama-logs-4v8mz - Container: ama-logs-prometheus | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: ama-logs-4v8mz - Container: ama-logs | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: ama-logs-5vr2w - Container: ama-logs-prometheus | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: ama-logs-5vr2w - Container: ama-logs | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: ama-logs-fmd7b - Container: ama-logs-prometheus | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: ama-logs-fmd7b - Container: ama-logs | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: ama-logs-fpkw6 - Container: ama-logs-prometheus | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: ama-logs-fpkw6 - Container: ama-logs | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: ama-logs-gqs28 - Container: ama-logs-prometheus | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: ama-logs-gqs28 - Container: ama-logs | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: ama-logs-ndxrw - Container: ama-logs-prometheus | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: ama-logs-ndxrw - Container: ama-logs | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: ama-logs-rs-64765bd4b9-ldxwl - Container: prometheus-collector | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: ama-metrics-7f878d975f-hlggb - Container: addon-token-adapter | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: ama-metrics-7f878d975f-hlggb - Container: prometheus-collector | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: ama-metrics-7f878d975f-q2mlg - Container: addon-token-adapter | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: ama-metrics-7f878d975f-q2mlg - Container: ama-metrics-ksm | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: ama-metrics-ksm-5bd68b9c-8l9lp - Container: prometheus-collector | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: ama-metrics-node-2ssrw - Container: addon-token-adapter | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: ama-metrics-node-2ssrw - Container: prometheus-collector | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: ama-metrics-node-6kkz8 - Container: addon-token-adapter | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: ama-metrics-node-6kkz8 - Container: prometheus-collector | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: ama-metrics-node-9h44h - Container: addon-token-adapter | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: ama-metrics-node-9h44h - Container: prometheus-collector | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: ama-metrics-node-lhk42 - Container: addon-token-adapter | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: ama-metrics-node-lhk42 - Container: prometheus-collector | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: ama-metrics-node-nm5bf - Container: addon-token-adapter | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: ama-metrics-node-nm5bf - Container: prometheus-collector | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: ama-metrics-node-pqcz5 - Container: addon-token-adapter | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: ama-metrics-node-pqcz5 - Container: targetallocator | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: ama-metrics-operator-targets-66fb46c8d6-vskdg - Container: config-reader | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: ama-metrics-operator-targets-66fb46c8d6-vskdg - Container: azure-ip-masq-agent | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: azure-ip-masq-agent-4522j - Container: azure-ip-masq-agent | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: azure-ip-masq-agent-4c7cr - Container: azure-ip-masq-agent | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: azure-ip-masq-agent-78rnw - Container: azure-ip-masq-agent | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: azure-ip-masq-agent-84ltn - Container: azure-ip-masq-agent | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: azure-ip-masq-agent-t4c2w - Container: azure-ip-masq-agent | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: azure-ip-masq-agent-vbdd8 - Container: azure-npm | Flags: runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: azure-npm-jsbbh - Container: azure-npm | Flags: runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: azure-npm-lp6sf - Container: azure-npm | Flags: runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: azure-npm-nv6xx - Container: azure-npm | Flags: runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: azure-npm-p6fpw - Container: azure-npm | Flags: runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: azure-npm-vsrfp - Container: azure-npm | Flags: runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: azure-npm-z8mcz - Container: azure-policy | Flags: runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: azure-policy-698f7c86b4-nnff2 - Container: cloud-node-manager | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: cloud-node-manager-57rk2 - Container: cloud-node-manager | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: cloud-node-manager-gl5xl - Container: cloud-node-manager | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: cloud-node-manager-l7v5j - Container: cloud-node-manager | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: cloud-node-manager-lr49d - Container: cloud-node-manager | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: cloud-node-manager-n5qdr - Container: cloud-node-manager | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: cloud-node-manager-xwrrd - Container: coredns | Flags: runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: coredns-658d6d767d-757xp - Container: coredns | Flags: runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: coredns-658d6d767d-pt6l6 - Container: autoscaler | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: coredns-autoscaler-5955d6bbdb-mz9kn - Container: extension-agent | Flags: Missing securityContext | Issue: No securityContext defined | Namespace: kube-system | Pod: extension-agent-66c4486d68-46cqq - Container: fluent-bit | Flags: Missing securityContext | Issue: No securityContext defined | Namespace: kube-system | Pod: extension-agent-66c4486d68-46cqq - Container: manager | Flags: Missing securityContext | Issue: No securityContext defined | Namespace: kube-system | Pod: extension-operator-d95fd449b-ssrcx - Container: fluent-bit | Flags: Missing securityContext | Issue: No securityContext defined | Namespace: kube-system | Pod: extension-operator-d95fd449b-ssrcx - Container: keda-admission-webhooks | Flags: runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: keda-admission-webhooks-787f866c7c-4b64k - Container: keda-admission-webhooks | Flags: runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: keda-admission-webhooks-787f866c7c-dw2sg - Container: keda-operator | Flags: runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: keda-operator-6b85944bfb-4zpbp - Container: keda-operator | Flags: runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: keda-operator-6b85944bfb-sx9sj - Container: keda-operator-metrics-apiserver | Flags: runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: keda-operator-metrics-apiserver-8468875db7-86c5h - Container: keda-operator-metrics-apiserver | Flags: runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: keda-operator-metrics-apiserver-8468875db7-ngp4h - Container: konnectivity-agent | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: konnectivity-agent-9f65c5cd8-fzm5q - Container: konnectivity-agent | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: konnectivity-agent-9f65c5cd8-t9qdj - Container: autoscaler | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: konnectivity-agent-autoscaler-cdfc7c46-vct7p - Container: kube-proxy | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: kube-proxy-26xkd - Container: kube-proxy | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: kube-proxy-6mrql - Container: kube-proxy | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: kube-proxy-9rbxf - Container: kube-proxy | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: kube-proxy-njzgk - Container: kube-proxy | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: kube-proxy-rvmxl - Container: kube-proxy | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: kube-proxy-vp7xj - Container: microsoft-defender-pod-collector | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: microsoft-defender-collector-ds-6xdfq - Container: microsoft-defender-low-level-collector | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: microsoft-defender-collector-ds-6xdfq - Container: microsoft-defender-pod-collector | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: microsoft-defender-collector-ds-89l74 - Container: microsoft-defender-low-level-collector | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: microsoft-defender-collector-ds-89l74 - Container: microsoft-defender-pod-collector | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: microsoft-defender-collector-ds-d7gwk - Container: microsoft-defender-low-level-collector | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: microsoft-defender-collector-ds-d7gwk - Container: microsoft-defender-pod-collector | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: microsoft-defender-collector-ds-mdcs8 - Container: microsoft-defender-low-level-collector | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: microsoft-defender-collector-ds-mdcs8 - Container: microsoft-defender-pod-collector | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: microsoft-defender-collector-ds-q6d6c - Container: microsoft-defender-low-level-collector | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: microsoft-defender-collector-ds-q6d6c - Container: microsoft-defender-pod-collector | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: microsoft-defender-collector-ds-wb5dm - Container: microsoft-defender-low-level-collector | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: microsoft-defender-collector-ds-wb5dm - Container: microsoft-defender-pod-collector | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: microsoft-defender-collector-misc-7df6776447-bcbph - Container: microsoft-defender-publisher | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: microsoft-defender-publisher-ds-2ql5b - Container: microsoft-defender-publisher | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: microsoft-defender-publisher-ds-2rsrw - Container: microsoft-defender-publisher | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: microsoft-defender-publisher-ds-jj6dh - Container: microsoft-defender-publisher | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: microsoft-defender-publisher-ds-l5crs - Container: microsoft-defender-publisher | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: microsoft-defender-publisher-ds-lfk8h - Container: microsoft-defender-publisher | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: microsoft-defender-publisher-ds-vz2c6 - Container: retina | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: retina-agent-cgv48 - Container: retina | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: retina-agent-gjxk8 - Container: retina | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: retina-agent-js76w - Container: retina | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: retina-agent-lfn7d - Container: retina | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: retina-agent-qc9bs - Container: retina | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: retina-agent-wlt7b - Container: admission-controller | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: vpa-admission-controller-7d9f8d57bd-lrcch - Container: admission-controller | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: vpa-admission-controller-7d9f8d57bd-tnqvx - Container: recommender | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: vpa-recommender-74bfff7f75-sspdc - Container: updater | Flags: runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: | Issue: Missing one or more secure defaults | Namespace: kube-system | Pod: vpa-updater-5d6d49f8b6-pxkz8 - Container: webserver-simple | Flags: Missing securityContext | Issue: No securityContext defined | Namespace: kubeview | Pod: simple-deployment-74fd649f8d-qxp2r - Container: webserver-simple | Flags: Missing securityContext | Issue: No securityContext defined | Namespace: linkerd | Pod: simple-deployment-74fd649f8d-mkmst - Container: webserver-simple | Flags: Missing securityContext | Issue: No securityContext defined | Namespace: nginx | Pod: simple-deployment-74fd649f8d-hlcdk - Container: order-service | Flags: Missing securityContext | Issue: No securityContext defined | Namespace: pets | Pod: order-service-6c5bfb6946-b58xq - Container: product-service | Flags: Missing securityContext | Issue: No securityContext defined | Namespace: pets | Pod: product-service-5dd87dfb8-ssfxc - Container: rabbitmq | Flags: Missing securityContext | Issue: No securityContext defined | Namespace: pets | Pod: rabbitmq-0 - Container: store-front | Flags: Missing securityContext | Issue: No securityContext defined | Namespace: pets | Pod: store-front-658994fd95-pk9qn - Container: webserver-simple | Flags: Missing securityContext | Issue: No securityContext defined | Namespace: prometheus | Pod: simple-deployment-74fd649f8d-2x6w5 - Container: webserver-simple | Flags: Missing securityContext | Issue: No securityContext defined | Namespace: sealed-secrets | Pod: simple-deployment-74fd649f8d-stktp - Container: webserver-simple | Flags: Missing securityContext | Issue: No securityContext defined | Namespace: test | Pod: simple-deployment-74fd649f8d-lhlkx [SEC007 - Missing Pod Security Admission Labels] Section: Security Category: Pod Security Severity: Low Recommendation: Add 'pod-security.kubernetes.io/enforce' labels to your namespaces to enforce Pod Security standards. Use values like 'baseline' or 'restricted'. URL: https://kubernetes.io/docs/concepts/security/pod-security-admission/ ⚠️ Total Issues: 32 - Audit: N/A | Issue: No pod security labels | Namespace: 1 | Warn: N/A - Audit: N/A | Issue: No pod security labels | Namespace: 10 | Warn: N/A - Audit: N/A | Issue: No pod security labels | Namespace: 2 | Warn: N/A - Audit: N/A | Issue: No pod security labels | Namespace: 3 | Warn: N/A - Audit: N/A | Issue: No pod security labels | Namespace: 4 | Warn: N/A - Audit: N/A | Issue: No pod security labels | Namespace: 5 | Warn: N/A - Audit: N/A | Issue: No pod security labels | Namespace: 6 | Warn: N/A - Audit: N/A | Issue: No pod security labels | Namespace: 7 | Warn: N/A - Audit: N/A | Issue: No pod security labels | Namespace: 8 | Warn: N/A - Audit: N/A | Issue: No pod security labels | Namespace: 9 | Warn: N/A - Audit: N/A | Issue: No pod security labels | Namespace: aks-istio-egress | Warn: N/A - Audit: N/A | Issue: No pod security labels | Namespace: aks-istio-ingress | Warn: N/A - Audit: N/A | Issue: No pod security labels | Namespace: aks-istio-system | Warn: N/A - Audit: N/A | Issue: No pod security labels | Namespace: app-routing-system | Warn: N/A - Audit: N/A | Issue: No pod security labels | Namespace: argo-rollouts | Warn: N/A - Audit: N/A | Issue: No pod security labels | Namespace: argo-workflows | Warn: N/A - Audit: N/A | Issue: No pod security labels | Namespace: argocd | Warn: N/A - Audit: N/A | Issue: No pod security labels | Namespace: cert-manager | Warn: N/A - Audit: N/A | Issue: No pod security labels | Namespace: default | Warn: N/A - Audit: N/A | Issue: No pod security labels | Namespace: gatekeeper-system | Warn: N/A - Audit: N/A | Issue: No pod security labels | Namespace: grafana | Warn: N/A - Audit: N/A | Issue: No pod security labels | Namespace: kiali-operator | Warn: N/A - Audit: N/A | Issue: No pod security labels | Namespace: kube-node-lease | Warn: N/A - Audit: N/A | Issue: No pod security labels | Namespace: kube-public | Warn: N/A - Audit: N/A | Issue: No pod security labels | Namespace: kube-system | Warn: N/A - Audit: N/A | Issue: No pod security labels | Namespace: kubeview | Warn: N/A - Audit: N/A | Issue: No pod security labels | Namespace: linkerd | Warn: N/A - Audit: N/A | Issue: No pod security labels | Namespace: nginx | Warn: N/A - Audit: N/A | Issue: No pod security labels | Namespace: pets | Warn: N/A - Audit: N/A | Issue: No pod security labels | Namespace: prometheus | Warn: N/A - Audit: N/A | Issue: No pod security labels | Namespace: sealed-secrets | Warn: N/A - Audit: N/A | Issue: No pod security labels | Namespace: test | Warn: N/A [SEC008 - Secrets in Environment Variables] Section: Security Category: Pod Security Severity: High Recommendation: Avoid exposing secrets in environment variables. Mount secrets as volumes instead. URL: https://kubernetes.io/docs/concepts/configuration/secret/#using-secrets-as-environment-variables ⚠️ Total Issues: 20 - EnvVar: env: REDIS_PASSWORD | Issue: Secret argocd-redis exposed via env var in container argocd-application-controller | Namespace: argocd | Pod: pod/argocd-application-controller-0 - EnvVar: env: AUTH | Issue: Secret argocd-redis exposed via env var in container haproxy | Namespace: argocd | Pod: pod/argocd-redis-ha-haproxy-fb657456c-kjbkq - EnvVar: env: AUTH | Issue: Secret argocd-redis exposed via env var in container haproxy | Namespace: argocd | Pod: pod/argocd-redis-ha-haproxy-fb657456c-kjlpf - EnvVar: env: AUTH | Issue: Secret argocd-redis exposed via env var in container haproxy | Namespace: argocd | Pod: pod/argocd-redis-ha-haproxy-fb657456c-tnjmb - EnvVar: env: AUTH | Issue: Secret argocd-redis exposed via env var in container redis | Namespace: argocd | Pod: pod/argocd-redis-ha-server-0 - EnvVar: env: AUTH | Issue: Secret argocd-redis exposed via env var in container sentinel | Namespace: argocd | Pod: pod/argocd-redis-ha-server-0 - EnvVar: env: AUTH | Issue: Secret argocd-redis exposed via env var in container split-brain-fix | Namespace: argocd | Pod: pod/argocd-redis-ha-server-0 - EnvVar: env: AUTH | Issue: Secret argocd-redis exposed via env var in container config-init | Namespace: argocd | Pod: pod/argocd-redis-ha-server-0 - EnvVar: env: AUTH | Issue: Secret argocd-redis exposed via env var in container redis | Namespace: argocd | Pod: pod/argocd-redis-ha-server-1 - EnvVar: env: AUTH | Issue: Secret argocd-redis exposed via env var in container sentinel | Namespace: argocd | Pod: pod/argocd-redis-ha-server-1 - EnvVar: env: AUTH | Issue: Secret argocd-redis exposed via env var in container split-brain-fix | Namespace: argocd | Pod: pod/argocd-redis-ha-server-1 - EnvVar: env: AUTH | Issue: Secret argocd-redis exposed via env var in container config-init | Namespace: argocd | Pod: pod/argocd-redis-ha-server-1 - EnvVar: env: AUTH | Issue: Secret argocd-redis exposed via env var in container redis | Namespace: argocd | Pod: pod/argocd-redis-ha-server-2 - EnvVar: env: AUTH | Issue: Secret argocd-redis exposed via env var in container sentinel | Namespace: argocd | Pod: pod/argocd-redis-ha-server-2 - EnvVar: env: AUTH | Issue: Secret argocd-redis exposed via env var in container split-brain-fix | Namespace: argocd | Pod: pod/argocd-redis-ha-server-2 - EnvVar: env: AUTH | Issue: Secret argocd-redis exposed via env var in container config-init | Namespace: argocd | Pod: pod/argocd-redis-ha-server-2 - EnvVar: env: REDIS_PASSWORD | Issue: Secret argocd-redis exposed via env var in container argocd-repo-server | Namespace: argocd | Pod: pod/argocd-repo-server-8568fc89b5-sx6ks - EnvVar: env: REDIS_PASSWORD | Issue: Secret argocd-redis exposed via env var in container argocd-repo-server | Namespace: argocd | Pod: pod/argocd-repo-server-8568fc89b5-xrzzn - EnvVar: env: REDIS_PASSWORD | Issue: Secret argocd-redis exposed via env var in container argocd-server | Namespace: argocd | Pod: pod/argocd-server-54f9645b87-k4rz8 - EnvVar: env: REDIS_PASSWORD | Issue: Secret argocd-redis exposed via env var in container argocd-server | Namespace: argocd | Pod: pod/argocd-server-54f9645b87-wwzgz [SEC009 - Missing Capabilities Drop] Section: Security Category: Pod Security Severity: Medium Recommendation: Explicitly drop all Linux capabilities unless specific ones are needed. URL: https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted ⚠️ Total Issues: 42 - Container: webserver-simple | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: argo-rollouts | Pod: simple-deployment-74fd649f8d-996vt - Container: webserver-simple | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: argo-workflows | Pod: simple-deployment-74fd649f8d-24t56 - Container: webserver-simple | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: cert-manager | Pod: simple-deployment-74fd649f8d-7cht8 - Container: webserver-simple | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: grafana | Pod: simple-deployment-74fd649f8d-l7wrd - Container: node-driver-registrar | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-2l2wl - Container: secrets-store | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-2l2wl - Container: liveness-probe | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-2l2wl - Container: node-driver-registrar | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-6w2vp - Container: secrets-store | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-6w2vp - Container: liveness-probe | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-6w2vp - Container: node-driver-registrar | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-7879c - Container: secrets-store | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-7879c - Container: liveness-probe | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-7879c - Container: node-driver-registrar | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-m8m29 - Container: secrets-store | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-m8m29 - Container: liveness-probe | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-m8m29 - Container: node-driver-registrar | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-vnmcd - Container: secrets-store | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-vnmcd - Container: liveness-probe | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-vnmcd - Container: node-driver-registrar | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-zrfbz - Container: secrets-store | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-zrfbz - Container: liveness-probe | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-zrfbz - Container: extension-agent | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: kube-system | Pod: extension-agent-66c4486d68-46cqq - Container: fluent-bit | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: kube-system | Pod: extension-agent-66c4486d68-46cqq - Container: manager | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: kube-system | Pod: extension-operator-d95fd449b-ssrcx - Container: fluent-bit | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: kube-system | Pod: extension-operator-d95fd449b-ssrcx - Container: kube-proxy | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: kube-system | Pod: kube-proxy-26xkd - Container: kube-proxy | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: kube-system | Pod: kube-proxy-6mrql - Container: kube-proxy | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: kube-system | Pod: kube-proxy-9rbxf - Container: kube-proxy | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: kube-system | Pod: kube-proxy-njzgk - Container: kube-proxy | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: kube-system | Pod: kube-proxy-rvmxl - Container: kube-proxy | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: kube-system | Pod: kube-proxy-vp7xj - Container: webserver-simple | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: kubeview | Pod: simple-deployment-74fd649f8d-qxp2r - Container: webserver-simple | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: linkerd | Pod: simple-deployment-74fd649f8d-mkmst - Container: webserver-simple | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: nginx | Pod: simple-deployment-74fd649f8d-hlcdk - Container: order-service | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: pets | Pod: order-service-6c5bfb6946-b58xq - Container: product-service | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: pets | Pod: product-service-5dd87dfb8-ssfxc - Container: rabbitmq | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: pets | Pod: rabbitmq-0 - Container: store-front | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: pets | Pod: store-front-658994fd95-pk9qn - Container: webserver-simple | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: prometheus | Pod: simple-deployment-74fd649f8d-2x6w5 - Container: webserver-simple | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: sealed-secrets | Pod: simple-deployment-74fd649f8d-stktp - Container: webserver-simple | DroppedCapabilities: | Issue: Does not drop ALL capabilities | Namespace: test | Pod: simple-deployment-74fd649f8d-lhlkx [SEC010 - HostPath Volume Usage] Section: Security Category: Pod Security Severity: High Recommendation: Avoid using hostPath unless absolutely necessary. Use persistent volumes instead. URL: https://kubernetes.io/docs/concepts/storage/volumes/#hostpath ⚠️ Total Issues: 309 - Issue: hostPath volume used | Namespace: kube-system | Path: /var/lib/kubelet/pods | Pod: aks-secrets-store-csi-driver-2l2wl | Volume: mountpoint-dir - Issue: hostPath volume used | Namespace: kube-system | Path: /var/lib/kubelet/plugins_registry/ | Pod: aks-secrets-store-csi-driver-2l2wl | Volume: registration-dir - Issue: hostPath volume used | Namespace: kube-system | Path: /var/lib/kubelet/plugins/csi-secrets-store/ | Pod: aks-secrets-store-csi-driver-2l2wl | Volume: plugin-dir - Issue: hostPath volume used | Namespace: kube-system | Path: /var/run/secrets-store-csi-providers | Pod: aks-secrets-store-csi-driver-2l2wl | Volume: providers-dir - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/kubernetes/secrets-store-csi-providers | Pod: aks-secrets-store-csi-driver-2l2wl | Volume: providers-dir-0 - Issue: hostPath volume used | Namespace: kube-system | Path: /var/lib/kubelet/pods | Pod: aks-secrets-store-csi-driver-6w2vp | Volume: mountpoint-dir - Issue: hostPath volume used | Namespace: kube-system | Path: /var/lib/kubelet/plugins_registry/ | Pod: aks-secrets-store-csi-driver-6w2vp | Volume: registration-dir - Issue: hostPath volume used | Namespace: kube-system | Path: /var/lib/kubelet/plugins/csi-secrets-store/ | Pod: aks-secrets-store-csi-driver-6w2vp | Volume: plugin-dir - Issue: hostPath volume used | Namespace: kube-system | Path: /var/run/secrets-store-csi-providers | Pod: aks-secrets-store-csi-driver-6w2vp | Volume: providers-dir - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/kubernetes/secrets-store-csi-providers | Pod: aks-secrets-store-csi-driver-6w2vp | Volume: providers-dir-0 - Issue: hostPath volume used | Namespace: kube-system | Path: /var/lib/kubelet/pods | Pod: aks-secrets-store-csi-driver-7879c | Volume: mountpoint-dir - Issue: hostPath volume used | Namespace: kube-system | Path: /var/lib/kubelet/plugins_registry/ | Pod: aks-secrets-store-csi-driver-7879c | Volume: registration-dir - Issue: hostPath volume used | Namespace: kube-system | Path: /var/lib/kubelet/plugins/csi-secrets-store/ | Pod: aks-secrets-store-csi-driver-7879c | Volume: plugin-dir - Issue: hostPath volume used | Namespace: kube-system | Path: /var/run/secrets-store-csi-providers | Pod: aks-secrets-store-csi-driver-7879c | Volume: providers-dir - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/kubernetes/secrets-store-csi-providers | Pod: aks-secrets-store-csi-driver-7879c | Volume: providers-dir-0 - Issue: hostPath volume used | Namespace: kube-system | Path: /var/lib/kubelet/pods | Pod: aks-secrets-store-csi-driver-m8m29 | Volume: mountpoint-dir - Issue: hostPath volume used | Namespace: kube-system | Path: /var/lib/kubelet/plugins_registry/ | Pod: aks-secrets-store-csi-driver-m8m29 | Volume: registration-dir - Issue: hostPath volume used | Namespace: kube-system | Path: /var/lib/kubelet/plugins/csi-secrets-store/ | Pod: aks-secrets-store-csi-driver-m8m29 | Volume: plugin-dir - Issue: hostPath volume used | Namespace: kube-system | Path: /var/run/secrets-store-csi-providers | Pod: aks-secrets-store-csi-driver-m8m29 | Volume: providers-dir - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/kubernetes/secrets-store-csi-providers | Pod: aks-secrets-store-csi-driver-m8m29 | Volume: providers-dir-0 - Issue: hostPath volume used | Namespace: kube-system | Path: /var/lib/kubelet/pods | Pod: aks-secrets-store-csi-driver-vnmcd | Volume: mountpoint-dir - Issue: hostPath volume used | Namespace: kube-system | Path: /var/lib/kubelet/plugins_registry/ | Pod: aks-secrets-store-csi-driver-vnmcd | Volume: registration-dir - Issue: hostPath volume used | Namespace: kube-system | Path: /var/lib/kubelet/plugins/csi-secrets-store/ | Pod: aks-secrets-store-csi-driver-vnmcd | Volume: plugin-dir - Issue: hostPath volume used | Namespace: kube-system | Path: /var/run/secrets-store-csi-providers | Pod: aks-secrets-store-csi-driver-vnmcd | Volume: providers-dir - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/kubernetes/secrets-store-csi-providers | Pod: aks-secrets-store-csi-driver-vnmcd | Volume: providers-dir-0 - Issue: hostPath volume used | Namespace: kube-system | Path: /var/lib/kubelet/pods | Pod: aks-secrets-store-csi-driver-zrfbz | Volume: mountpoint-dir - Issue: hostPath volume used | Namespace: kube-system | Path: /var/lib/kubelet/plugins_registry/ | Pod: aks-secrets-store-csi-driver-zrfbz | Volume: registration-dir - Issue: hostPath volume used | Namespace: kube-system | Path: /var/lib/kubelet/plugins/csi-secrets-store/ | Pod: aks-secrets-store-csi-driver-zrfbz | Volume: plugin-dir - Issue: hostPath volume used | Namespace: kube-system | Path: /var/run/secrets-store-csi-providers | Pod: aks-secrets-store-csi-driver-zrfbz | Volume: providers-dir - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/kubernetes/secrets-store-csi-providers | Pod: aks-secrets-store-csi-driver-zrfbz | Volume: providers-dir-0 - Issue: hostPath volume used | Namespace: kube-system | Path: /var/run/secrets-store-csi-providers | Pod: aks-secrets-store-provider-azure-68nhw | Volume: provider-vol - Issue: hostPath volume used | Namespace: kube-system | Path: /var/run/secrets-store-csi-providers | Pod: aks-secrets-store-provider-azure-7bqmn | Volume: provider-vol - Issue: hostPath volume used | Namespace: kube-system | Path: /var/run/secrets-store-csi-providers | Pod: aks-secrets-store-provider-azure-7r458 | Volume: provider-vol - Issue: hostPath volume used | Namespace: kube-system | Path: /var/run/secrets-store-csi-providers | Pod: aks-secrets-store-provider-azure-k9tdc | Volume: provider-vol - Issue: hostPath volume used | Namespace: kube-system | Path: /var/run/secrets-store-csi-providers | Pod: aks-secrets-store-provider-azure-n952g | Volume: provider-vol - Issue: hostPath volume used | Namespace: kube-system | Path: /var/run/secrets-store-csi-providers | Pod: aks-secrets-store-provider-azure-njpqh | Volume: provider-vol - Issue: hostPath volume used | Namespace: kube-system | Path: / | Pod: ama-logs-4v8mz | Volume: host-root - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/hostname | Pod: ama-logs-4v8mz | Volume: container-hostname - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log | Pod: ama-logs-4v8mz | Volume: host-log - Issue: hostPath volume used | Namespace: kube-system | Path: /var/run/mdsd-ci | Pod: ama-logs-4v8mz | Volume: mdsd-sock - Issue: hostPath volume used | Namespace: kube-system | Path: /var/lib/docker/containers | Pod: ama-logs-4v8mz | Volume: containerlog-path - Issue: hostPath volume used | Namespace: kube-system | Path: /mnt/docker | Pod: ama-logs-4v8mz | Volume: containerlog-path-2 - Issue: hostPath volume used | Namespace: kube-system | Path: /mnt/containers | Pod: ama-logs-4v8mz | Volume: containerlog-path-3 - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/kubernetes | Pod: ama-logs-4v8mz | Volume: azure-json-path - Issue: hostPath volume used | Namespace: kube-system | Path: / | Pod: ama-logs-5vr2w | Volume: host-root - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/hostname | Pod: ama-logs-5vr2w | Volume: container-hostname - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log | Pod: ama-logs-5vr2w | Volume: host-log - Issue: hostPath volume used | Namespace: kube-system | Path: /var/run/mdsd-ci | Pod: ama-logs-5vr2w | Volume: mdsd-sock - Issue: hostPath volume used | Namespace: kube-system | Path: /var/lib/docker/containers | Pod: ama-logs-5vr2w | Volume: containerlog-path - Issue: hostPath volume used | Namespace: kube-system | Path: /mnt/docker | Pod: ama-logs-5vr2w | Volume: containerlog-path-2 - Issue: hostPath volume used | Namespace: kube-system | Path: /mnt/containers | Pod: ama-logs-5vr2w | Volume: containerlog-path-3 - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/kubernetes | Pod: ama-logs-5vr2w | Volume: azure-json-path - Issue: hostPath volume used | Namespace: kube-system | Path: / | Pod: ama-logs-fmd7b | Volume: host-root - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/hostname | Pod: ama-logs-fmd7b | Volume: container-hostname - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log | Pod: ama-logs-fmd7b | Volume: host-log - Issue: hostPath volume used | Namespace: kube-system | Path: /var/run/mdsd-ci | Pod: ama-logs-fmd7b | Volume: mdsd-sock - Issue: hostPath volume used | Namespace: kube-system | Path: /var/lib/docker/containers | Pod: ama-logs-fmd7b | Volume: containerlog-path - Issue: hostPath volume used | Namespace: kube-system | Path: /mnt/docker | Pod: ama-logs-fmd7b | Volume: containerlog-path-2 - Issue: hostPath volume used | Namespace: kube-system | Path: /mnt/containers | Pod: ama-logs-fmd7b | Volume: containerlog-path-3 - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/kubernetes | Pod: ama-logs-fmd7b | Volume: azure-json-path - Issue: hostPath volume used | Namespace: kube-system | Path: / | Pod: ama-logs-fpkw6 | Volume: host-root - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/hostname | Pod: ama-logs-fpkw6 | Volume: container-hostname - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log | Pod: ama-logs-fpkw6 | Volume: host-log - Issue: hostPath volume used | Namespace: kube-system | Path: /var/run/mdsd-ci | Pod: ama-logs-fpkw6 | Volume: mdsd-sock - Issue: hostPath volume used | Namespace: kube-system | Path: /var/lib/docker/containers | Pod: ama-logs-fpkw6 | Volume: containerlog-path - Issue: hostPath volume used | Namespace: kube-system | Path: /mnt/docker | Pod: ama-logs-fpkw6 | Volume: containerlog-path-2 - Issue: hostPath volume used | Namespace: kube-system | Path: /mnt/containers | Pod: ama-logs-fpkw6 | Volume: containerlog-path-3 - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/kubernetes | Pod: ama-logs-fpkw6 | Volume: azure-json-path - Issue: hostPath volume used | Namespace: kube-system | Path: / | Pod: ama-logs-gqs28 | Volume: host-root - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/hostname | Pod: ama-logs-gqs28 | Volume: container-hostname - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log | Pod: ama-logs-gqs28 | Volume: host-log - Issue: hostPath volume used | Namespace: kube-system | Path: /var/run/mdsd-ci | Pod: ama-logs-gqs28 | Volume: mdsd-sock - Issue: hostPath volume used | Namespace: kube-system | Path: /var/lib/docker/containers | Pod: ama-logs-gqs28 | Volume: containerlog-path - Issue: hostPath volume used | Namespace: kube-system | Path: /mnt/docker | Pod: ama-logs-gqs28 | Volume: containerlog-path-2 - Issue: hostPath volume used | Namespace: kube-system | Path: /mnt/containers | Pod: ama-logs-gqs28 | Volume: containerlog-path-3 - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/kubernetes | Pod: ama-logs-gqs28 | Volume: azure-json-path - Issue: hostPath volume used | Namespace: kube-system | Path: / | Pod: ama-logs-ndxrw | Volume: host-root - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/hostname | Pod: ama-logs-ndxrw | Volume: container-hostname - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log | Pod: ama-logs-ndxrw | Volume: host-log - Issue: hostPath volume used | Namespace: kube-system | Path: /var/run/mdsd-ci | Pod: ama-logs-ndxrw | Volume: mdsd-sock - Issue: hostPath volume used | Namespace: kube-system | Path: /var/lib/docker/containers | Pod: ama-logs-ndxrw | Volume: containerlog-path - Issue: hostPath volume used | Namespace: kube-system | Path: /mnt/docker | Pod: ama-logs-ndxrw | Volume: containerlog-path-2 - Issue: hostPath volume used | Namespace: kube-system | Path: /mnt/containers | Pod: ama-logs-ndxrw | Volume: containerlog-path-3 - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/kubernetes | Pod: ama-logs-ndxrw | Volume: azure-json-path - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/hostname | Pod: ama-logs-rs-64765bd4b9-ldxwl | Volume: container-hostname - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log | Pod: ama-logs-rs-64765bd4b9-ldxwl | Volume: host-log - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/kubernetes | Pod: ama-logs-rs-64765bd4b9-ldxwl | Volume: azure-json-path - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log/containers | Pod: ama-metrics-7f878d975f-hlggb | Volume: host-log-containers - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log/pods | Pod: ama-metrics-7f878d975f-hlggb | Volume: host-log-pods - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/pki/ca-trust/anchors/ | Pod: ama-metrics-7f878d975f-hlggb | Volume: anchors-mariner - Issue: hostPath volume used | Namespace: kube-system | Path: /usr/local/share/ca-certificates/ | Pod: ama-metrics-7f878d975f-hlggb | Volume: anchors-ubuntu - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log/containers | Pod: ama-metrics-7f878d975f-q2mlg | Volume: host-log-containers - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log/pods | Pod: ama-metrics-7f878d975f-q2mlg | Volume: host-log-pods - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/pki/ca-trust/anchors/ | Pod: ama-metrics-7f878d975f-q2mlg | Volume: anchors-mariner - Issue: hostPath volume used | Namespace: kube-system | Path: /usr/local/share/ca-certificates/ | Pod: ama-metrics-7f878d975f-q2mlg | Volume: anchors-ubuntu - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log/containers | Pod: ama-metrics-node-2ssrw | Volume: host-log-containers - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log/pods | Pod: ama-metrics-node-2ssrw | Volume: host-log-pods - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/pki/ca-trust/anchors/ | Pod: ama-metrics-node-2ssrw | Volume: anchors-mariner - Issue: hostPath volume used | Namespace: kube-system | Path: /usr/local/share/ca-certificates/ | Pod: ama-metrics-node-2ssrw | Volume: anchors-ubuntu - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log/containers | Pod: ama-metrics-node-6kkz8 | Volume: host-log-containers - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log/pods | Pod: ama-metrics-node-6kkz8 | Volume: host-log-pods - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/pki/ca-trust/anchors/ | Pod: ama-metrics-node-6kkz8 | Volume: anchors-mariner - Issue: hostPath volume used | Namespace: kube-system | Path: /usr/local/share/ca-certificates/ | Pod: ama-metrics-node-6kkz8 | Volume: anchors-ubuntu - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log/containers | Pod: ama-metrics-node-9h44h | Volume: host-log-containers - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log/pods | Pod: ama-metrics-node-9h44h | Volume: host-log-pods - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/pki/ca-trust/anchors/ | Pod: ama-metrics-node-9h44h | Volume: anchors-mariner - Issue: hostPath volume used | Namespace: kube-system | Path: /usr/local/share/ca-certificates/ | Pod: ama-metrics-node-9h44h | Volume: anchors-ubuntu - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log/containers | Pod: ama-metrics-node-lhk42 | Volume: host-log-containers - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log/pods | Pod: ama-metrics-node-lhk42 | Volume: host-log-pods - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/pki/ca-trust/anchors/ | Pod: ama-metrics-node-lhk42 | Volume: anchors-mariner - Issue: hostPath volume used | Namespace: kube-system | Path: /usr/local/share/ca-certificates/ | Pod: ama-metrics-node-lhk42 | Volume: anchors-ubuntu - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log/containers | Pod: ama-metrics-node-nm5bf | Volume: host-log-containers - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log/pods | Pod: ama-metrics-node-nm5bf | Volume: host-log-pods - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/pki/ca-trust/anchors/ | Pod: ama-metrics-node-nm5bf | Volume: anchors-mariner - Issue: hostPath volume used | Namespace: kube-system | Path: /usr/local/share/ca-certificates/ | Pod: ama-metrics-node-nm5bf | Volume: anchors-ubuntu - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log/containers | Pod: ama-metrics-node-pqcz5 | Volume: host-log-containers - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log/pods | Pod: ama-metrics-node-pqcz5 | Volume: host-log-pods - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/pki/ca-trust/anchors/ | Pod: ama-metrics-node-pqcz5 | Volume: anchors-mariner - Issue: hostPath volume used | Namespace: kube-system | Path: /usr/local/share/ca-certificates/ | Pod: ama-metrics-node-pqcz5 | Volume: anchors-ubuntu - Issue: hostPath volume used | Namespace: kube-system | Path: /run/xtables.lock | Pod: azure-ip-masq-agent-4522j | Volume: iptableslock - Issue: hostPath volume used | Namespace: kube-system | Path: /run/xtables.lock | Pod: azure-ip-masq-agent-4c7cr | Volume: iptableslock - Issue: hostPath volume used | Namespace: kube-system | Path: /run/xtables.lock | Pod: azure-ip-masq-agent-78rnw | Volume: iptableslock - Issue: hostPath volume used | Namespace: kube-system | Path: /run/xtables.lock | Pod: azure-ip-masq-agent-84ltn | Volume: iptableslock - Issue: hostPath volume used | Namespace: kube-system | Path: /run/xtables.lock | Pod: azure-ip-masq-agent-t4c2w | Volume: iptableslock - Issue: hostPath volume used | Namespace: kube-system | Path: /run/xtables.lock | Pod: