docs/examples/json-report-sample.json
{
"metadata": { "aks": { "resourceGroup": null, "clusterName": null, "subscriptionId": null }, "score": 37.0, "clusterName": "aks-0402-dev-uks", "generatedAt": "2025-04-22T10:53:00Z", "kubernetesVersion": "v1.30.11" }, "checks": { "WRK008": { "Total": 0, "URL": "https://kubernetes.io/docs/concepts/workloads/controllers/deployment/", "Name": "Deployment Selector Without Matching Pods", "Description": "Detects Deployments whose spec.selector does not match any existing Pods. This results in 0 replicas running.", "Recommendation": "Ensure that pod labels match the Deployment selector.", "Weight": 2, "ID": "WRK008", "Message": "No issues detected for Deployment Selector Without Matching Pods.", "ResourceKind": "Deployment", "Section": "Workloads", "Category": "Workloads", "Severity": "Medium", "Items": [] }, "SEC008": { "Total": 20, "URL": "https://kubernetes.io/docs/concepts/configuration/secret/#using-secrets-as-environment-variables", "Name": "Secrets in Environment Variables", "Description": "Detects secrets injected into pods via environment variables using env.valueFrom.secretKeyRef. This makes secrets easier to leak through logs or /proc inspection.\n", "Recommendation": "Avoid exposing secrets in environment variables. Mount secrets as volumes instead.", "Weight": 4, "ID": "SEC008", "ResourceKind": "Pod", "Section": "Security", "Category": "Pod Security", "Severity": "High", "Items": [ { "Namespace": "argocd", "Pod": "pod/argocd-application-controller-0", "EnvVar": "env: REDIS_PASSWORD", "Issue": "Secret argocd-redis exposed via env var in container argocd-application-controller" }, { "Namespace": "argocd", "Pod": "pod/argocd-redis-ha-haproxy-fb657456c-kjbkq", "EnvVar": "env: AUTH", "Issue": "Secret argocd-redis exposed via env var in container haproxy" }, { "Namespace": "argocd", "Pod": "pod/argocd-redis-ha-haproxy-fb657456c-kjlpf", "EnvVar": "env: AUTH", "Issue": "Secret argocd-redis exposed via env var in container haproxy" }, { "Namespace": "argocd", "Pod": "pod/argocd-redis-ha-haproxy-fb657456c-tnjmb", "EnvVar": "env: AUTH", "Issue": "Secret argocd-redis exposed via env var in container haproxy" }, { "Namespace": "argocd", "Pod": "pod/argocd-redis-ha-server-0", "EnvVar": "env: AUTH", "Issue": "Secret argocd-redis exposed via env var in container redis" }, { "Namespace": "argocd", "Pod": "pod/argocd-redis-ha-server-0", "EnvVar": "env: AUTH", "Issue": "Secret argocd-redis exposed via env var in container sentinel" }, { "Namespace": "argocd", "Pod": "pod/argocd-redis-ha-server-0", "EnvVar": "env: AUTH", "Issue": "Secret argocd-redis exposed via env var in container split-brain-fix" }, { "Namespace": "argocd", "Pod": "pod/argocd-redis-ha-server-0", "EnvVar": "env: AUTH", "Issue": "Secret argocd-redis exposed via env var in container config-init" }, { "Namespace": "argocd", "Pod": "pod/argocd-redis-ha-server-1", "EnvVar": "env: AUTH", "Issue": "Secret argocd-redis exposed via env var in container redis" }, { "Namespace": "argocd", "Pod": "pod/argocd-redis-ha-server-1", "EnvVar": "env: AUTH", "Issue": "Secret argocd-redis exposed via env var in container sentinel" }, { "Namespace": "argocd", "Pod": "pod/argocd-redis-ha-server-1", "EnvVar": "env: AUTH", "Issue": "Secret argocd-redis exposed via env var in container split-brain-fix" }, { "Namespace": "argocd", "Pod": "pod/argocd-redis-ha-server-1", "EnvVar": "env: AUTH", "Issue": "Secret argocd-redis exposed via env var in container config-init" }, { "Namespace": "argocd", "Pod": "pod/argocd-redis-ha-server-2", "EnvVar": "env: AUTH", "Issue": "Secret argocd-redis exposed via env var in container redis" }, { "Namespace": "argocd", "Pod": "pod/argocd-redis-ha-server-2", "EnvVar": "env: AUTH", "Issue": "Secret argocd-redis exposed via env var in container sentinel" }, { "Namespace": "argocd", "Pod": "pod/argocd-redis-ha-server-2", "EnvVar": "env: AUTH", "Issue": "Secret argocd-redis exposed via env var in container split-brain-fix" }, { "Namespace": "argocd", "Pod": "pod/argocd-redis-ha-server-2", "EnvVar": "env: AUTH", "Issue": "Secret argocd-redis exposed via env var in container config-init" }, { "Namespace": "argocd", "Pod": "pod/argocd-repo-server-8568fc89b5-sx6ks", "EnvVar": "env: REDIS_PASSWORD", "Issue": "Secret argocd-redis exposed via env var in container argocd-repo-server" }, { "Namespace": "argocd", "Pod": "pod/argocd-repo-server-8568fc89b5-xrzzn", "EnvVar": "env: REDIS_PASSWORD", "Issue": "Secret argocd-redis exposed via env var in container argocd-repo-server" }, { "Namespace": "argocd", "Pod": "pod/argocd-server-54f9645b87-k4rz8", "EnvVar": "env: REDIS_PASSWORD", "Issue": "Secret argocd-redis exposed via env var in container argocd-server" }, { "Namespace": "argocd", "Pod": "pod/argocd-server-54f9645b87-wwzgz", "EnvVar": "env: REDIS_PASSWORD", "Issue": "Secret argocd-redis exposed via env var in container argocd-server" } ] }, "AKSBP010": { "ID": "AKSBP010", "Severity": "Medium", "URL": "https://learn.microsoft.com/azure/aks/faq#can-i-provide-my-own-name-for-the-aks-node-resource-group-", "FailMessage": "", "Name": "Customized MC_ Resource Group Name", "Recommendation": "Customized MC_ Resource Group Name is enabled.", "Status": "✅ PASS", "Category": "Best Practices", "Total": 0, "Items": null }, "EVENT001": { "Total": 0, "URL": "https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.28/#event-v1-core", "Name": "Grouped Warning Events", "Description": "Groups recent Warning events by Reason and Message.", "Recommendation": "Check for recurring issues. Investigate sources using `kubectl describe` or logs.", "Weight": 2, "ID": "EVENT001", "Message": "No issues detected for Grouped