azure-ip-masq-agent-vbdd8 | Volume: iptableslock - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log | Pod: azure-npm-jsbbh | Volume: log - Issue: hostPath volume used | Namespace: kube-system | Path: /run/xtables.lock | Pod: azure-npm-jsbbh | Volume: xtables-lock - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/protocols | Pod: azure-npm-jsbbh | Volume: protocols - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log | Pod: azure-npm-lp6sf | Volume: log - Issue: hostPath volume used | Namespace: kube-system | Path: /run/xtables.lock | Pod: azure-npm-lp6sf | Volume: xtables-lock - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/protocols | Pod: azure-npm-lp6sf | Volume: protocols - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log | Pod: azure-npm-nv6xx | Volume: log - Issue: hostPath volume used | Namespace: kube-system | Path: /run/xtables.lock | Pod: azure-npm-nv6xx | Volume: xtables-lock - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/protocols | Pod: azure-npm-nv6xx | Volume: protocols - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log | Pod: azure-npm-p6fpw | Volume: log - Issue: hostPath volume used | Namespace: kube-system | Path: /run/xtables.lock | Pod: azure-npm-p6fpw | Volume: xtables-lock - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/protocols | Pod: azure-npm-p6fpw | Volume: protocols - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log | Pod: azure-npm-vsrfp | Volume: log - Issue: hostPath volume used | Namespace: kube-system | Path: /run/xtables.lock | Pod: azure-npm-vsrfp | Volume: xtables-lock - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/protocols | Pod: azure-npm-vsrfp | Volume: protocols - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log | Pod: azure-npm-z8mcz | Volume: log - Issue: hostPath volume used | Namespace: kube-system | Path: /run/xtables.lock | Pod: azure-npm-z8mcz | Volume: xtables-lock - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/protocols | Pod: azure-npm-z8mcz | Volume: protocols - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/kubernetes/azure.json | Pod: azure-policy-698f7c86b4-nnff2 | Volume: acs-credential - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/ssl/certs | Pod: azure-policy-698f7c86b4-nnff2 | Volume: ca-certs - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/pki/ca-trust/extracted | Pod: azure-policy-698f7c86b4-nnff2 | Volume: etc-pki-ca-certs - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log | Pod: extension-agent-66c4486d68-46cqq | Volume: varlog - Issue: hostPath volume used | Namespace: kube-system | Path: /var/lib/docker/containers | Pod: extension-agent-66c4486d68-46cqq | Volume: varlibdockercontainers - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/kubernetes/azure.json | Pod: extension-agent-66c4486d68-46cqq | Volume: acs-credential - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log | Pod: extension-operator-d95fd449b-ssrcx | Volume: varlog - Issue: hostPath volume used | Namespace: kube-system | Path: /var/lib/docker/containers | Pod: extension-operator-d95fd449b-ssrcx | Volume: varlibdockercontainers - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/kubernetes/azure.json | Pod: extension-operator-d95fd449b-ssrcx | Volume: acs-credential - Issue: hostPath volume used | Namespace: kube-system | Path: /run/xtables.lock | Pod: kube-proxy-26xkd | Volume: iptableslock - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/sysctl.d | Pod: kube-proxy-26xkd | Volume: sysctls - Issue: hostPath volume used | Namespace: kube-system | Path: /lib/modules | Pod: kube-proxy-26xkd | Volume: modules - Issue: hostPath volume used | Namespace: kube-system | Path: /run/xtables.lock | Pod: kube-proxy-6mrql | Volume: iptableslock - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/sysctl.d | Pod: kube-proxy-6mrql | Volume: sysctls - Issue: hostPath volume used | Namespace: kube-system | Path: /lib/modules | Pod: kube-proxy-6mrql | Volume: modules - Issue: hostPath volume used | Namespace: kube-system | Path: /run/xtables.lock | Pod: kube-proxy-9rbxf | Volume: iptableslock - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/sysctl.d | Pod: kube-proxy-9rbxf | Volume: sysctls - Issue: hostPath volume used | Namespace: kube-system | Path: /lib/modules | Pod: kube-proxy-9rbxf | Volume: modules - Issue: hostPath volume used | Namespace: kube-system | Path: /run/xtables.lock | Pod: kube-proxy-njzgk | Volume: iptableslock - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/sysctl.d | Pod: kube-proxy-njzgk | Volume: sysctls - Issue: hostPath volume used | Namespace: kube-system | Path: /lib/modules | Pod: kube-proxy-njzgk | Volume: modules - Issue: hostPath volume used | Namespace: kube-system | Path: /run/xtables.lock | Pod: kube-proxy-rvmxl | Volume: iptableslock - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/sysctl.d | Pod: kube-proxy-rvmxl | Volume: sysctls - Issue: hostPath volume used | Namespace: kube-system | Path: /lib/modules | Pod: kube-proxy-rvmxl | Volume: modules - Issue: hostPath volume used | Namespace: kube-system | Path: /run/xtables.lock | Pod: kube-proxy-vp7xj | Volume: iptableslock - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/sysctl.d | Pod: kube-proxy-vp7xj | Volume: sysctls - Issue: hostPath volume used | Namespace: kube-system | Path: /lib/modules | Pod: kube-proxy-vp7xj | Volume: modules - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log | Pod: microsoft-defender-collector-ds-6xdfq | Volume: host-log - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/kernel | Pod: microsoft-defender-collector-ds-6xdfq | Volume: debugfs - Issue: hostPath volume used | Namespace: kube-system | Path: /lib/modules | Pod: microsoft-defender-collector-ds-6xdfq | Volume: modules - Issue: hostPath volume used | Namespace: kube-system | Path: /usr/src | Pod: microsoft-defender-collector-ds-6xdfq | Volume: usr-src - Issue: hostPath volume used | Namespace: kube-system | Path: /run/containerd/containerd.sock | Pod: microsoft-defender-collector-ds-6xdfq | Volume: containerd-file-sock - Issue: hostPath volume used | Namespace: kube-system | Path: /proc | Pod: microsoft-defender-collector-ds-6xdfq | Volume: proc - Issue: hostPath volume used | Namespace: kube-system | Path: /bin | Pod: microsoft-defender-collector-ds-6xdfq | Volume: bin - Issue: hostPath volume used | Namespace: kube-system | Path: /etc | Pod: microsoft-defender-collector-ds-6xdfq | Volume: etc - Issue: hostPath volume used | Namespace: kube-system | Path: /opt | Pod: microsoft-defender-collector-ds-6xdfq | Volume: opt - Issue: hostPath volume used | Namespace: kube-system | Path: /usr | Pod: microsoft-defender-collector-ds-6xdfq | Volume: usr - Issue: hostPath volume used | Namespace: kube-system | Path: /run | Pod: microsoft-defender-collector-ds-6xdfq | Volume: run - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/fs/bpf | Pod: microsoft-defender-collector-ds-6xdfq | Volume: bpffs - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log | Pod: microsoft-defender-collector-ds-89l74 | Volume: host-log - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/kernel | Pod: microsoft-defender-collector-ds-89l74 | Volume: debugfs - Issue: hostPath volume used | Namespace: kube-system | Path: /lib/modules | Pod: microsoft-defender-collector-ds-89l74 | Volume: modules - Issue: hostPath volume used | Namespace: kube-system | Path: /usr/src | Pod: microsoft-defender-collector-ds-89l74 | Volume: usr-src - Issue: hostPath volume used | Namespace: kube-system | Path: /run/containerd/containerd.sock | Pod: microsoft-defender-collector-ds-89l74 | Volume: containerd-file-sock - Issue: hostPath volume used | Namespace: kube-system | Path: /proc | Pod: microsoft-defender-collector-ds-89l74 | Volume: proc - Issue: hostPath volume used | Namespace: kube-system | Path: /bin | Pod: microsoft-defender-collector-ds-89l74 | Volume: bin - Issue: hostPath volume used | Namespace: kube-system | Path: /etc | Pod: microsoft-defender-collector-ds-89l74 | Volume: etc - Issue: hostPath volume used | Namespace: kube-system | Path: /opt | Pod: microsoft-defender-collector-ds-89l74 | Volume: opt - Issue: hostPath volume used | Namespace: kube-system | Path: /usr | Pod: microsoft-defender-collector-ds-89l74 | Volume: usr - Issue: hostPath volume used | Namespace: kube-system | Path: /run | Pod: microsoft-defender-collector-ds-89l74 | Volume: run - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/fs/bpf | Pod: microsoft-defender-collector-ds-89l74 | Volume: bpffs - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log | Pod: microsoft-defender-collector-ds-d7gwk | Volume: host-log - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/kernel | Pod: microsoft-defender-collector-ds-d7gwk | Volume: debugfs - Issue: hostPath volume used | Namespace: kube-system | Path: /lib/modules | Pod: microsoft-defender-collector-ds-d7gwk | Volume: modules - Issue: hostPath volume used | Namespace: kube-system | Path: /usr/src | Pod: microsoft-defender-collector-ds-d7gwk | Volume: usr-src - Issue: hostPath volume used | Namespace: kube-system | Path: /run/containerd/containerd.sock | Pod: microsoft-defender-collector-ds-d7gwk | Volume: containerd-file-sock - Issue: hostPath volume used | Namespace: kube-system | Path: /proc | Pod: microsoft-defender-collector-ds-d7gwk | Volume: proc - Issue: hostPath volume used | Namespace: kube-system | Path: /bin | Pod: microsoft-defender-collector-ds-d7gwk | Volume: bin - Issue: hostPath volume used | Namespace: kube-system | Path: /etc | Pod: microsoft-defender-collector-ds-d7gwk | Volume: etc - Issue: hostPath volume used | Namespace: kube-system | Path: /opt | Pod: microsoft-defender-collector-ds-d7gwk | Volume: opt - Issue: hostPath volume used | Namespace: kube-system | Path: /usr | Pod: microsoft-defender-collector-ds-d7gwk | Volume: usr - Issue: hostPath volume used | Namespace: kube-system | Path: /run | Pod: microsoft-defender-collector-ds-d7gwk | Volume: run - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/fs/bpf | Pod: microsoft-defender-collector-ds-d7gwk | Volume: bpffs - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log | Pod: microsoft-defender-collector-ds-mdcs8 | Volume: host-log - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/kernel | Pod: microsoft-defender-collector-ds-mdcs8 | Volume: debugfs - Issue: hostPath volume used | Namespace: kube-system | Path: /lib/modules | Pod: microsoft-defender-collector-ds-mdcs8 | Volume: modules - Issue: hostPath volume used | Namespace: kube-system | Path: /usr/src | Pod: microsoft-defender-collector-ds-mdcs8 | Volume: usr-src - Issue: hostPath volume used | Namespace: kube-system | Path: /run/containerd/containerd.sock | Pod: microsoft-defender-collector-ds-mdcs8 | Volume: containerd-file-sock - Issue: hostPath volume used | Namespace: kube-system | Path: /proc | Pod: microsoft-defender-collector-ds-mdcs8 | Volume: proc - Issue: hostPath volume used | Namespace: kube-system | Path: /bin | Pod: microsoft-defender-collector-ds-mdcs8 | Volume: bin - Issue: hostPath volume used | Namespace: kube-system | Path: /etc | Pod: microsoft-defender-collector-ds-mdcs8 | Volume: etc - Issue: hostPath volume used | Namespace: kube-system | Path: /opt | Pod: microsoft-defender-collector-ds-mdcs8 | Volume: opt - Issue: hostPath volume used | Namespace: kube-system | Path: /usr | Pod: microsoft-defender-collector-ds-mdcs8 | Volume: usr - Issue: hostPath volume used | Namespace: kube-system | Path: /run | Pod: microsoft-defender-collector-ds-mdcs8 | Volume: run - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/fs/bpf | Pod: microsoft-defender-collector-ds-mdcs8 | Volume: bpffs - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log | Pod: microsoft-defender-collector-ds-q6d6c | Volume: host-log - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/kernel | Pod: microsoft-defender-collector-ds-q6d6c | Volume: debugfs - Issue: hostPath volume used | Namespace: kube-system | Path: /lib/modules | Pod: microsoft-defender-collector-ds-q6d6c | Volume: modules - Issue: hostPath volume used | Namespace: kube-system | Path: /usr/src | Pod: microsoft-defender-collector-ds-q6d6c | Volume: usr-src - Issue: hostPath volume used | Namespace: kube-system | Path: /run/containerd/containerd.sock | Pod: microsoft-defender-collector-ds-q6d6c | Volume: containerd-file-sock - Issue: hostPath volume used | Namespace: kube-system | Path: /proc | Pod: microsoft-defender-collector-ds-q6d6c | Volume: proc - Issue: hostPath volume used | Namespace: kube-system | Path: /bin | Pod: microsoft-defender-collector-ds-q6d6c | Volume: bin - Issue: hostPath volume used | Namespace: kube-system | Path: /etc | Pod: microsoft-defender-collector-ds-q6d6c | Volume: etc - Issue: hostPath volume used | Namespace: kube-system | Path: /opt | Pod: microsoft-defender-collector-ds-q6d6c | Volume: opt - Issue: hostPath volume used | Namespace: kube-system | Path: /usr | Pod: microsoft-defender-collector-ds-q6d6c | Volume: usr - Issue: hostPath volume used | Namespace: kube-system | Path: /run | Pod: microsoft-defender-collector-ds-q6d6c | Volume: run - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/fs/bpf | Pod: microsoft-defender-collector-ds-q6d6c | Volume: bpffs - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log | Pod: microsoft-defender-collector-ds-wb5dm | Volume: host-log - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/kernel | Pod: microsoft-defender-collector-ds-wb5dm | Volume: debugfs - Issue: hostPath volume used | Namespace: kube-system | Path: /lib/modules | Pod: microsoft-defender-collector-ds-wb5dm | Volume: modules - Issue: hostPath volume used | Namespace: kube-system | Path: /usr/src | Pod: microsoft-defender-collector-ds-wb5dm | Volume: usr-src - Issue: hostPath volume used | Namespace: kube-system | Path: /run/containerd/containerd.sock | Pod: microsoft-defender-collector-ds-wb5dm | Volume: containerd-file-sock - Issue: hostPath volume used | Namespace: kube-system | Path: /proc | Pod: microsoft-defender-collector-ds-wb5dm | Volume: proc - Issue: hostPath volume used | Namespace: kube-system | Path: /bin | Pod: microsoft-defender-collector-ds-wb5dm | Volume: bin - Issue: hostPath volume used | Namespace: kube-system | Path: /etc | Pod: microsoft-defender-collector-ds-wb5dm | Volume: etc - Issue: hostPath volume used | Namespace: kube-system | Path: /opt | Pod: microsoft-defender-collector-ds-wb5dm | Volume: opt - Issue: hostPath volume used | Namespace: kube-system | Path: /usr | Pod: microsoft-defender-collector-ds-wb5dm | Volume: usr - Issue: hostPath volume used | Namespace: kube-system | Path: /run | Pod: microsoft-defender-collector-ds-wb5dm | Volume: run - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/fs/bpf | Pod: microsoft-defender-collector-ds-wb5dm | Volume: bpffs - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log | Pod: microsoft-defender-collector-misc-7df6776447-bcbph | Volume: host-log - Issue: hostPath volume used | Namespace: kube-system | Path: /var/microsoft/microsoft-defender-for-cloud | Pod: microsoft-defender-publisher-ds-2ql5b | Volume: cert-onboarding - Issue: hostPath volume used | Namespace: kube-system | Path: / | Pod: microsoft-defender-publisher-ds-2ql5b | Volume: host-root - Issue: hostPath volume used | Namespace: kube-system | Path: /var/run | Pod: microsoft-defender-publisher-ds-2ql5b | Volume: docker-sock - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/hostname | Pod: microsoft-defender-publisher-ds-2ql5b | Volume: container-hostname - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log | Pod: microsoft-defender-publisher-ds-2ql5b | Volume: host-log - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/kubernetes | Pod: microsoft-defender-publisher-ds-2ql5b | Volume: azure-json-path - Issue: hostPath volume used | Namespace: kube-system | Path: /var/microsoft/microsoft-defender-for-cloud | Pod: microsoft-defender-publisher-ds-2rsrw | Volume: cert-onboarding - Issue: hostPath volume used | Namespace: kube-system | Path: / | Pod: microsoft-defender-publisher-ds-2rsrw | Volume: host-root - Issue: hostPath volume used | Namespace: kube-system | Path: /var/run | Pod: microsoft-defender-publisher-ds-2rsrw | Volume: docker-sock - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/hostname | Pod: microsoft-defender-publisher-ds-2rsrw | Volume: container-hostname - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log | Pod: microsoft-defender-publisher-ds-2rsrw | Volume: host-log - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/kubernetes | Pod: microsoft-defender-publisher-ds-2rsrw | Volume: azure-json-path - Issue: hostPath volume used | Namespace: kube-system | Path: /var/microsoft/microsoft-defender-for-cloud | Pod: microsoft-defender-publisher-ds-jj6dh | Volume: cert-onboarding - Issue: hostPath volume used | Namespace: kube-system | Path: / | Pod: microsoft-defender-publisher-ds-jj6dh | Volume: host-root - Issue: hostPath volume used | Namespace: kube-system | Path: /var/run | Pod: microsoft-defender-publisher-ds-jj6dh | Volume: docker-sock - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/hostname | Pod: microsoft-defender-publisher-ds-jj6dh | Volume: container-hostname - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log | Pod: microsoft-defender-publisher-ds-jj6dh | Volume: host-log - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/kubernetes | Pod: microsoft-defender-publisher-ds-jj6dh | Volume: azure-json-path - Issue: hostPath volume used | Namespace: kube-system | Path: /var/microsoft/microsoft-defender-for-cloud | Pod: microsoft-defender-publisher-ds-l5crs | Volume: cert-onboarding - Issue: hostPath volume used | Namespace: kube-system | Path: / | Pod: microsoft-defender-publisher-ds-l5crs | Volume: host-root - Issue: hostPath volume used | Namespace: kube-system | Path: /var/run | Pod: microsoft-defender-publisher-ds-l5crs | Volume: docker-sock - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/hostname | Pod: microsoft-defender-publisher-ds-l5crs | Volume: container-hostname - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log | Pod: microsoft-defender-publisher-ds-l5crs | Volume: host-log - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/kubernetes | Pod: microsoft-defender-publisher-ds-l5crs | Volume: azure-json-path - Issue: hostPath volume used | Namespace: kube-system | Path: /var/microsoft/microsoft-defender-for-cloud | Pod: microsoft-defender-publisher-ds-lfk8h | Volume: cert-onboarding - Issue: hostPath volume used | Namespace: kube-system | Path: / | Pod: microsoft-defender-publisher-ds-lfk8h | Volume: host-root - Issue: hostPath volume used | Namespace: kube-system | Path: /var/run | Pod: microsoft-defender-publisher-ds-lfk8h | Volume: docker-sock - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/hostname | Pod: microsoft-defender-publisher-ds-lfk8h | Volume: container-hostname - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log | Pod: microsoft-defender-publisher-ds-lfk8h | Volume: host-log - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/kubernetes | Pod: microsoft-defender-publisher-ds-lfk8h | Volume: azure-json-path - Issue: hostPath volume used | Namespace: kube-system | Path: /var/microsoft/microsoft-defender-for-cloud | Pod: microsoft-defender-publisher-ds-vz2c6 | Volume: cert-onboarding - Issue: hostPath volume used | Namespace: kube-system | Path: / | Pod: microsoft-defender-publisher-ds-vz2c6 | Volume: host-root - Issue: hostPath volume used | Namespace: kube-system | Path: /var/run | Pod: microsoft-defender-publisher-ds-vz2c6 | Volume: docker-sock - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/hostname | Pod: microsoft-defender-publisher-ds-vz2c6 | Volume: container-hostname - Issue: hostPath volume used | Namespace: kube-system | Path: /var/log | Pod: microsoft-defender-publisher-ds-vz2c6 | Volume: host-log - Issue: hostPath volume used | Namespace: kube-system | Path: /etc/kubernetes | Pod: microsoft-defender-publisher-ds-vz2c6 | Volume: azure-json-path - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/kernel/debug | Pod: retina-agent-cgv48 | Volume: debug - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/kernel/tracing | Pod: retina-agent-cgv48 | Volume: trace - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/fs/bpf | Pod: retina-agent-cgv48 | Volume: bpf - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/fs/cgroup | Pod: retina-agent-cgv48 | Volume: cgroup - Issue: hostPath volume used | Namespace: kube-system | Path: /var/run/cilium | Pod: retina-agent-cgv48 | Volume: cilium - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/kernel/debug | Pod: retina-agent-gjxk8 | Volume: debug - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/kernel/tracing | Pod: retina-agent-gjxk8 | Volume: trace - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/fs/bpf | Pod: retina-agent-gjxk8 | Volume: bpf - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/fs/cgroup | Pod: retina-agent-gjxk8 | Volume: cgroup - Issue: hostPath volume used | Namespace: kube-system | Path: /var/run/cilium | Pod: retina-agent-gjxk8 | Volume: cilium - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/kernel/debug | Pod: retina-agent-js76w | Volume: debug - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/kernel/tracing | Pod: retina-agent-js76w | Volume: trace - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/fs/bpf | Pod: retina-agent-js76w | Volume: bpf - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/fs/cgroup | Pod: retina-agent-js76w | Volume: cgroup - Issue: hostPath volume used | Namespace: kube-system | Path: /var/run/cilium | Pod: retina-agent-js76w | Volume: cilium - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/kernel/debug | Pod: retina-agent-lfn7d | Volume: debug - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/kernel/tracing | Pod: retina-agent-lfn7d | Volume: trace - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/fs/bpf | Pod: retina-agent-lfn7d | Volume: bpf - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/fs/cgroup | Pod: retina-agent-lfn7d | Volume: cgroup - Issue: hostPath volume used | Namespace: kube-system | Path: /var/run/cilium | Pod: retina-agent-lfn7d | Volume: cilium - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/kernel/debug | Pod: retina-agent-qc9bs | Volume: debug - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/kernel/tracing | Pod: retina-agent-qc9bs | Volume: trace - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/fs/bpf | Pod: retina-agent-qc9bs | Volume: bpf - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/fs/cgroup | Pod: retina-agent-qc9bs | Volume: cgroup - Issue: hostPath volume used | Namespace: kube-system | Path: /var/run/cilium | Pod: retina-agent-qc9bs | Volume: cilium - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/kernel/debug | Pod: retina-agent-wlt7b | Volume: debug - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/kernel/tracing | Pod: retina-agent-wlt7b | Volume: trace - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/fs/bpf | Pod: retina-agent-wlt7b | Volume: bpf - Issue: hostPath volume used | Namespace: kube-system | Path: /sys/fs/cgroup | Pod: retina-agent-wlt7b | Volume: cgroup - Issue: hostPath volume used | Namespace: kube-system | Path: /var/run/cilium | Pod: retina-agent-wlt7b | Volume: cilium [SEC011 - Containers Running as UID 0] Section: Security Category: Pod Security Severity: High Recommendation: Avoid setting runAsUser to 0. Use non-root UIDs for better isolation. URL: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ ⚠️ Total Issues: 13 - Container: provider-azure-installer | Issue: Container runs as UID 0 | Namespace: kube-system | Pod: aks-secrets-store-provider-azure-68nhw | UID: 0 - Container: provider-azure-installer | Issue: Container runs as UID 0 | Namespace: kube-system | Pod: aks-secrets-store-provider-azure-7bqmn | UID: 0 - Container: provider-azure-installer | Issue: Container runs as UID 0 | Namespace: kube-system | Pod: aks-secrets-store-provider-azure-7r458 | UID: 0 - Container: provider-azure-installer | Issue: Container runs as UID 0 | Namespace: kube-system | Pod: aks-secrets-store-provider-azure-k9tdc | UID: 0 - Container: provider-azure-installer | Issue: Container runs as UID 0 | Namespace: kube-system | Pod: aks-secrets-store-provider-azure-n952g | UID: 0 - Container: provider-azure-installer | Issue: Container runs as UID 0 | Namespace: kube-system | Pod: aks-secrets-store-provider-azure-njpqh | UID: 0 - Container: azure-policy | Issue: Container runs as UID 0 | Namespace: kube-system | Pod: azure-policy-698f7c86b4-nnff2 | UID: 0 - Container: retina | Issue: Container runs as UID 0 | Namespace: kube-system | Pod: retina-agent-cgv48 | UID: 0 - Container: retina | Issue: Container runs as UID 0 | Namespace: kube-system | Pod: retina-agent-gjxk8 | UID: 0 - Container: retina | Issue: Container runs as UID 0 | Namespace: kube-system | Pod: retina-agent-js76w | UID: 0 - Container: retina | Issue: Container runs as UID 0 | Namespace: kube-system | Pod: retina-agent-lfn7d | UID: 0 - Container: retina | Issue: Container runs as UID 0 | Namespace: kube-system | Pod: retina-agent-qc9bs | UID: 0 - Container: retina | Issue: Container runs as UID 0 | Namespace: kube-system | Pod: retina-agent-wlt7b | UID: 0 [SEC012 - Added Linux Capabilities] Section: Security Category: Pod Security Severity: Medium Recommendation: Avoid adding capabilities unless necessary. Most apps don’t need them. URL: https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted ⚠️ Total Issues: 70 - Capabilities: NET_BIND_SERVICE | Container: controller | Issue: Added Linux capabilities | Namespace: app-routing-system | Pod: nginx-69fcb489fd-4wgk9 - Capabilities: NET_BIND_SERVICE | Container: controller | Issue: Added Linux capabilities | Namespace: app-routing-system | Pod: nginx-69fcb489fd-64v6k - Capabilities: DAC_OVERRIDE | Container: ama-logs | Issue: Added Linux capabilities | Namespace: kube-system | Pod: ama-logs-4v8mz - Capabilities: DAC_OVERRIDE | Container: ama-logs-prometheus | Issue: Added Linux capabilities | Namespace: kube-system | Pod: ama-logs-4v8mz - Capabilities: DAC_OVERRIDE | Container: ama-logs | Issue: Added Linux capabilities | Namespace: kube-system | Pod: ama-logs-5vr2w - Capabilities: DAC_OVERRIDE | Container: ama-logs-prometheus | Issue: Added Linux capabilities | Namespace: kube-system | Pod: ama-logs-5vr2w - Capabilities: DAC_OVERRIDE | Container: ama-logs | Issue: Added Linux capabilities | Namespace: kube-system | Pod: ama-logs-fmd7b - Capabilities: DAC_OVERRIDE | Container: ama-logs-prometheus | Issue: Added Linux capabilities | Namespace: kube-system | Pod: ama-logs-fmd7b - Capabilities: DAC_OVERRIDE | Container: ama-logs | Issue: Added Linux capabilities | Namespace: kube-system | Pod: ama-logs-fpkw6 - Capabilities: DAC_OVERRIDE | Container: ama-logs-prometheus | Issue: Added Linux capabilities | Namespace: kube-system | Pod: ama-logs-fpkw6 - Capabilities: DAC_OVERRIDE | Container: ama-logs | Issue: Added Linux capabilities | Namespace: kube-system | Pod: ama-logs-gqs28 - Capabilities: DAC_OVERRIDE | Container: ama-logs-prometheus | Issue: Added Linux capabilities | Namespace: kube-system | Pod: ama-logs-gqs28 - Capabilities: DAC_OVERRIDE | Container: ama-logs | Issue: Added Linux capabilities | Namespace: kube-system | Pod: ama-logs-ndxrw - Capabilities: DAC_OVERRIDE | Container: ama-logs-prometheus | Issue: Added Linux capabilities | Namespace: kube-system | Pod: ama-logs-ndxrw - Capabilities: DAC_OVERRIDE | Container: ama-logs | Issue: Added Linux capabilities | Namespace: kube-system | Pod: ama-logs-rs-64765bd4b9-ldxwl - Capabilities: DAC_OVERRIDE | Container: prometheus-collector | Issue: Added Linux capabilities | Namespace: kube-system | Pod: ama-metrics-7f878d975f-hlggb - Capabilities: NET_ADMIN, NET_RAW | Container: addon-token-adapter | Issue: Added Linux capabilities | Namespace: kube-system | Pod: ama-metrics-7f878d975f-hlggb - Capabilities: DAC_OVERRIDE | Container: prometheus-collector | Issue: Added Linux capabilities | Namespace: kube-system | Pod: ama-metrics-7f878d975f-q2mlg - Capabilities: NET_ADMIN, NET_RAW | Container: addon-token-adapter | Issue: Added Linux capabilities | Namespace: kube-system | Pod: ama-metrics-7f878d975f-q2mlg - Capabilities: DAC_OVERRIDE | Container: prometheus-collector | Issue: Added Linux capabilities | Namespace: kube-system | Pod: ama-metrics-node-2ssrw - Capabilities: NET_ADMIN, NET_RAW | Container: addon-token-adapter | Issue: Added Linux capabilities | Namespace: kube-system | Pod: ama-metrics-node-2ssrw - Capabilities: DAC_OVERRIDE | Container: prometheus-collector | Issue: Added Linux capabilities | Namespace: kube-system | Pod: ama-metrics-node-6kkz8 - Capabilities: NET_ADMIN, NET_RAW | Container: addon-token-adapter | Issue: Added Linux capabilities | Namespace: kube-system | Pod: ama-metrics-node-6kkz8 - Capabilities: DAC_OVERRIDE | Container: prometheus-collector | Issue: Added Linux capabilities | Namespace: kube-system | Pod: ama-metrics-node-9h44h - Capabilities: NET_ADMIN, NET_RAW | Container: addon-token-adapter | Issue: Added Linux capabilities | Namespace: kube-system | Pod: ama-metrics-node-9h44h - Capabilities: DAC_OVERRIDE | Container: prometheus-collector | Issue: Added Linux capabilities | Namespace: kube-system | Pod: ama-metrics-node-lhk42 - Capabilities: NET_ADMIN, NET_RAW | Container: addon-token-adapter | Issue: Added Linux capabilities | Namespace: kube-system | Pod: ama-metrics-node-lhk42 - Capabilities: DAC_OVERRIDE | Container: prometheus-collector | Issue: Added Linux capabilities | Namespace: kube-system | Pod: ama-metrics-node-nm5bf - Capabilities: NET_ADMIN, NET_RAW | Container: addon-token-adapter | Issue: Added Linux capabilities | Namespace: kube-system | Pod: ama-metrics-node-nm5bf - Capabilities: DAC_OVERRIDE | Container: prometheus-collector | Issue: Added Linux capabilities | Namespace: kube-system | Pod: ama-metrics-node-pqcz5 - Capabilities: NET_ADMIN, NET_RAW | Container: addon-token-adapter | Issue: Added Linux capabilities | Namespace: kube-system | Pod: ama-metrics-node-pqcz5 - Capabilities: NET_ADMIN, NET_RAW | Container: azure-ip-masq-agent | Issue: Added Linux capabilities | Namespace: kube-system | Pod: azure-ip-masq-agent-4522j - Capabilities: NET_ADMIN, NET_RAW | Container: azure-ip-masq-agent | Issue: Added Linux capabilities | Namespace: kube-system | Pod: azure-ip-masq-agent-4c7cr - Capabilities: NET_ADMIN, NET_RAW | Container: azure-ip-masq-agent | Issue: Added Linux capabilities | Namespace: kube-system | Pod: azure-ip-masq-agent-78rnw - Capabilities: NET_ADMIN, NET_RAW | Container: azure-ip-masq-agent | Issue: Added Linux capabilities | Namespace: kube-system | Pod: azure-ip-masq-agent-84ltn - Capabilities: NET_ADMIN, NET_RAW | Container: azure-ip-masq-agent | Issue: Added Linux capabilities | Namespace: kube-system | Pod: azure-ip-masq-agent-t4c2w - Capabilities: NET_ADMIN, NET_RAW | Container: azure-ip-masq-agent | Issue: Added Linux capabilities | Namespace: kube-system | Pod: azure-ip-masq-agent-vbdd8 - Capabilities: NET_ADMIN, NET_RAW | Container: azure-npm | Issue: Added Linux capabilities | Namespace: kube-system | Pod: azure-npm-jsbbh - Capabilities: NET_ADMIN, NET_RAW | Container: azure-npm | Issue: Added Linux capabilities | Namespace: kube-system | Pod: azure-npm-lp6sf - Capabilities: NET_ADMIN, NET_RAW | Container: azure-npm | Issue: Added Linux capabilities | Namespace: kube-system | Pod: azure-npm-nv6xx - Capabilities: NET_ADMIN, NET_RAW | Container: azure-npm | Issue: Added Linux capabilities | Namespace: kube-system | Pod: azure-npm-p6fpw - Capabilities: NET_ADMIN, NET_RAW | Container: azure-npm | Issue: Added Linux capabilities | Namespace: kube-system | Pod: azure-npm-vsrfp - Capabilities: NET_ADMIN, NET_RAW | Container: azure-npm | Issue: Added Linux capabilities | Namespace: kube-system | Pod: azure-npm-z8mcz - Capabilities: NET_BIND_SERVICE | Container: coredns | Issue: Added Linux capabilities | Namespace: kube-system | Pod: coredns-658d6d767d-757xp - Capabilities: NET_BIND_SERVICE | Container: coredns | Issue: Added Linux capabilities | Namespace: kube-system | Pod: coredns-658d6d767d-pt6l6 - Capabilities: NET_RAW, NET_ADMIN | Container: microsoft-defender-pod-collector | Issue: Added Linux capabilities | Namespace: kube-system | Pod: microsoft-defender-collector-ds-6xdfq - Capabilities: SYS_ADMIN, SYS_RESOURCE, SYS_PTRACE, SYSLOG, IPC_LOCK, NET_ADMIN, NET_RAW | Container: microsoft-defender-low-level-collector | Issue: Added Linux capabilities | Namespace: kube-system | Pod: microsoft-defender-collector-ds-6xdfq - Capabilities: NET_RAW, NET_ADMIN | Container: microsoft-defender-pod-collector | Issue: Added Linux capabilities | Namespace: kube-system | Pod: microsoft-defender-collector-ds-89l74 - Capabilities: SYS_ADMIN, SYS_RESOURCE, SYS_PTRACE, SYSLOG, IPC_LOCK, NET_ADMIN, NET_RAW | Container: microsoft-defender-low-level-collector | Issue: Added Linux capabilities | Namespace: kube-system | Pod: microsoft-defender-collector-ds-89l74 - Capabilities: NET_RAW, NET_ADMIN | Container: microsoft-defender-pod-collector | Issue: Added Linux capabilities | Namespace: kube-system | Pod: microsoft-defender-collector-ds-d7gwk - Capabilities: SYS_ADMIN, SYS_RESOURCE, SYS_PTRACE, SYSLOG, IPC_LOCK, NET_ADMIN, NET_RAW | Container: microsoft-defender-low-level-collector | Issue: Added Linux capabilities | Namespace: kube-system | Pod: microsoft-defender-collector-ds-d7gwk - Capabilities: NET_RAW, NET_ADMIN | Container: microsoft-defender-pod-collector | Issue: Added Linux capabilities | Namespace: kube-system | Pod: microsoft-defender-collector-ds-mdcs8 - Capabilities: SYS_ADMIN, SYS_RESOURCE, SYS_PTRACE, SYSLOG, IPC_LOCK, NET_ADMIN, NET_RAW | Container: microsoft-defender-low-level-collector | Issue: Added Linux capabilities | Namespace: kube-system | Pod: microsoft-defender-collector-ds-mdcs8 - Capabilities: NET_RAW, NET_ADMIN | Container: microsoft-defender-pod-collector | Issue: Added Linux capabilities | Namespace: kube-system | Pod: microsoft-defender-collector-ds-q6d6c - Capabilities: SYS_ADMIN, SYS_RESOURCE, SYS_PTRACE, SYSLOG, IPC_LOCK, NET_ADMIN, NET_RAW | Container: microsoft-defender-low-level-collector | Issue: Added Linux capabilities | Namespace: kube-system | Pod: microsoft-defender-collector-ds-q6d6c - Capabilities: NET_RAW, NET_ADMIN | Container: microsoft-defender-pod-collector | Issue: Added Linux capabilities | Namespace: kube-system | Pod: microsoft-defender-collector-ds-wb5dm - Capabilities: SYS_ADMIN, SYS_RESOURCE, SYS_PTRACE, SYSLOG, IPC_LOCK, NET_ADMIN, NET_RAW | Container: microsoft-defender-low-level-collector | Issue: Added Linux capabilities | Namespace: kube-system | Pod: microsoft-defender-collector-ds-wb5dm - Capabilities: NET_RAW, NET_ADMIN | Container: microsoft-defender-pod-collector | Issue: Added Linux capabilities | Namespace: kube-system | Pod: microsoft-defender-collector-misc-7df6776447-bcbph - Capabilities: NET_RAW, NET_ADMIN | Container: microsoft-defender-publisher | Issue: Added Linux capabilities | Namespace: kube-system | Pod: microsoft-defender-publisher-ds-2ql5b - Capabilities: NET_RAW, NET_ADMIN | Container: microsoft-defender-publisher | Issue: Added Linux capabilities | Namespace: kube-system | Pod: microsoft-defender-publisher-ds-2rsrw - Capabilities: NET_RAW, NET_ADMIN | Container: microsoft-defender-publisher | Issue: Added Linux capabilities | Namespace: kube-system | Pod: microsoft-defender-publisher-ds-jj6dh - Capabilities: NET_RAW, NET_ADMIN | Container: microsoft-defender-publisher | Issue: Added Linux capabilities | Namespace: kube-system | Pod: microsoft-defender-publisher-ds-l5crs - Capabilities: NET_RAW, NET_ADMIN | Container: microsoft-defender-publisher | Issue: Added Linux capabilities | Namespace: kube-system | Pod: microsoft-defender-publisher-ds-lfk8h - Capabilities: NET_RAW, NET_ADMIN | Container: microsoft-defender-publisher | Issue: Added Linux capabilities | Namespace: kube-system | Pod: microsoft-defender-publisher-ds-vz2c6 - Capabilities: SYS_ADMIN, SYS_RESOURCE, NET_ADMIN, NET_RAW, IPC_LOCK | Container: retina | Issue: Added Linux capabilities | Namespace: kube-system | Pod: retina-agent-cgv48 - Capabilities: SYS_ADMIN, SYS_RESOURCE, NET_ADMIN, NET_RAW, IPC_LOCK | Container: retina | Issue: Added Linux capabilities | Namespace: kube-system | Pod: retina-agent-gjxk8 - Capabilities: SYS_ADMIN, SYS_RESOURCE, NET_ADMIN, NET_RAW, IPC_LOCK | Container: retina | Issue: Added Linux capabilities | Namespace: kube-system | Pod: retina-agent-js76w - Capabilities: SYS_ADMIN, SYS_RESOURCE, NET_ADMIN, NET_RAW, IPC_LOCK | Container: retina | Issue: Added Linux capabilities | Namespace: kube-system | Pod: retina-agent-lfn7d - Capabilities: SYS_ADMIN, SYS_RESOURCE, NET_ADMIN, NET_RAW, IPC_LOCK | Container: retina | Issue: Added Linux capabilities | Namespace: kube-system | Pod: retina-agent-qc9bs - Capabilities: SYS_ADMIN, SYS_RESOURCE, NET_ADMIN, NET_RAW, IPC_LOCK | Container: retina | Issue: Added Linux capabilities | Namespace: kube-system | Pod: retina-agent-wlt7b [SEC013 - EmptyDir Volume Usage] Section: Security Category: Pod Security Severity: Low Recommendation: Use persistent volumes or configMaps instead of EmptyDir when persistence is required. URL: https://kubernetes.io/docs/concepts/storage/volumes/#emptydir ⚠️ Total Issues: 98 - Issue: EmptyDir volume used | Namespace: aks-istio-ingress | Pod: aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-hdfn4 | Volume: workload-socket - Issue: EmptyDir volume used | Namespace: aks-istio-ingress | Pod: aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-hdfn4 | Volume: credential-socket - Issue: EmptyDir volume used | Namespace: aks-istio-ingress | Pod: aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-hdfn4 | Volume: workload-certs - Issue: EmptyDir volume used | Namespace: aks-istio-ingress | Pod: aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-hdfn4 | Volume: istio-envoy - Issue: EmptyDir volume used | Namespace: aks-istio-ingress | Pod: aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-hdfn4 | Volume: istio-data - Issue: EmptyDir volume used | Namespace: aks-istio-ingress | Pod: aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-zqwtb | Volume: workload-socket - Issue: EmptyDir volume used | Namespace: aks-istio-ingress | Pod: aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-zqwtb | Volume: credential-socket - Issue: EmptyDir volume used | Namespace: aks-istio-ingress | Pod: aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-zqwtb | Volume: workload-certs - Issue: EmptyDir volume used | Namespace: aks-istio-ingress | Pod: aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-zqwtb | Volume: istio-envoy - Issue: EmptyDir volume used | Namespace: aks-istio-ingress | Pod: aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-zqwtb | Volume: istio-data - Issue: EmptyDir volume used | Namespace: aks-istio-system | Pod: istiod-asm-1-23-7744d5fbf4-9572m | Volume: local-certs - Issue: EmptyDir volume used | Namespace: aks-istio-system | Pod: istiod-asm-1-23-7744d5fbf4-rqzvt | Volume: local-certs - Issue: EmptyDir volume used | Namespace: argocd | Pod: argocd-application-controller-0 | Volume: argocd-home - Issue: EmptyDir volume used | Namespace: argocd | Pod: argocd-application-controller-0 | Volume: argocd-application-controller-tmp - Issue: EmptyDir volume used | Namespace: argocd | Pod: argocd-applicationset-controller-6fdf84dbb6-msffz | Volume: gpg-keyring - Issue: EmptyDir volume used | Namespace: argocd | Pod: argocd-applicationset-controller-6fdf84dbb6-msffz | Volume: tmp - Issue: EmptyDir volume used | Namespace: argocd | Pod: argocd-dex-server-556c76889-h4kxj | Volume: static-files - Issue: EmptyDir volume used | Namespace: argocd | Pod: argocd-dex-server-556c76889-h4kxj | Volume: dexconfig - Issue: EmptyDir volume used | Namespace: argocd | Pod: argocd-redis-ha-haproxy-fb657456c-kjbkq | Volume: shared-socket - Issue: EmptyDir volume used | Namespace: argocd | Pod: argocd-redis-ha-haproxy-fb657456c-kjbkq | Volume: data - Issue: EmptyDir volume used | Namespace: argocd | Pod: argocd-redis-ha-haproxy-fb657456c-kjlpf | Volume: shared-socket - Issue: EmptyDir volume used | Namespace: argocd | Pod: argocd-redis-ha-haproxy-fb657456c-kjlpf | Volume: data - Issue: EmptyDir volume used | Namespace: argocd | Pod: argocd-redis-ha-haproxy-fb657456c-tnjmb | Volume: shared-socket - Issue: EmptyDir volume used | Namespace: argocd | Pod: argocd-redis-ha-haproxy-fb657456c-tnjmb | Volume: data - Issue: EmptyDir volume used | Namespace: argocd | Pod: argocd-redis-ha-server-0 | Volume: data - Issue: EmptyDir volume used | Namespace: argocd | Pod: argocd-redis-ha-server-1 | Volume: data - Issue: EmptyDir volume used | Namespace: argocd | Pod: argocd-redis-ha-server-2 | Volume: data - Issue: EmptyDir volume used | Namespace: argocd | Pod: argocd-repo-server-8568fc89b5-sx6ks | Volume: gpg-keyring - Issue: EmptyDir volume used | Namespace: argocd | Pod: argocd-repo-server-8568fc89b5-sx6ks | Volume: tmp - Issue: EmptyDir volume used | Namespace: argocd | Pod: argocd-repo-server-8568fc89b5-sx6ks | Volume: helm-working-dir - Issue: EmptyDir volume used | Namespace: argocd | Pod: argocd-repo-server-8568fc89b5-sx6ks | Volume: var-files - Issue: EmptyDir volume used | Namespace: argocd | Pod: argocd-repo-server-8568fc89b5-sx6ks | Volume: plugins - Issue: EmptyDir volume used | Namespace: argocd | Pod: argocd-repo-server-8568fc89b5-xrzzn | Volume: gpg-keyring - Issue: EmptyDir volume used | Namespace: argocd | Pod: argocd-repo-server-8568fc89b5-xrzzn | Volume: tmp - Issue: EmptyDir volume used | Namespace: argocd | Pod: argocd-repo-server-8568fc89b5-xrzzn | Volume: helm-working-dir - Issue: EmptyDir volume used | Namespace: argocd | Pod: argocd-repo-server-8568fc89b5-xrzzn | Volume: var-files - Issue: EmptyDir volume used | Namespace: argocd | Pod: argocd-repo-server-8568fc89b5-xrzzn | Volume: plugins - Issue: EmptyDir volume used | Namespace: argocd | Pod: argocd-server-54f9645b87-k4rz8 | Volume: plugins-home - Issue: EmptyDir volume used | Namespace: argocd | Pod: argocd-server-54f9645b87-k4rz8 | Volume: tmp - Issue: EmptyDir volume used | Namespace: argocd | Pod: argocd-server-54f9645b87-wwzgz | Volume: plugins-home - Issue: EmptyDir volume used | Namespace: argocd | Pod: argocd-server-54f9645b87-wwzgz | Volume: tmp - Issue: EmptyDir volume used | Namespace: gatekeeper-system | Pod: gatekeeper-audit-77858c8f69-7k782 | Volume: tmp-volume - Issue: EmptyDir volume used | Namespace: kiali-operator | Pod: kiali-operator-696bd54db-mr8md | Volume: tmp - Issue: EmptyDir volume used | Namespace: kube-system | Pod: ama-logs-4v8mz | Volume: mdsd-prometheus-sock - Issue: EmptyDir volume used | Namespace: kube-system | Pod: ama-logs-5vr2w | Volume: mdsd-prometheus-sock - Issue: EmptyDir volume used | Namespace: kube-system | Pod: ama-logs-fmd7b | Volume: mdsd-prometheus-sock - Issue: EmptyDir volume used | Namespace: kube-system | Pod: ama-logs-fpkw6 | Volume: mdsd-prometheus-sock - Issue: EmptyDir volume used | Namespace: kube-system | Pod: ama-logs-gqs28 | Volume: mdsd-prometheus-sock - Issue: EmptyDir volume used | Namespace: kube-system | Pod: ama-logs-ndxrw | Volume: mdsd-prometheus-sock - Issue: EmptyDir volume used | Namespace: kube-system | Pod: ama-metrics-operator-targets-66fb46c8d6-vskdg | Volume: ta-config-shared - Issue: EmptyDir volume used | Namespace: kube-system | Pod: azure-npm-jsbbh | Volume: tmp - Issue: EmptyDir volume used | Namespace: kube-system | Pod: azure-npm-lp6sf | Volume: tmp - Issue: EmptyDir volume used | Namespace: kube-system | Pod: azure-npm-nv6xx | Volume: tmp - Issue: EmptyDir volume used | Namespace: kube-system | Pod: azure-npm-p6fpw | Volume: tmp - Issue: EmptyDir volume used | Namespace: kube-system | Pod: azure-npm-vsrfp | Volume: tmp - Issue: EmptyDir volume used | Namespace: kube-system | Pod: azure-npm-z8mcz | Volume: tmp - Issue: EmptyDir volume used | Namespace: kube-system | Pod: coredns-658d6d767d-757xp | Volume: tmp - Issue: EmptyDir volume used | Namespace: kube-system | Pod: coredns-658d6d767d-pt6l6 | Volume: tmp - Issue: EmptyDir volume used | Namespace: kube-system | Pod: metrics-server-5f9ccffcc4-jsrjl | Volume: tmp-dir - Issue: EmptyDir volume used | Namespace: kube-system | Pod: metrics-server-5f9ccffcc4-v88pw | Volume: tmp-dir - Issue: EmptyDir volume used | Namespace: kube-system | Pod: microsoft-defender-collector-ds-6xdfq | Volume: ebpf - Issue: EmptyDir volume used | Namespace: kube-system | Pod: microsoft-defender-collector-ds-89l74 | Volume: ebpf - Issue: EmptyDir volume used | Namespace: kube-system | Pod: microsoft-defender-collector-ds-d7gwk | Volume: ebpf - Issue: EmptyDir volume used | Namespace: kube-system | Pod: microsoft-defender-collector-ds-mdcs8 | Volume: ebpf - Issue: EmptyDir volume used | Namespace: kube-system | Pod: microsoft-defender-collector-ds-q6d6c | Volume: ebpf - Issue: EmptyDir volume used | Namespace: kube-system | Pod: microsoft-defender-collector-ds-wb5dm | Volume: ebpf - Issue: EmptyDir volume used | Namespace: kube-system | Pod: microsoft-defender-publisher-ds-2ql5b | Volume: fluent-bit-conf - Issue: EmptyDir volume used | Namespace: kube-system | Pod: microsoft-defender-publisher-ds-2rsrw | Volume: fluent-bit-conf - Issue: EmptyDir volume used | Namespace: kube-system | Pod: microsoft-defender-publisher-ds-jj6dh | Volume: fluent-bit-conf - Issue: EmptyDir volume used | Namespace: kube-system | Pod: microsoft-defender-publisher-ds-l5crs | Volume: fluent-bit-conf - Issue: EmptyDir volume used | Namespace: kube-system | Pod: microsoft-defender-publisher-ds-lfk8h | Volume: fluent-bit-conf - Issue: EmptyDir volume used | Namespace: kube-system | Pod: microsoft-defender-publisher-ds-vz2c6 | Volume: fluent-bit-conf - Issue: EmptyDir volume used | Namespace: kube-system | Pod: retina-agent-cgv48 | Volume: tmp - Issue: EmptyDir volume used | Namespace: kube-system | Pod: retina-agent-gjxk8 | Volume: tmp - Issue: EmptyDir volume used | Namespace: kube-system | Pod: retina-agent-js76w | Volume: tmp - Issue: EmptyDir volume used | Namespace: kube-system | Pod: retina-agent-lfn7d | Volume: tmp - Issue: EmptyDir volume used | Namespace: kube-system | Pod: retina-agent-qc9bs | Volume: tmp - Issue: EmptyDir volume used | Namespace: kube-system | Pod: retina-agent-wlt7b | Volume: tmp - Issue: EmptyDir volume used | Namespace: pets | Pod: order-service-6c5bfb6946-b58xq | Volume: workload-socket - Issue: EmptyDir volume used | Namespace: pets | Pod: order-service-6c5bfb6946-b58xq | Volume: credential-socket - Issue: EmptyDir volume used | Namespace: pets | Pod: order-service-6c5bfb6946-b58xq | Volume: workload-certs - Issue: EmptyDir volume used | Namespace: pets | Pod: order-service-6c5bfb6946-b58xq | Volume: istio-envoy - Issue: EmptyDir volume used | Namespace: pets | Pod: order-service-6c5bfb6946-b58xq | Volume: istio-data - Issue: EmptyDir volume used | Namespace: pets | Pod: product-service-5dd87dfb8-ssfxc | Volume: workload-socket - Issue: EmptyDir volume used | Namespace: pets | Pod: product-service-5dd87dfb8-ssfxc | Volume: credential-socket - Issue: EmptyDir volume used | Namespace: pets | Pod: product-service-5dd87dfb8-ssfxc | Volume: workload-certs - Issue: EmptyDir volume used | Namespace: pets | Pod: product-service-5dd87dfb8-ssfxc | Volume: istio-envoy - Issue: EmptyDir volume used | Namespace: pets | Pod: product-service-5dd87dfb8-ssfxc | Volume: istio-data - Issue: EmptyDir volume used | Namespace: pets | Pod: rabbitmq-0 | Volume: workload-socket - Issue: EmptyDir volume used | Namespace: pets | Pod: rabbitmq-0 | Volume: credential-socket - Issue: EmptyDir volume used | Namespace: pets | Pod: rabbitmq-0 | Volume: workload-certs - Issue: EmptyDir volume used | Namespace: pets | Pod: rabbitmq-0 | Volume: istio-envoy - Issue: EmptyDir volume used | Namespace: pets | Pod: rabbitmq-0 | Volume: istio-data - Issue: EmptyDir volume used | Namespace: pets | Pod: store-front-658994fd95-pk9qn | Volume: workload-socket - Issue: EmptyDir volume used | Namespace: pets | Pod: store-front-658994fd95-pk9qn | Volume: credential-socket - Issue: EmptyDir volume used | Namespace: pets | Pod: store-front-658994fd95-pk9qn | Volume: workload-certs - Issue: EmptyDir volume used | Namespace: pets | Pod: store-front-658994fd95-pk9qn | Volume: istio-envoy - Issue: EmptyDir volume used | Namespace: pets | Pod: store-front-658994fd95-pk9qn | Volume: istio-data [SEC014 - Untrusted Image Registries] Section: Security Category: Pod Security Severity: High Recommendation: Use only trusted registries. Restrict deployment sources via policy. URL: https://kubernetes.io/docs/concepts/containers/images/ ⚠️ Total Issues: 180 - Container: istio-proxy | Image: mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless | Issue: Image from untrusted registry | Namespace: aks-istio-ingress | Pod: aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-hdfn4 - Container: istio-proxy | Image: mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless | Issue: Image from untrusted registry | Namespace: aks-istio-ingress | Pod: aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-zqwtb - Container: discovery | Image: mcr.microsoft.com/oss/istio/pilot:1.23.5-distroless | Issue: Image from untrusted registry | Namespace: aks-istio-system | Pod: istiod-asm-1-23-7744d5fbf4-9572m - Container: discovery | Image: mcr.microsoft.com/oss/istio/pilot:1.23.5-distroless | Issue: Image from untrusted registry | Namespace: aks-istio-system | Pod: istiod-asm-1-23-7744d5fbf4-rqzvt - Container: controller | Image: mcr.microsoft.com/oss/kubernetes/ingress/nginx-ingress-controller:v1.11.5 | Issue: Image from untrusted registry | Namespace: app-routing-system | Pod: nginx-69fcb489fd-4wgk9 - Container: controller | Image: mcr.microsoft.com/oss/kubernetes/ingress/nginx-ingress-controller:v1.11.5 | Issue: Image from untrusted registry | Namespace: app-routing-system | Pod: nginx-69fcb489fd-64v6k - Container: webserver-simple | Image: docker.io/kostiscodefresh/gitops-simple-app:v1.0 | Issue: Image from untrusted registry | Namespace: argo-rollouts | Pod: simple-deployment-74fd649f8d-996vt - Container: webserver-simple | Image: docker.io/kostiscodefresh/gitops-simple-app:v1.0 | Issue: Image from untrusted registry | Namespace: argo-workflows | Pod: simple-deployment-74fd649f8d-24t56 - Container: argocd-application-controller | Image: mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 | Issue: Image from untrusted registry | Namespace: argocd | Pod: argocd-application-controller-0 - Container: argocd-applicationset-controller | Image: mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 | Issue: Image from untrusted registry | Namespace: argocd | Pod: argocd-applicationset-controller-6fdf84dbb6-msffz - Container: dex | Image: mcr.microsoft.com/oss/v2/dexidp/dex:v2.41.1 | Issue: Image from untrusted registry | Namespace: argocd | Pod: argocd-dex-server-556c76889-h4kxj - Container: argocd-notifications-controller | Image: mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 | Issue: Image from untrusted registry | Namespace: argocd | Pod: argocd-notifications-controller-6ff6bf8dd6-nbktr - Container: haproxy | Image: mcr.microsoft.com/oss/v2/haproxy/haproxy:v2.9.11 | Issue: Image from untrusted registry | Namespace: argocd | Pod: argocd-redis-ha-haproxy-fb657456c-kjbkq - Container: haproxy | Image: mcr.microsoft.com/oss/v2/haproxy/haproxy:v2.9.11 | Issue: Image from untrusted registry | Namespace: argocd | Pod: argocd-redis-ha-haproxy-fb657456c-kjlpf - Container: haproxy | Image: mcr.microsoft.com/oss/v2/haproxy/haproxy:v2.9.11 | Issue: Image from untrusted registry | Namespace: argocd | Pod: argocd-redis-ha-haproxy-fb657456c-tnjmb - Container: redis | Image: mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 | Issue: Image from untrusted registry | Namespace: argocd | Pod: argocd-redis-ha-server-0 - Container: sentinel | Image: mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 | Issue: Image from untrusted registry | Namespace: argocd | Pod: argocd-redis-ha-server-0 - Container: split-brain-fix | Image: mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 | Issue: Image from untrusted registry | Namespace: argocd | Pod: argocd-redis-ha-server-0 - Container: redis | Image: mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 | Issue: Image from untrusted registry | Namespace: argocd | Pod: argocd-redis-ha-server-1 - Container: sentinel | Image: mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 | Issue: Image from untrusted registry | Namespace: argocd | Pod: argocd-redis-ha-server-1 - Container: split-brain-fix | Image: mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 | Issue: Image from untrusted registry | Namespace: argocd | Pod: argocd-redis-ha-server-1 - Container: redis | Image: mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 | Issue: Image from untrusted registry | Namespace: argocd | Pod: argocd-redis-ha-server-2 - Container: sentinel | Image: mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 | Issue: Image from untrusted registry | Namespace: argocd | Pod: argocd-redis-ha-server-2 - Container: split-brain-fix | Image: mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7 | Issue: Image from untrusted registry | Namespace: argocd | Pod: argocd-redis-ha-server-2 - Container: argocd-repo-server | Image: mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 | Issue: Image from untrusted registry | Namespace: argocd | Pod: argocd-repo-server-8568fc89b5-sx6ks - Container: argocd-repo-server | Image: mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 | Issue: Image from untrusted registry | Namespace: argocd | Pod: argocd-repo-server-8568fc89b5-xrzzn - Container: argocd-server | Image: mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 | Issue: Image from untrusted registry | Namespace: argocd | Pod: argocd-server-54f9645b87-k4rz8 - Container: argocd-server | Image: mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1 | Issue: Image from untrusted registry | Namespace: argocd | Pod: argocd-server-54f9645b87-wwzgz - Container: webserver-simple | Image: docker.io/kostiscodefresh/gitops-simple-app:v1.0 | Issue: Image from untrusted registry | Namespace: cert-manager | Pod: simple-deployment-74fd649f8d-7cht8 - Container: gatekeeper-audit-container | Image: mcr.microsoft.com/oss/v2/open-policy-agent/gatekeeper:v3.18.2-1 | Issue: Image from untrusted registry | Namespace: gatekeeper-system | Pod: gatekeeper-audit-77858c8f69-7k782 - Container: gatekeeper-controller-container | Image: mcr.microsoft.com/oss/v2/open-policy-agent/gatekeeper:v3.18.2-1 | Issue: Image from untrusted registry | Namespace: gatekeeper-system | Pod: gatekeeper-controller-6f97954b4b-7tbnr - Container: gatekeeper-controller-container | Image: mcr.microsoft.com/oss/v2/open-policy-agent/gatekeeper:v3.18.2-1 | Issue: Image from untrusted registry | Namespace: gatekeeper-system | Pod: gatekeeper-controller-6f97954b4b-gwrgg - Container: webserver-simple | Image: docker.io/kostiscodefresh/gitops-simple-app:v1.0 | Issue: Image from untrusted registry | Namespace: grafana | Pod: simple-deployment-74fd649f8d-l7wrd - Container: kiali | Image: quay.io/kiali/kiali:v2.7.1 | Issue: Image from untrusted registry | Namespace: kiali-operator | Pod: kiali-5b88cfb6f8-cm8dz - Container: operator | Image: quay.io/kiali/kiali-operator:v2.7.1 | Issue: Image from untrusted registry | Namespace: kiali-operator | Pod: kiali-operator-696bd54db-mr8md - Container: node-driver-registrar | Image: mcr.microsoft.com/oss/kubernetes-csi/csi-node-driver-registrar:v2.11.1 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-2l2wl - Container: secrets-store | Image: mcr.microsoft.com/oss/kubernetes-csi/secrets-store/driver:v1.4.8 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-2l2wl - Container: liveness-probe | Image: mcr.microsoft.com/oss/kubernetes-csi/livenessprobe:v2.13.1 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-2l2wl - Container: node-driver-registrar | Image: mcr.microsoft.com/oss/kubernetes-csi/csi-node-driver-registrar:v2.11.1 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-6w2vp - Container: secrets-store | Image: mcr.microsoft.com/oss/kubernetes-csi/secrets-store/driver:v1.4.8 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-6w2vp - Container: liveness-probe | Image: mcr.microsoft.com/oss/kubernetes-csi/livenessprobe:v2.13.1 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-6w2vp - Container: node-driver-registrar | Image: mcr.microsoft.com/oss/kubernetes-csi/csi-node-driver-registrar:v2.11.1 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-7879c - Container: secrets-store | Image: mcr.microsoft.com/oss/kubernetes-csi/secrets-store/driver:v1.4.8 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-7879c - Container: liveness-probe | Image: mcr.microsoft.com/oss/kubernetes-csi/livenessprobe:v2.13.1 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-7879c - Container: node-driver-registrar | Image: mcr.microsoft.com/oss/kubernetes-csi/csi-node-driver-registrar:v2.11.1 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-m8m29 - Container: secrets-store | Image: mcr.microsoft.com/oss/kubernetes-csi/secrets-store/driver:v1.4.8 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-m8m29 - Container: liveness-probe | Image: mcr.microsoft.com/oss/kubernetes-csi/livenessprobe:v2.13.1 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-m8m29 - Container: node-driver-registrar | Image: mcr.microsoft.com/oss/kubernetes-csi/csi-node-driver-registrar:v2.11.1 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-vnmcd - Container: secrets-store | Image: mcr.microsoft.com/oss/kubernetes-csi/secrets-store/driver:v1.4.8 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-vnmcd - Container: liveness-probe | Image: mcr.microsoft.com/oss/kubernetes-csi/livenessprobe:v2.13.1 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-vnmcd - Container: node-driver-registrar | Image: mcr.microsoft.com/oss/kubernetes-csi/csi-node-driver-registrar:v2.11.1 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-zrfbz - Container: secrets-store | Image: mcr.microsoft.com/oss/kubernetes-csi/secrets-store/driver:v1.4.8 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-zrfbz - Container: liveness-probe | Image: mcr.microsoft.com/oss/kubernetes-csi/livenessprobe:v2.13.1 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: aks-secrets-store-csi-driver-zrfbz - Container: provider-azure-installer | Image: mcr.microsoft.com/oss/azure/secrets-store/provider-azure:v1.6.2 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: aks-secrets-store-provider-azure-68nhw - Container: provider-azure-installer | Image: mcr.microsoft.com/oss/azure/secrets-store/provider-azure:v1.6.2 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: aks-secrets-store-provider-azure-7bqmn - Container: provider-azure-installer | Image: mcr.microsoft.com/oss/azure/secrets-store/provider-azure:v1.6.2 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: aks-secrets-store-provider-azure-7r458 - Container: provider-azure-installer | Image: mcr.microsoft.com/oss/azure/secrets-store/provider-azure:v1.6.2 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: aks-secrets-store-provider-azure-k9tdc - Container: provider-azure-installer | Image: mcr.microsoft.com/oss/azure/secrets-store/provider-azure:v1.6.2 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: aks-secrets-store-provider-azure-n952g - Container: provider-azure-installer | Image: mcr.microsoft.com/oss/azure/secrets-store/provider-azure:v1.6.2 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: aks-secrets-store-provider-azure-njpqh - Container: ama-logs | Image: mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: ama-logs-4v8mz - Container: ama-logs-prometheus | Image: mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: ama-logs-4v8mz - Container: ama-logs | Image: mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: ama-logs-5vr2w - Container: ama-logs-prometheus | Image: mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: ama-logs-5vr2w - Container: ama-logs | Image: mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: ama-logs-fmd7b - Container: ama-logs-prometheus | Image: mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: ama-logs-fmd7b - Container: ama-logs | Image: mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: ama-logs-fpkw6 - Container: ama-logs-prometheus | Image: mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: ama-logs-fpkw6 - Container: ama-logs | Image: mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: ama-logs-gqs28 - Container: ama-logs-prometheus | Image: mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: ama-logs-gqs28 - Container: ama-logs | Image: mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: ama-logs-ndxrw - Container: ama-logs-prometheus | Image: mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: ama-logs-ndxrw - Container: ama-logs | Image: mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: ama-logs-rs-64765bd4b9-ldxwl - Container: prometheus-collector | Image: mcr.microsoft.com/azuremonitor/containerinsights/ciprod/prometheus-collector/images:6.15.0-main-02-21-2025-4acb2b4c | Issue: Image from untrusted registry | Namespace: kube-system | Pod: ama-metrics-7f878d975f-hlggb - Container: addon-token-adapter | Image: mcr.microsoft.com/aks/msi/addon-token-adapter:master.250224.1 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: ama-metrics-7f878d975f-hlggb - Container: prometheus-collector | Image: mcr.microsoft.com/azuremonitor/containerinsights/ciprod/prometheus-collector/images:6.15.0-main-02-21-2025-4acb2b4c | Issue: Image from untrusted registry | Namespace: kube-system | Pod: ama-metrics-7f878d975f-q2mlg - Container: addon-token-adapter | Image: mcr.microsoft.com/aks/msi/addon-token-adapter:master.250224.1 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: ama-metrics-7f878d975f-q2mlg - Container: ama-metrics-ksm | Image: mcr.microsoft.com/oss/kubernetes/kube-state-metrics:v2.12.0 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: ama-metrics-ksm-5bd68b9c-8l9lp - Container: prometheus-collector | Image: mcr.microsoft.com/azuremonitor/containerinsights/ciprod/prometheus-collector/images:6.15.0-main-02-21-2025-4acb2b4c | Issue: Image from untrusted registry | Namespace: kube-system | Pod: ama-metrics-node-2ssrw - Container: addon-token-adapter | Image: mcr.microsoft.com/aks/msi/addon-token-adapter:master.250224.1 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: ama-metrics-node-2ssrw - Container: prometheus-collector | Image: mcr.microsoft.com/azuremonitor/containerinsights/ciprod/prometheus-collector/images:6.15.0-main-02-21-2025-4acb2b4c | Issue: Image from untrusted registry | Namespace: kube-system | Pod: ama-metrics-node-6kkz8 - Container: addon-token-adapter | Image: mcr.microsoft.com/aks/msi/addon-token-adapter:master.250224.1 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: ama-metrics-node-6kkz8 - Container: prometheus-collector | Image: mcr.microsoft.com/azuremonitor/containerinsights/ciprod/prometheus-collector/images:6.15.0-main-02-21-2025-4acb2b4c | Issue: Image from untrusted registry | Namespace: kube-system | Pod: ama-metrics-node-9h44h - Container: addon-token-adapter | Image: mcr.microsoft.com/aks/msi/addon-token-adapter:master.250224.1 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: ama-metrics-node-9h44h - Container: prometheus-collector | Image: mcr.microsoft.com/azuremonitor/containerinsights/ciprod/prometheus-collector/images:6.15.0-main-02-21-2025-4acb2b4c | Issue: Image from untrusted registry | Namespace: kube-system | Pod: ama-metrics-node-lhk42 - Container: addon-token-adapter | Image: mcr.microsoft.com/aks/msi/addon-token-adapter:master.250224.1 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: ama-metrics-node-lhk42 - Container: prometheus-collector | Image: mcr.microsoft.com/azuremonitor/containerinsights/ciprod/prometheus-collector/images:6.15.0-main-02-21-2025-4acb2b4c | Issue: Image from untrusted registry | Namespace: kube-system | Pod: ama-metrics-node-nm5bf - Container: addon-token-adapter | Image: mcr.microsoft.com/aks/msi/addon-token-adapter:master.250224.1 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: ama-metrics-node-nm5bf - Container: prometheus-collector | Image: mcr.microsoft.com/azuremonitor/containerinsights/ciprod/prometheus-collector/images:6.15.0-main-02-21-2025-4acb2b4c | Issue: Image from untrusted registry | Namespace: kube-system | Pod: ama-metrics-node-pqcz5 - Container: addon-token-adapter | Image: mcr.microsoft.com/aks/msi/addon-token-adapter:master.250224.1 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: ama-metrics-node-pqcz5 - Container: targetallocator | Image: mcr.microsoft.com/azuremonitor/containerinsights/ciprod/prometheus-collector/images:6.15.0-main-02-21-2025-4acb2b4c-targetallocator | Issue: Image from untrusted registry | Namespace: kube-system | Pod: ama-metrics-operator-targets-66fb46c8d6-vskdg - Container: config-reader | Image: mcr.microsoft.com/azuremonitor/containerinsights/ciprod/prometheus-collector/images:6.15.0-main-02-21-2025-4acb2b4c-cfg | Issue: Image from untrusted registry | Namespace: kube-system | Pod: ama-metrics-operator-targets-66fb46c8d6-vskdg - Container: azure-ip-masq-agent | Image: mcr.microsoft.com/oss/v2/azure/ip-masq-agent-v2:v0.1.15-2 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: azure-ip-masq-agent-4522j - Container: azure-ip-masq-agent | Image: mcr.microsoft.com/oss/v2/azure/ip-masq-agent-v2:v0.1.15-2 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: azure-ip-masq-agent-4c7cr - Container: azure-ip-masq-agent | Image: mcr.microsoft.com/oss/v2/azure/ip-masq-agent-v2:v0.1.15-2 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: azure-ip-masq-agent-78rnw - Container: azure-ip-masq-agent | Image: mcr.microsoft.com/oss/v2/azure/ip-masq-agent-v2:v0.1.15-2 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: azure-ip-masq-agent-84ltn - Container: azure-ip-masq-agent | Image: mcr.microsoft.com/oss/v2/azure/ip-masq-agent-v2:v0.1.15-2 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: azure-ip-masq-agent-t4c2w - Container: azure-ip-masq-agent | Image: mcr.microsoft.com/oss/v2/azure/ip-masq-agent-v2:v0.1.15-2 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: azure-ip-masq-agent-vbdd8 - Container: azure-npm | Image: mcr.microsoft.com/containernetworking/azure-npm:v1.5.45 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: azure-npm-jsbbh - Container: azure-npm | Image: mcr.microsoft.com/containernetworking/azure-npm:v1.5.45 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: azure-npm-lp6sf - Container: azure-npm | Image: mcr.microsoft.com/containernetworking/azure-npm:v1.5.45 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: azure-npm-nv6xx - Container: azure-npm | Image: mcr.microsoft.com/containernetworking/azure-npm:v1.5.45 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: azure-npm-p6fpw - Container: azure-npm | Image: mcr.microsoft.com/containernetworking/azure-npm:v1.5.45 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: azure-npm-vsrfp - Container: azure-npm | Image: mcr.microsoft.com/containernetworking/azure-npm:v1.5.45 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: azure-npm-z8mcz - Container: azure-policy | Image: mcr.microsoft.com/azure-policy/policy-kubernetes-addon-prod:1.10.1 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: azure-policy-698f7c86b4-nnff2 - Container: azure-policy-webhook | Image: mcr.microsoft.com/azure-policy/policy-kubernetes-webhook:1.10.0 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: azure-policy-webhook-764fdf5cd5-6vrc5 - Container: manager | Image: mcr.microsoft.com/oss/azure/workload-identity/webhook:v1.4.0 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: azure-wi-webhook-controller-manager-7f95f666d4-7r44b - Container: manager | Image: mcr.microsoft.com/oss/azure/workload-identity/webhook:v1.4.0 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: azure-wi-webhook-controller-manager-7f95f666d4-xfh2p - Container: cloud-node-manager | Image: mcr.microsoft.com/oss/kubernetes/azure-cloud-node-manager:v1.30.10 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: cloud-node-manager-57rk2 - Container: cloud-node-manager | Image: mcr.microsoft.com/oss/kubernetes/azure-cloud-node-manager:v1.30.10 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: cloud-node-manager-gl5xl - Container: cloud-node-manager | Image: mcr.microsoft.com/oss/kubernetes/azure-cloud-node-manager:v1.30.10 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: cloud-node-manager-l7v5j - Container: cloud-node-manager | Image: mcr.microsoft.com/oss/kubernetes/azure-cloud-node-manager:v1.30.10 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: cloud-node-manager-lr49d - Container: cloud-node-manager | Image: mcr.microsoft.com/oss/kubernetes/azure-cloud-node-manager:v1.30.10 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: cloud-node-manager-n5qdr - Container: cloud-node-manager | Image: mcr.microsoft.com/oss/kubernetes/azure-cloud-node-manager:v1.30.10 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: cloud-node-manager-xwrrd - Container: coredns | Image: mcr.microsoft.com/oss/v2/kubernetes/coredns:v1.9.4-5 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: coredns-658d6d767d-757xp - Container: coredns | Image: mcr.microsoft.com/oss/v2/kubernetes/coredns:v1.9.4-5 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: coredns-658d6d767d-pt6l6 - Container: autoscaler | Image: mcr.microsoft.com/oss/v2/kubernetes/autoscaler/cluster-proportional-autoscaler:v1.8.11-5 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: coredns-autoscaler-5955d6bbdb-mz9kn - Container: manager | Image: mcr.microsoft.com/oss/v2/eraser/eraser-manager:v1.4.0-2 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: eraser-controller-manager-864f9476c8-lhdfc - Container: extension-agent | Image: mcr.microsoft.com/azurearck8s/aks/stable/config-agent:1.23.3 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: extension-agent-66c4486d68-46cqq - Container: fluent-bit | Image: mcr.microsoft.com/azurearck8s/aks/stable/fluent-bit-collector:1.23.3 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: extension-agent-66c4486d68-46cqq - Container: manager | Image: mcr.microsoft.com/azurearck8s/aks/stable/extensionoperator:1.23.3 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: extension-operator-d95fd449b-ssrcx - Container: fluent-bit | Image: mcr.microsoft.com/azurearck8s/aks/stable/fluent-bit-collector:1.23.3 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: extension-operator-d95fd449b-ssrcx - Container: keda-admission-webhooks | Image: mcr.microsoft.com/oss/kedacore/keda-admission-webhooks:2.14.1 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: keda-admission-webhooks-787f866c7c-4b64k - Container: keda-admission-webhooks | Image: mcr.microsoft.com/oss/kedacore/keda-admission-webhooks:2.14.1 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: keda-admission-webhooks-787f866c7c-dw2sg - Container: keda-operator | Image: mcr.microsoft.com/oss/kedacore/keda:2.14.1 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: keda-operator-6b85944bfb-4zpbp - Container: keda-operator | Image: mcr.microsoft.com/oss/kedacore/keda:2.14.1 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: keda-operator-6b85944bfb-sx9sj - Container: keda-operator-metrics-apiserver | Image: mcr.microsoft.com/oss/kedacore/keda-metrics-apiserver:2.14.1 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: keda-operator-metrics-apiserver-8468875db7-86c5h - Container: keda-operator-metrics-apiserver | Image: mcr.microsoft.com/oss/kedacore/keda-metrics-apiserver:2.14.1 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: keda-operator-metrics-apiserver-8468875db7-ngp4h - Container: konnectivity-agent | Image: mcr.microsoft.com/oss/kubernetes/apiserver-network-proxy/agent:v0.30.3-hotfix.20240819 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: konnectivity-agent-9f65c5cd8-fzm5q - Container: konnectivity-agent | Image: mcr.microsoft.com/oss/kubernetes/apiserver-network-proxy/agent:v0.30.3-hotfix.20240819 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: konnectivity-agent-9f65c5cd8-t9qdj - Container: autoscaler | Image: mcr.microsoft.com/oss/v2/kubernetes/autoscaler/cluster-proportional-autoscaler:v1.8.11-5 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: konnectivity-agent-autoscaler-cdfc7c46-vct7p - Container: kube-proxy | Image: mcr.microsoft.com/oss/kubernetes/kube-proxy:v1.30.11 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: kube-proxy-26xkd - Container: kube-proxy | Image: mcr.microsoft.com/oss/kubernetes/kube-proxy:v1.30.11 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: kube-proxy-6mrql - Container: kube-proxy | Image: mcr.microsoft.com/oss/kubernetes/kube-proxy:v1.30.11 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: kube-proxy-9rbxf - Container: kube-proxy | Image: mcr.microsoft.com/oss/kubernetes/kube-proxy:v1.30.11 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: kube-proxy-njzgk - Container: kube-proxy | Image: mcr.microsoft.com/oss/kubernetes/kube-proxy:v1.30.11 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: kube-proxy-rvmxl - Container: kube-proxy | Image: mcr.microsoft.com/oss/kubernetes/kube-proxy:v1.30.11 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: kube-proxy-vp7xj - Container: metrics-server-vpa | Image: mcr.microsoft.com/oss/v2/kubernetes/autoscaler/addon-resizer:v1.8.23-2 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: metrics-server-5f9ccffcc4-jsrjl - Container: metrics-server | Image: mcr.microsoft.com/oss/v2/kubernetes/metrics-server:v0.6.3-5 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: metrics-server-5f9ccffcc4-jsrjl - Container: metrics-server-vpa | Image: mcr.microsoft.com/oss/v2/kubernetes/autoscaler/addon-resizer:v1.8.23-2 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: metrics-server-5f9ccffcc4-v88pw - Container: metrics-server | Image: mcr.microsoft.com/oss/v2/kubernetes/metrics-server:v0.6.3-5 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: metrics-server-5f9ccffcc4-v88pw - Container: microsoft-defender-pod-collector | Image: mcr.microsoft.com/azuredefender/stable/pod-collector:1.0.164 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: microsoft-defender-collector-ds-6xdfq - Container: microsoft-defender-low-level-collector | Image: mcr.microsoft.com/azuredefender/stable/low-level-collector:2.0.198 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: microsoft-defender-collector-ds-6xdfq - Container: microsoft-defender-pod-collector | Image: mcr.microsoft.com/azuredefender/stable/pod-collector:1.0.164 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: microsoft-defender-collector-ds-89l74 - Container: microsoft-defender-low-level-collector | Image: mcr.microsoft.com/azuredefender/stable/low-level-collector:2.0.198 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: microsoft-defender-collector-ds-89l74 - Container: microsoft-defender-pod-collector | Image: mcr.microsoft.com/azuredefender/stable/pod-collector:1.0.164 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: microsoft-defender-collector-ds-d7gwk - Container: microsoft-defender-low-level-collector | Image: mcr.microsoft.com/azuredefender/stable/low-level-collector:2.0.198 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: microsoft-defender-collector-ds-d7gwk - Container: microsoft-defender-pod-collector | Image: mcr.microsoft.com/azuredefender/stable/pod-collector:1.0.164 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: microsoft-defender-collector-ds-mdcs8 - Container: microsoft-defender-low-level-collector | Image: mcr.microsoft.com/azuredefender/stable/low-level-collector:2.0.198 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: microsoft-defender-collector-ds-mdcs8 - Container: microsoft-defender-pod-collector | Image: mcr.microsoft.com/azuredefender/stable/pod-collector:1.0.164 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: microsoft-defender-collector-ds-q6d6c - Container: microsoft-defender-low-level-collector | Image: mcr.microsoft.com/azuredefender/stable/low-level-collector:2.0.198 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: microsoft-defender-collector-ds-q6d6c - Container: microsoft-defender-pod-collector | Image: mcr.microsoft.com/azuredefender/stable/pod-collector:1.0.164 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: microsoft-defender-collector-ds-wb5dm - Container: microsoft-defender-low-level-collector | Image: mcr.microsoft.com/azuredefender/stable/low-level-collector:2.0.198 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: microsoft-defender-collector-ds-wb5dm - Container: microsoft-defender-pod-collector | Image: mcr.microsoft.com/azuredefender/stable/pod-collector:1.0.164 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: microsoft-defender-collector-misc-7df6776447-bcbph - Container: microsoft-defender-publisher | Image: mcr.microsoft.com/azuredefender/stable/security-publisher:1.0.204 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: microsoft-defender-publisher-ds-2ql5b - Container: microsoft-defender-publisher | Image: mcr.microsoft.com/azuredefender/stable/security-publisher:1.0.204 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: microsoft-defender-publisher-ds-2rsrw - Container: microsoft-defender-publisher | Image: mcr.microsoft.com/azuredefender/stable/security-publisher:1.0.204 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: microsoft-defender-publisher-ds-jj6dh - Container: microsoft-defender-publisher | Image: mcr.microsoft.com/azuredefender/stable/security-publisher:1.0.204 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: microsoft-defender-publisher-ds-l5crs - Container: microsoft-defender-publisher | Image: mcr.microsoft.com/azuredefender/stable/security-publisher:1.0.204 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: microsoft-defender-publisher-ds-lfk8h - Container: microsoft-defender-publisher | Image: mcr.microsoft.com/azuredefender/stable/security-publisher:1.0.204 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: microsoft-defender-publisher-ds-vz2c6 - Container: retina | Image: mcr.microsoft.com/containernetworking/retina-agent:v0.0.30 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: retina-agent-cgv48 - Container: retina | Image: mcr.microsoft.com/containernetworking/retina-agent:v0.0.30 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: retina-agent-gjxk8 - Container: retina | Image: mcr.microsoft.com/containernetworking/retina-agent:v0.0.30 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: retina-agent-js76w - Container: retina | Image: mcr.microsoft.com/containernetworking/retina-agent:v0.0.30 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: retina-agent-lfn7d - Container: retina | Image: mcr.microsoft.com/containernetworking/retina-agent:v0.0.30 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: retina-agent-qc9bs - Container: retina | Image: mcr.microsoft.com/containernetworking/retina-agent:v0.0.30 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: retina-agent-wlt7b - Container: admission-controller | Image: mcr.microsoft.com/oss/kubernetes/autoscaler/vpa-admission-controller:1.0.0 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: vpa-admission-controller-7d9f8d57bd-lrcch - Container: admission-controller | Image: mcr.microsoft.com/oss/kubernetes/autoscaler/vpa-admission-controller:1.0.0 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: vpa-admission-controller-7d9f8d57bd-tnqvx - Container: recommender | Image: mcr.microsoft.com/oss/kubernetes/autoscaler/vpa-recommender:1.0.0 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: vpa-recommender-74bfff7f75-sspdc - Container: updater | Image: mcr.microsoft.com/oss/kubernetes/autoscaler/vpa-updater:1.0.0 | Issue: Image from untrusted registry | Namespace: kube-system | Pod: vpa-updater-5d6d49f8b6-pxkz8 - Container: webserver-simple | Image: docker.io/kostiscodefresh/gitops-simple-app:v1.0 | Issue: Image from untrusted registry | Namespace: kubeview | Pod: simple-deployment-74fd649f8d-qxp2r - Container: webserver-simple | Image: docker.io/kostiscodefresh/gitops-simple-app:v1.0 | Issue: Image from untrusted registry | Namespace: linkerd | Pod: simple-deployment-74fd649f8d-mkmst - Container: webserver-simple | Image: docker.io/kostiscodefresh/gitops-simple-app:v1.0 | Issue: Image from untrusted registry | Namespace: nginx | Pod: simple-deployment-74fd649f8d-hlcdk - Container: istio-proxy | Image: mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless | Issue: Image from untrusted registry | Namespace: pets | Pod: order-service-6c5bfb6946-b58xq - Container: istio-proxy | Image: mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless | Issue: Image from untrusted registry | Namespace: pets | Pod: product-service-5dd87dfb8-ssfxc - Container: rabbitmq | Image: mcr.microsoft.com/mirror/docker/library/rabbitmq:3.10-management-alpine | Issue: Image from untrusted registry | Namespace: pets | Pod: rabbitmq-0 - Container: istio-proxy | Image: mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless | Issue: Image from untrusted registry | Namespace: pets | Pod: rabbitmq-0 - Container: istio-proxy | Image: mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless | Issue: Image from untrusted registry | Namespace: pets | Pod: store-front-658994fd95-pk9qn - Container: webserver-simple | Image: docker.io/kostiscodefresh/gitops-simple-app:v1.0 | Issue: Image from untrusted registry | Namespace: prometheus | Pod: simple-deployment-74fd649f8d-2x6w5 - Container: webserver-simple | Image: docker.io/kostiscodefresh/gitops-simple-app:v1.0 | Issue: Image from untrusted registry | Namespace: sealed-secrets | Pod: simple-deployment-74fd649f8d-stktp - Container: webserver-simple | Image: docker.io/kostiscodefresh/gitops-simple-app:v1.0 | Issue: Image from untrusted registry | Namespace: test | Pod: simple-deployment-74fd649f8d-lhlkx [SEC015 - Pods Using Default ServiceAccount] Section: Security Category: Pod Security Severity: Medium Recommendation: Assign a dedicated ServiceAccount to each workload with least-privilege permissions. URL: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/ ⚠️ Total Issues: 20 - Issue: Using default ServiceAccount | Namespace: argo-rollouts | Pod: simple-deployment-74fd649f8d-996vt | ServiceAccount: default - Issue: Using default ServiceAccount | Namespace: argo-workflows | Pod: simple-deployment-74fd649f8d-24t56 | ServiceAccount: default - Issue: Using default ServiceAccount | Namespace: cert-manager | Pod: simple-deployment-74fd649f8d-7cht8 | ServiceAccount: default - Issue: Using default ServiceAccount | Namespace: grafana | Pod: simple-deployment-74fd649f8d-l7wrd | ServiceAccount: default - Issue: Using default ServiceAccount | Namespace: kube-system | Pod: azure-ip-masq-agent-4522j | ServiceAccount: default - Issue: Using default ServiceAccount | Namespace: kube-system | Pod: azure-ip-masq-agent-4c7cr | ServiceAccount: default - Issue: Using default ServiceAccount | Namespace: kube-system | Pod: azure-ip-masq-agent-78rnw | ServiceAccount: default - Issue: Using default ServiceAccount | Namespace: kube-system | Pod: azure-ip-masq-agent-84ltn | ServiceAccount: default - Issue: Using default ServiceAccount | Namespace: kube-system | Pod: azure-ip-masq-agent-t4c2w | ServiceAccount: default - Issue: Using default ServiceAccount | Namespace: kube-system | Pod: azure-ip-masq-agent-vbdd8 | ServiceAccount: default - Issue: Using default ServiceAccount | Namespace: kubeview | Pod: simple-deployment-74fd649f8d-qxp2r | ServiceAccount: default - Issue: Using default ServiceAccount | Namespace: linkerd | Pod: simple-deployment-74fd649f8d-mkmst | ServiceAccount: default - Issue: Using default ServiceAccount | Namespace: nginx | Pod: simple-deployment-74fd649f8d-hlcdk | ServiceAccount: default - Issue: Using default ServiceAccount | Namespace: pets | Pod: order-service-6c5bfb6946-b58xq | ServiceAccount: default - Issue: Using default ServiceAccount | Namespace: pets | Pod: product-service-5dd87dfb8-ssfxc | ServiceAccount: default - Issue: Using default ServiceAccount | Namespace: pets | Pod: rabbitmq-0 | ServiceAccount: default - Issue: Using default ServiceAccount | Namespace: pets | Pod: store-front-658994fd95-pk9qn | ServiceAccount: default - Issue: Using default ServiceAccount | Namespace: prometheus | Pod: simple-deployment-74fd649f8d-2x6w5 | ServiceAccount: default - Issue: Using default ServiceAccount | Namespace: sealed-secrets | Pod: simple-deployment-74fd649f8d-stktp | ServiceAccount: default - Issue: Using default ServiceAccount | Namespace: test | Pod: simple-deployment-74fd649f8d-lhlkx | ServiceAccount: default [SEC016 - Non-Existent Secret References] Section: Security Category: Pod Security Severity: High Recommendation: Verify that all Secrets referenced by pods exist in the target namespace. URL: https://kubernetes.io/docs/concepts/configuration/secret/ ⚠️ Total Issues: 33 - Issue: Missing secret reference in volume | Namespace: aks-istio-system | Pod: istiod-asm-1-23-7744d5fbf4-9572m | Secret: cacerts | Volume: cacerts - Issue: Missing secret reference in volume | Namespace: aks-istio-system | Pod: istiod-asm-1-23-7744d5fbf4-9572m | Secret: istio-kubeconfig | Volume: istio-kubeconfig - Issue: Missing secret reference in volume | Namespace: aks-istio-system | Pod: istiod-asm-1-23-7744d5fbf4-9572m | Secret: istiod-tls | Volume: istio-csr-dns-cert - Issue: Missing secret reference in volume | Namespace: aks-istio-system | Pod: istiod-asm-1-23-7744d5fbf4-rqzvt | Secret: cacerts | Volume: cacerts - Issue: Missing secret reference in volume | Namespace: aks-istio-system | Pod: istiod-asm-1-23-7744d5fbf4-rqzvt | Secret: istio-kubeconfig | Volume: istio-kubeconfig - Issue: Missing secret reference in volume | Namespace: aks-istio-system | Pod: istiod-asm-1-23-7744d5fbf4-rqzvt | Secret: istiod-tls | Volume: istio-csr-dns-cert - Issue: Missing secret reference in volume | Namespace: argocd | Pod: argocd-application-controller-0 | Secret: argocd-repo-server-tls | Volume: argocd-repo-server-tls - Issue: Missing secret reference in volume | Namespace: argocd | Pod: argocd-applicationset-controller-6fdf84dbb6-msffz | Secret: argocd-repo-server-tls | Volume: argocd-repo-server-tls - Issue: Missing secret reference in volume | Namespace: argocd | Pod: argocd-dex-server-556c76889-h4kxj | Secret: argocd-dex-server-tls | Volume: argocd-dex-server-tls - Issue: Missing secret reference in volume | Namespace: argocd | Pod: argocd-notifications-controller-6ff6bf8dd6-nbktr | Secret: argocd-repo-server-tls | Volume: argocd-repo-server-tls - Issue: Missing secret reference in volume | Namespace: argocd | Pod: argocd-repo-server-8568fc89b5-sx6ks | Secret: argocd-repo-server-tls | Volume: argocd-repo-server-tls - Issue: Missing secret reference in volume | Namespace: argocd | Pod: argocd-repo-server-8568fc89b5-xrzzn | Secret: argocd-repo-server-tls | Volume: argocd-repo-server-tls - Issue: Missing secret reference in volume | Namespace: argocd | Pod: argocd-server-54f9645b87-k4rz8 | Secret: argocd-repo-server-tls | Volume: argocd-repo-server-tls - Issue: Missing secret reference in volume | Namespace: argocd | Pod: argocd-server-54f9645b87-k4rz8 | Secret: argocd-dex-server-tls | Volume: argocd-dex-server-tls - Issue: Missing secret reference in volume | Namespace: argocd | Pod: argocd-server-54f9645b87-wwzgz | Secret: argocd-repo-server-tls | Volume: argocd-repo-server-tls - Issue: Missing secret reference in volume | Namespace: argocd | Pod: argocd-server-54f9645b87-wwzgz | Secret: argocd-dex-server-tls | Volume: argocd-dex-server-tls - Issue: Missing secret reference in volume | Namespace: kiali-operator | Pod: kiali-5b88cfb6f8-cm8dz | Secret: kiali | Volume: kiali-secret - Issue: Missing secret reference in volume | Namespace: kube-system | Pod: ama-logs-4v8mz | Secret: ama-logs-adx-secret | Volume: ama-logs-adx-secret - Issue: Missing secret reference in volume | Namespace: kube-system | Pod: ama-logs-5vr2w | Secret: ama-logs-adx-secret | Volume: ama-logs-adx-secret - Issue: Missing secret reference in volume | Namespace: kube-system | Pod: ama-logs-fmd7b | Secret: ama-logs-adx-secret | Volume: ama-logs-adx-secret - Issue: Missing secret reference in volume | Namespace: kube-system | Pod: ama-logs-fpkw6 | Secret: ama-logs-adx-secret | Volume: ama-logs-adx-secret - Issue: Missing secret reference in volume | Namespace: kube-system | Pod: ama-logs-gqs28 | Secret: ama-logs-adx-secret | Volume: ama-logs-adx-secret - Issue: Missing secret reference in volume | Namespace: kube-system | Pod: ama-logs-ndxrw | Secret: ama-logs-adx-secret | Volume: ama-logs-adx-secret - Issue: Missing secret reference in volume | Namespace: kube-system | Pod: ama-logs-rs-64765bd4b9-ldxwl | Secret: ama-logs-adx-secret | Volume: ama-logs-adx-secret - Issue: Missing secret reference in volume | Namespace: kube-system | Pod: ama-metrics-7f878d975f-hlggb | Secret: ama-metrics-mtls-secret | Volume: ama-metrics-tls-secret-volume - Issue: Missing secret reference in volume | Namespace: kube-system | Pod: ama-metrics-7f878d975f-q2mlg | Secret: ama-metrics-mtls-secret | Volume: ama-metrics-tls-secret-volume - Issue: Missing secret reference in volume | Namespace: kube-system | Pod: ama-metrics-node-2ssrw | Secret: ama-metrics-mtls-secret | Volume: ama-metrics-tls-secret-volume - Issue: Missing secret reference in volume | Namespace: kube-system | Pod: ama-metrics-node-6kkz8 | Secret: ama-metrics-mtls-secret | Volume: ama-metrics-tls-secret-volume - Issue: Missing secret reference in volume | Namespace: kube-system | Pod: ama-metrics-node-9h44h | Secret: ama-metrics-mtls-secret | Volume: ama-metrics-tls-secret-volume - Issue: Missing secret reference in volume | Namespace: kube-system | Pod: ama-metrics-node-lhk42 | Secret: ama-metrics-mtls-secret | Volume: ama-metrics-tls-secret-volume - Issue: Missing secret reference in volume | Namespace: kube-system | Pod: ama-metrics-node-nm5bf | Secret: ama-metrics-mtls-secret | Volume: ama-metrics-tls-secret-volume - Issue: Missing secret reference in volume | Namespace: kube-system | Pod: ama-metrics-node-pqcz5 | Secret: ama-metrics-mtls-secret | Volume: ama-metrics-tls-secret-volume - Issue: Missing secret reference in volume | Namespace: kube-system | Pod: ama-metrics-operator-targets-66fb46c8d6-vskdg | Secret: ama-metrics-mtls-secret | Volume: ama-metrics-tls-secret-volume [WRK001 - DaemonSets Not Fully Running] Section: Workloads Category: Workloads Severity: Warning Recommendation: Investigate DaemonSets not fully running. Common causes include taints, node issues, or resource constraints. URL: https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/ ✅ No issues detected for DaemonSets Not Fully Running. [WRK002 - Deployment Missing Replicas] Section: Workloads Category: Workloads Severity: Warning Recommendation: Check Deployments that are not meeting their replica count. This may indicate rollout issues or failed pods. URL: https://kubernetes.io/docs/concepts/workloads/controllers/deployment/ ✅ No issues detected for Deployment Missing Replicas. [WRK003 - StatefulSet Incomplete Rollout] Section: Workloads Category: Workloads Severity: Warning Recommendation: Investigate StatefulSets with missing ready replicas. This may indicate issues with pod readiness or volume binding. URL: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/ ✅ No issues detected for StatefulSet Incomplete Rollout. [WRK004 - HPA Misconfiguration or Inactivity] Section: Workloads Category: Workloads Severity: Warning Recommendation: Review HorizontalPodAutoscalers with missing targets, no metrics, or disabled scaling. URL: https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/ ✅ No issues detected for HPA Misconfiguration or Inactivity. [WRK005 - Missing Resource Requests or Limits] Section: Workloads Category: Workloads Severity: Warning Recommendation: Specify resource requests and limits on all containers. URL: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/ ⚠️ Total Issues: 94 - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: aks-istio-ingress | Resource: Deployment/aks-istio-ingressgateway-external-asm-1-23 | Value: istio-proxy - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: aks-istio-system | Resource: Deployment/istiod-asm-1-23 | Value: discovery - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: app-routing-system | Resource: Deployment/nginx | Value: controller - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: argo-rollouts | Resource: Deployment/simple-deployment | Value: webserver-simple - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: argo-workflows | Resource: Deployment/simple-deployment | Value: webserver-simple - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: argocd | Resource: Deployment/argocd-applicationset-controller | Value: argocd-applicationset-controller - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: argocd | Resource: Deployment/argocd-dex-server | Value: dex - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: argocd | Resource: Deployment/argocd-dex-server | Value: copyutil - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: argocd | Resource: Deployment/argocd-notifications-controller | Value: argocd-notifications-controller - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: argocd | Resource: Deployment/argocd-redis-ha-haproxy | Value: haproxy - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: argocd | Resource: Deployment/argocd-redis-ha-haproxy | Value: secret-init - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: argocd | Resource: Deployment/argocd-redis-ha-haproxy | Value: config-init - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: argocd | Resource: Deployment/argocd-repo-server | Value: argocd-repo-server - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: argocd | Resource: Deployment/argocd-repo-server | Value: copyutil - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: argocd | Resource: Deployment/argocd-server | Value: argocd-server - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: cert-manager | Resource: Deployment/simple-deployment | Value: webserver-simple - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: gatekeeper-system | Resource: Deployment/gatekeeper-audit | Value: gatekeeper-audit-container - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: gatekeeper-system | Resource: Deployment/gatekeeper-controller | Value: gatekeeper-controller-container - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: grafana | Resource: Deployment/simple-deployment | Value: webserver-simple - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kiali-operator | Resource: Deployment/kiali | Value: kiali - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kiali-operator | Resource: Deployment/kiali-operator | Value: operator - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: Deployment/ama-logs-rs | Value: ama-logs - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: Deployment/ama-metrics | Value: prometheus-collector - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: Deployment/ama-metrics | Value: addon-token-adapter - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: Deployment/ama-metrics-ksm | Value: ama-metrics-ksm - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: Deployment/ama-metrics-operator-targets | Value: targetallocator - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: Deployment/ama-metrics-operator-targets | Value: config-reader - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: Deployment/azure-policy | Value: azure-policy - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: Deployment/azure-policy-webhook | Value: azure-policy-webhook - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: Deployment/azure-wi-webhook-controller-manager | Value: manager - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: Deployment/coredns | Value: coredns - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: Deployment/coredns-autoscaler | Value: autoscaler - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: Deployment/eraser-controller-manager | Value: manager - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: Deployment/extension-agent | Value: extension-agent - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: Deployment/extension-agent | Value: fluent-bit - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: Deployment/extension-operator | Value: manager - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: Deployment/extension-operator | Value: fluent-bit - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: Deployment/keda-admission-webhooks | Value: keda-admission-webhooks - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: Deployment/keda-operator | Value: keda-operator - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: Deployment/keda-operator-metrics-apiserver | Value: keda-operator-metrics-apiserver - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: Deployment/konnectivity-agent | Value: konnectivity-agent - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: Deployment/konnectivity-agent-autoscaler | Value: autoscaler - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: Deployment/metrics-server | Value: metrics-server-vpa - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: Deployment/metrics-server | Value: metrics-server - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: Deployment/microsoft-defender-collector-misc | Value: microsoft-defender-pod-collector - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: Deployment/vpa-admission-controller | Value: admission-controller - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: Deployment/vpa-recommender | Value: recommender - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: Deployment/vpa-updater | Value: updater - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kubeview | Resource: Deployment/simple-deployment | Value: webserver-simple - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: linkerd | Resource: Deployment/simple-deployment | Value: webserver-simple - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: nginx | Resource: Deployment/simple-deployment | Value: webserver-simple - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: pets | Resource: Deployment/order-service | Value: order-service - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: pets | Resource: Deployment/order-service | Value: wait-for-rabbitmq - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: pets | Resource: Deployment/product-service | Value: product-service - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: pets | Resource: Deployment/store-front | Value: store-front - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: prometheus | Resource: Deployment/simple-deployment | Value: webserver-simple - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: sealed-secrets | Resource: Deployment/simple-deployment | Value: webserver-simple - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: test | Resource: Deployment/simple-deployment | Value: webserver-simple - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: argocd | Resource: StatefulSet/argocd-application-controller | Value: argocd-application-controller - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: argocd | Resource: StatefulSet/argocd-redis-ha-server | Value: redis - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: argocd | Resource: StatefulSet/argocd-redis-ha-server | Value: sentinel - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: argocd | Resource: StatefulSet/argocd-redis-ha-server | Value: split-brain-fix - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: argocd | Resource: StatefulSet/argocd-redis-ha-server | Value: config-init - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: pets | Resource: StatefulSet/rabbitmq | Value: rabbitmq - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: DaemonSet/aks-secrets-store-csi-driver | Value: node-driver-registrar - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: DaemonSet/aks-secrets-store-csi-driver | Value: secrets-store - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: DaemonSet/aks-secrets-store-csi-driver | Value: liveness-probe - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: DaemonSet/aks-secrets-store-csi-driver-windows | Value: node-driver-registrar - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: DaemonSet/aks-secrets-store-csi-driver-windows | Value: secrets-store - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: DaemonSet/aks-secrets-store-csi-driver-windows | Value: liveness-probe - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: DaemonSet/aks-secrets-store-provider-azure | Value: provider-azure-installer - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: DaemonSet/aks-secrets-store-provider-azure-windows | Value: provider-azure-installer - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: DaemonSet/ama-logs | Value: ama-logs - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: DaemonSet/ama-logs | Value: ama-logs-prometheus - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: DaemonSet/ama-logs-windows | Value: ama-logs-windows - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: DaemonSet/ama-metrics-node | Value: prometheus-collector - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: DaemonSet/ama-metrics-node | Value: addon-token-adapter - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: DaemonSet/ama-metrics-win-node | Value: prometheus-collector - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: DaemonSet/ama-metrics-win-node | Value: addon-token-adapter-win - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: DaemonSet/azure-ip-masq-agent | Value: azure-ip-masq-agent - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: DaemonSet/azure-npm | Value: azure-npm - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: DaemonSet/azure-npm | Value: block-wireserver - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: DaemonSet/cloud-node-manager | Value: cloud-node-manager - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: DaemonSet/cloud-node-manager-windows | Value: cloud-node-manager - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: DaemonSet/kube-proxy | Value: kube-proxy - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: DaemonSet/kube-proxy | Value: kube-proxy-bootstrap - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: DaemonSet/microsoft-defender-collector-ds | Value: microsoft-defender-pod-collector - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: DaemonSet/microsoft-defender-collector-ds | Value: microsoft-defender-low-level-collector - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: DaemonSet/microsoft-defender-publisher-ds | Value: microsoft-defender-publisher - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: DaemonSet/microsoft-defender-publisher-ds | Value: old-file-cleaner - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: DaemonSet/retina-agent | Value: retina - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: DaemonSet/retina-agent | Value: retina-agent-init - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: DaemonSet/retina-agent-win | Value: retinawin - Message: CPU and Memory Requests and CPU and Memory Limits missing | Namespace: kube-system | Resource: DaemonSet/windows-kube-proxy-initializer | Value: pause [WRK006 - PDB Coverage and Effectiveness] Section: Workloads Category: PDBs Severity: High Recommendation: Workloads should have a valid PDB to prevent availability issues during disruptions. URL: https://kubernetes.io/docs/tasks/run-application/configure-pdb/ ⚠️ Total Issues: 25 - Issue: ⚠️ maxUnavailable = 100% | Kind: PDB | Name: nginx | Namespace: app-routing-system - Issue: ❌ No matching PDB | Kind: Deployment | Name: simple-deployment | Namespace: argo-rollouts - Issue: ❌ No matching PDB | Kind: Deployment | Name: simple-deployment | Namespace: argo-workflows - Issue: ❌ No matching PDB | Kind: Deployment | Name: argocd-applicationset-controller | Namespace: argocd - Issue: ❌ No matching PDB | Kind: Deployment | Name: argocd-dex-server | Namespace: argocd - Issue: ❌ No matching PDB | Kind: Deployment | Name: argocd-notifications-controller | Namespace: argocd - Issue: ❌ No matching PDB | Kind: Deployment | Name: argocd-redis-ha-haproxy | Namespace: argocd - Issue: ❌ No matching PDB | Kind: Deployment | Name: argocd-repo-server | Namespace: argocd - Issue: ❌ No matching PDB | Kind: Deployment | Name: argocd-server | Namespace: argocd - Issue: ❌ No matching PDB | Kind: Deployment | Name: simple-deployment | Namespace: cert-manager - Issue: ❌ No matching PDB | Kind: Deployment | Name: simple-deployment | Namespace: grafana - Issue: ❌ No matching PDB | Kind: Deployment | Name: kiali | Namespace: kiali-operator - Issue: ❌ No matching PDB | Kind: Deployment | Name: kiali-operator | Namespace: kiali-operator - Issue: ❌ No matching PDB | Kind: Deployment | Name: simple-deployment | Namespace: kubeview - Issue: ❌ No matching PDB | Kind: Deployment | Name: simple-deployment | Namespace: linkerd - Issue: ❌ No matching PDB | Kind: Deployment | Name: simple-deployment | Namespace: nginx - Issue: ❌ No matching PDB | Kind: Deployment | Name: order-service | Namespace: pets - Issue: ❌ No matching PDB | Kind: Deployment | Name: product-service | Namespace: pets - Issue: ❌ No matching PDB | Kind: Deployment | Name: store-front | Namespace: pets - Issue: ❌ No matching PDB | Kind: Deployment | Name: simple-deployment | Namespace: prometheus - Issue: ❌ No matching PDB | Kind: Deployment | Name: simple-deployment | Namespace: sealed-secrets - Issue: ❌ No matching PDB | Kind: Deployment | Name: simple-deployment | Namespace: test - Issue: ❌ No matching PDB | Kind: StatefulSet | Name: argocd-application-controller | Namespace: argocd - Issue: ❌ No matching PDB | Kind: StatefulSet | Name: argocd-redis-ha-server | Namespace: argocd - Issue: ❌ No matching PDB | Kind: StatefulSet | Name: rabbitmq | Namespace: pets [WRK007 - Missing Readiness and Liveness Probes] Section: Workloads Category: Probes Severity: Medium Recommendation: Add readiness and liveness probes to all containers to improve availability and fault detection. URL: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/ ⚠️ Total Issues: 60 - Container: istio-proxy | Kind: Deployment | Missing: readiness, liveness | Namespace: aks-istio-ingress | Workload: aks-istio-ingressgateway-external-asm-1-23 - Container: discovery | Kind: Deployment | Missing: liveness | Namespace: aks-istio-system | Workload: istiod-asm-1-23 - Container: webserver-simple | Kind: Deployment | Missing: readiness, liveness | Namespace: argo-rollouts | Workload: simple-deployment - Container: webserver-simple | Kind: Deployment | Missing: readiness, liveness | Namespace: argo-workflows | Workload: simple-deployment - Container: argocd-applicationset-controller | Kind: Deployment | Missing: readiness, liveness | Namespace: argocd | Workload: argocd-applicationset-controller - Container: dex | Kind: Deployment | Missing: readiness, liveness | Namespace: argocd | Workload: argocd-dex-server - Container: argocd-notifications-controller | Kind: Deployment | Missing: readiness | Namespace: argocd | Workload: argocd-notifications-controller - Container: webserver-simple | Kind: Deployment | Missing: readiness, liveness | Namespace: cert-manager | Workload: simple-deployment - Container: webserver-simple | Kind: Deployment | Missing: readiness, liveness | Namespace: grafana | Workload: simple-deployment - Container: ama-logs | Kind: Deployment | Missing: readiness | Namespace: kube-system | Workload: ama-logs-rs - Container: prometheus-collector | Kind: Deployment | Missing: readiness | Namespace: kube-system | Workload: ama-metrics - Container: addon-token-adapter | Kind: Deployment | Missing: readiness | Namespace: kube-system | Workload: ama-metrics - Container: targetallocator | Kind: Deployment | Missing: readiness | Namespace: kube-system | Workload: ama-metrics-operator-targets - Container: config-reader | Kind: Deployment | Missing: readiness | Namespace: kube-system | Workload: ama-metrics-operator-targets - Container: autoscaler | Kind: Deployment | Missing: readiness | Namespace: kube-system | Workload: coredns-autoscaler - Container: extension-agent | Kind: Deployment | Missing: readiness, liveness | Namespace: kube-system | Workload: extension-agent - Container: fluent-bit | Kind: Deployment | Missing: readiness, liveness | Namespace: kube-system | Workload: extension-agent - Container: manager | Kind: Deployment | Missing: readiness, liveness | Namespace: kube-system | Workload: extension-operator - Container: fluent-bit | Kind: Deployment | Missing: readiness, liveness | Namespace: kube-system | Workload: extension-operator - Container: autoscaler | Kind: Deployment | Missing: readiness | Namespace: kube-system | Workload: konnectivity-agent-autoscaler - Container: metrics-server-vpa | Kind: Deployment | Missing: readiness, liveness | Namespace: kube-system | Workload: metrics-server - Container: microsoft-defender-pod-collector | Kind: Deployment | Missing: readiness, liveness | Namespace: kube-system | Workload: microsoft-defender-collector-misc - Container: admission-controller | Kind: Deployment | Missing: readiness, liveness | Namespace: kube-system | Workload: vpa-admission-controller - Container: recommender | Kind: Deployment | Missing: readiness, liveness | Namespace: kube-system | Workload: vpa-recommender - Container: updater | Kind: Deployment | Missing: readiness, liveness | Namespace: kube-system | Workload: vpa-updater - Container: webserver-simple | Kind: Deployment | Missing: readiness, liveness | Namespace: kubeview | Workload: simple-deployment - Container: webserver-simple | Kind: Deployment | Missing: readiness, liveness | Namespace: linkerd | Workload: simple-deployment - Container: webserver-simple | Kind: Deployment | Missing: readiness, liveness | Namespace: nginx | Workload: simple-deployment - Container: webserver-simple | Kind: Deployment | Missing: readiness, liveness | Namespace: prometheus | Workload: simple-deployment - Container: webserver-simple | Kind: Deployment | Missing: readiness, liveness | Namespace: sealed-secrets | Workload: simple-deployment - Container: webserver-simple | Kind: Deployment | Missing: readiness, liveness | Namespace: test | Workload: simple-deployment - Container: argocd-application-controller | Kind: StatefulSet | Missing: liveness | Namespace: argocd | Workload: argocd-application-controller - Container: split-brain-fix | Kind: StatefulSet | Missing: readiness, liveness | Namespace: argocd | Workload: argocd-redis-ha-server - Container: rabbitmq | Kind: StatefulSet | Missing: readiness, liveness | Namespace: pets | Workload: rabbitmq - Container: node-driver-registrar | Kind: DaemonSet | Missing: readiness | Namespace: kube-system | Workload: aks-secrets-store-csi-driver - Container: secrets-store | Kind: DaemonSet | Missing: readiness | Namespace: kube-system | Workload: aks-secrets-store-csi-driver - Container: liveness-probe | Kind: DaemonSet | Missing: readiness, liveness | Namespace: kube-system | Workload: aks-secrets-store-csi-driver - Container: node-driver-registrar | Kind: DaemonSet | Missing: readiness | Namespace: kube-system | Workload: aks-secrets-store-csi-driver-windows - Container: secrets-store | Kind: DaemonSet | Missing: readiness | Namespace: kube-system | Workload: aks-secrets-store-csi-driver-windows - Container: liveness-probe | Kind: DaemonSet | Missing: readiness, liveness | Namespace: kube-system | Workload: aks-secrets-store-csi-driver-windows - Container: provider-azure-installer | Kind: DaemonSet | Missing: readiness | Namespace: kube-system | Workload: aks-secrets-store-provider-azure - Container: provider-azure-installer | Kind: DaemonSet | Missing: readiness | Namespace: kube-system | Workload: aks-secrets-store-provider-azure-windows - Container: ama-logs | Kind: DaemonSet | Missing: readiness | Namespace: kube-system | Workload: ama-logs - Container: ama-logs-prometheus | Kind: DaemonSet | Missing: readiness | Namespace: kube-system | Workload: ama-logs - Container: ama-logs-windows | Kind: DaemonSet | Missing: readiness | Namespace: kube-system | Workload: ama-logs-windows - Container: prometheus-collector | Kind: DaemonSet | Missing: readiness | Namespace: kube-system | Workload: ama-metrics-node - Container: addon-token-adapter | Kind: DaemonSet | Missing: readiness | Namespace: kube-system | Workload: ama-metrics-node - Container: prometheus-collector | Kind: DaemonSet | Missing: readiness | Namespace: kube-system | Workload: ama-metrics-win-node - Container: addon-token-adapter-win | Kind: DaemonSet | Missing: readiness | Namespace: kube-system | Workload: ama-metrics-win-node - Container: azure-ip-masq-agent | Kind: DaemonSet | Missing: readiness, liveness | Namespace: kube-system | Workload: azure-ip-masq-agent - Container: azure-npm | Kind: DaemonSet | Missing: readiness, liveness | Namespace: kube-system | Workload: azure-npm - Container: cloud-node-manager | Kind: DaemonSet | Missing: readiness, liveness | Namespace: kube-system | Workload: cloud-node-manager - Container: cloud-node-manager | Kind: DaemonSet | Missing: readiness, liveness | Namespace: kube-system | Workload: cloud-node-manager-windows - Container: kube-proxy | Kind: DaemonSet | Missing: readiness, liveness | Namespace: kube-system | Workload: kube-proxy - Container: microsoft-defender-pod-collector | Kind: DaemonSet | Missing: readiness, liveness | Namespace: kube-system | Workload: microsoft-defender-collector-ds - Container: microsoft-defender-low-level-collector | Kind: DaemonSet | Missing: readiness, liveness | Namespace: kube-system | Workload: microsoft-defender-collector-ds - Container: microsoft-defender-publisher | Kind: DaemonSet | Missing: readiness, liveness | Namespace: kube-system | Workload: microsoft-defender-publisher-ds - Container: retina | Kind: DaemonSet | Missing: liveness | Namespace: kube-system | Workload: retina-agent - Container: retinawin | Kind: DaemonSet | Missing: readiness, liveness | Namespace: kube-system | Workload: retina-agent-win - Container: pause | Kind: DaemonSet | Missing: readiness, liveness | Namespace: kube-system | Workload: windows-kube-proxy-initializer [WRK008 - Deployment Selector Without Matching Pods] Section: Workloads Category: Workloads Severity: Medium Recommendation: Ensure that pod labels match the Deployment selector. URL: https://kubernetes.io/docs/concepts/workloads/controllers/deployment/ ✅ No issues detected for Deployment Selector Without Matching Pods. [✅ AKS Best Practices Check] [AKSBP001 - Allowed Container Images Policy Enforcement] Category: Best Practices Severity: High Recommendation: Deploy and enforce the 'Only Allowed Images' policy with deny mode to restrict unapproved images. URL: https://learn.microsoft.com/azure/aks/policy-reference ⚠️ Total Issues: 1 - IsReadOnly: False | IsFixedSize: False | IsSynchronized: False | Keys: Issue Resource | Values: The 'Only Allowed Images' policy is either missing or not enforcing deny mode, increasing the risk of running untrusted images. Allowed Container Images Policy Enforcement | SyncRoot: System.Collections.Hashtable | Count: 2 [AKSBP002 - No Privileged Containers Policy Enforcement] Category: Best Practices Severity: High Recommendation: Deploy and enforce the 'No Privileged Containers' policy in deny mode to block privileged containers and enhance security. URL: https://learn.microsoft.com/azure/aks/policy-reference ⚠️ Total Issues: 1 - IsReadOnly: False | IsFixedSize: False | IsSynchronized: False | Keys: Issue Resource | Values: The 'No Privileged Containers' policy is either missing or not enforcing deny mode, allowing potentially insecure workloads. No Privileged Containers Policy Enforcement | SyncRoot: System.Collections.Hashtable | Count: 2 [AKSBP003 - Multiple Node Pools] Category: Best Practices Severity: Medium Recommendation: Multiple Node Pools is enabled. URL: https://learn.microsoft.com/azure/aks/use-multiple-node-pools ✅ No issues detected for Multiple Node Pools. [AKSBP004 - Azure Linux as Host OS] Category: Best Practices Severity: High Recommendation: Azure Linux as Host OS is enabled. URL: https://learn.microsoft.com/azure/aks/use-azure-linux ✅ No issues detected for Azure Linux as Host OS. [AKSBP005 - Ephemeral OS Disks Enabled] Category: Best Practices Severity: Medium Recommendation: Ephemeral OS Disks Enabled is enabled. URL: https://learn.microsoft.com/azure/aks/concepts-storage#ephemeral-os-disk ✅ No issues detected for Ephemeral OS Disks Enabled. [AKSBP006 - Non-Ephemeral Disks with Adequate Size] Category: Best Practices Severity: Medium Recommendation: Non-Ephemeral Disks with Adequate Size is enabled. URL: https://learn.microsoft.com/azure/aks/concepts-storage#managed-os-disks ✅ No issues detected for Non-Ephemeral Disks with Adequate Size. [AKSBP007 - System Node Pool Taint] Category: Best Practices Severity: High Recommendation: System Node Pool Taint is enabled. URL: https://learn.microsoft.com/azure/aks/use-system-pools?tabs=azure-cli#system-and-user-node-pools ✅ No issues detected for System Node Pool Taint. [AKSBP008 - Auto Upgrade Channel Configured] Category: Best Practices Severity: Medium Recommendation: Auto Upgrade Channel Configured is enabled. URL: https://learn.microsoft.com/azure/aks/auto-upgrade-cluster?tabs=azure-cli ✅ No issues detected for Auto Upgrade Channel Configured. [AKSBP009 - Node OS Upgrade Channel Configured] Category: Best Practices Severity: Medium Recommendation: Node OS Upgrade Channel Configured is enabled. URL: https://learn.microsoft.com/azure/aks/auto-upgrade-node-os-image?tabs=azure-cli ✅ No issues detected for Node OS Upgrade Channel Configured. [AKSBP010 - Customized MC_ Resource Group Name] Category: Best Practices Severity: Medium Recommendation: Customized MC_ Resource Group Name is enabled. URL: https://learn.microsoft.com/azure/aks/faq#can-i-provide-my-own-name-for-the-aks-node-resource-group- ✅ No issues detected for Customized MC_ Resource Group Name. [AKSBP011 - System Node Pool Minimum Size] Category: Best Practices Severity: High Recommendation: System Node Pool Minimum Size is enabled. URL: https://learn.microsoft.com/azure/aks/use-system-pools?tabs=azure-cli#recommendations ✅ No issues detected for System Node Pool Minimum Size. [AKSBP012 - Node Pool Version Matches Control Plane] Category: Best Practices Severity: Medium Recommendation: Node Pool Version Matches Control Plane is enabled. URL: https://learn.microsoft.com/azure/aks/upgrade-cluster#check-the-current-kubernetes-version ✅ No issues detected for Node Pool Version Matches Control Plane. [AKSDR001 - Agent Pools with Availability Zones] Category: Disaster Recovery Severity: High Recommendation: Agent Pools with Availability Zones is enabled. URL: https://learn.microsoft.com/azure/aks/availability-zones ✅ No issues detected for Agent Pools with Availability Zones. [AKSDR002 - Control Plane SLA] Category: Disaster Recovery Severity: Medium Recommendation: Control Plane SLA is enabled. URL: https://learn.microsoft.com/azure/aks/free-standard-pricing-tiers ✅ No issues detected for Control Plane SLA. [AKSSEC001 - Private Cluster] Category: Security Severity: High Recommendation: Configure the cluster as a private cluster to restrict API server access to your virtual network. URL: https://learn.microsoft.com/azure/aks/private-clusters ⚠️ Total Issues: 1 - IsReadOnly: False | IsFixedSize: False | IsSynchronized: False | Keys: Issue Resource | Values: Cluster API server is publicly accessible, increasing security risks. Private Cluster | SyncRoot: System.Collections.Hashtable | Count: 2 [AKSSEC002 - Azure Policy Add-on] Category: Security Severity: Medium Recommendation: Azure Policy Add-on is enabled. URL: https://learn.microsoft.com/azure/aks/policy-reference ✅ No issues detected for Azure Policy Add-on. [AKSSEC003 - Defender for Containers] Category: Security Severity: High Recommendation: Defender for Containers is enabled. URL: https://learn.microsoft.com/azure/defender-for-cloud/defender-for-containers-introduction ✅ No issues detected for Defender for Containers. [AKSSEC004 - OIDC Issuer Enabled] Category: Security Severity: Medium Recommendation: OIDC Issuer Enabled is enabled. URL: https://learn.microsoft.com/azure/aks/workload-identity-deploy-cluster ✅ No issues detected for OIDC Issuer Enabled. [AKSSEC005 - Azure Key Vault Integration] Category: Security Severity: High Recommendation: Azure Key Vault Integration is enabled. URL: https://learn.microsoft.com/azure/aks/csi-secrets-store-driver ✅ No issues detected for Azure Key Vault Integration. [AKSSEC006 - Image Cleaner Enabled] Category: Security Severity: Medium Recommendation: Image Cleaner Enabled is enabled. URL: https://learn.microsoft.com/azure/aks/image-cleaner ✅ No issues detected for Image Cleaner Enabled. [AKSSEC007 - Kubernetes Dashboard Disabled] Category: Security Severity: High Recommendation: Kubernetes Dashboard Disabled is enabled. URL: https://learn.microsoft.com/azure/aks/kubernetes-dashboard ✅ No issues detected for Kubernetes Dashboard Disabled. [AKSSEC08 - Pod Security Admission Enabled] Category: Security Severity: High Recommendation: Enable Pod Security Admission by setting 'podSecurityAdmissionConfiguration' during cluster creation or via supported upgrade path. URL: https://learn.microsoft.com/en-us/azure/aks/use-psa ⚠️ Total Issues: 1 - IsReadOnly: False | IsFixedSize: False | IsSynchronized: False | Keys: Issue Resource | Values: Pod Security Admission is not enabled on this cluster. This may reduce baseline pod security. Pod Security Admission Enabled | SyncRoot: System.Collections.Hashtable | Count: 2 [AKSMON001 - Azure Monitor] Category: Monitoring & Logging Severity: High Recommendation: Azure Monitor is enabled. URL: https://learn.microsoft.com/azure/azure-monitor/containers/container-insights-overview ✅ No issues detected for Azure Monitor. [AKSMON002 - Managed Prometheus Enabled] Category: Monitoring & Logging Severity: High Recommendation: Managed Prometheus Enabled is enabled. URL: https://learn.microsoft.com/azure/azure-monitor/essentials/prometheus-metrics-overview ✅ No issues detected for Managed Prometheus Enabled. [AKSNET001 - Authorized IP Ranges] Category: Networking Severity: High Recommendation: Authorized IP Ranges is enabled. URL: https://learn.microsoft.com/azure/aks/operator-best-practices-cluster-security#secure-access-to-the-api-server-and-cluster-nodes ✅ No issues detected for Authorized IP Ranges. [AKSNET002 - Network Policy Check] Category: Networking Severity: Medium Recommendation: Network Policy Check is enabled. URL: https://learn.microsoft.com/azure/aks/operator-best-practices-network#control-traffic-flow-with-network-policies ✅ No issues detected for Network Policy Check. [AKSNET003 - Web App Routing Enabled] Category: Networking Severity: Low Recommendation: Web App Routing Enabled is enabled. URL: https://learn.microsoft.com/azure/aks/web-app-routing ✅ No issues detected for Web App Routing Enabled. [AKSNET004 - Azure CNI Networking Recommended] Category: Networking Severity: Medium Recommendation: Azure CNI Networking Recommended is enabled. URL: https://learn.microsoft.com/azure/aks/concepts-network#networking-options ✅ No issues detected for Azure CNI Networking Recommended. [AKSRES001 - Cluster Autoscaler] Category: Resource Management Severity: Medium Recommendation: Cluster Autoscaler is enabled. URL: https://learn.microsoft.com/azure/aks/cluster-autoscaler ✅ No issues detected for Cluster Autoscaler. [AKSRES002 - AKS Built-in Cost Tooling Enabled] Category: Resource Management Severity: Medium Recommendation: Enable cost analysis in the AKS metrics profile to gain insights into resource spending and optimize cost management. URL: https://learn.microsoft.com/azure/aks/cost-analysis ⚠️ Total Issues: 1 - IsReadOnly: False | IsFixedSize: False | IsSynchronized: False | Keys: Issue Resource | Values: AKS built-in cost tooling (Open Costs) is not enabled, making cost allocation and optimization harder. AKS Built-in Cost Tooling Enabled | SyncRoot: System.Collections.Hashtable | Count: 2 [AKSRES003 - Vertical Pod Autoscaler (VPA) is enabled] Category: Resource Management Severity: Medium Recommendation: Vertical Pod Autoscaler (VPA) is enabled is enabled. URL: https://learn.microsoft.com/azure/aks/vertical-pod-autoscaler ✅ No issues detected for Vertical Pod Autoscaler (VPA) is enabled. [AKSIAM001 - RBAC Enabled] Category: Identity & Access Severity: High Recommendation: RBAC Enabled is enabled. URL: https://learn.microsoft.com/azure/aks/manage-azure-rbac?tabs=azure-cli ✅ No issues detected for RBAC Enabled. [AKSIAM002 - Managed Identity] Category: Identity & Access Severity: High Recommendation: Managed Identity is enabled. URL: https://learn.microsoft.com/azure/aks/use-managed-identity ✅ No issues detected for Managed Identity. [AKSIAM003 - Workload Identity Enabled] Category: Identity & Access Severity: Medium Recommendation: Workload Identity Enabled is enabled. URL: https://learn.microsoft.com/azure/aks/workload-identity-overview ✅ No issues detected for Workload Identity Enabled. [AKSIAM004 - Managed Identity Used] Category: Identity & Access Severity: High Recommendation: Managed Identity Used is enabled. URL: https://learn.microsoft.com/azure/aks/use-managed-identity ✅ No issues detected for Managed Identity Used. [AKSIAM005 - AAD RBAC Authorization Integrated] Category: Identity & Access Severity: High Recommendation: AAD RBAC Authorization Integrated is enabled. URL: https://learn.microsoft.com/azure/aks/enable-authentication-microsoft-entra-id ✅ No issues detected for AAD RBAC Authorization Integrated. [AKSIAM006 - AAD Managed Authentication Enabled] Category: Identity & Access Severity: High Recommendation: AAD Managed Authentication Enabled is enabled. URL: https://learn.microsoft.com/azure/aks/manage-azure-rbac?tabs=azure-cli ✅ No issues detected for AAD Managed Authentication Enabled. [AKSIAM007 - Local Accounts Disabled] Category: Identity & Access Severity: High Recommendation: Local Accounts Disabled is enabled. URL: https://learn.microsoft.com/azure/aks/manage-local-accounts-managed-azure-ad ✅ No issues detected for Local Accounts Disabled. Summary & Rating: Passed Failed Total Score (%) Rating ============================================================ ✅ 33 ❌ 5 38 86.84 B 🩺 Cluster Health Score: 37 / 100 |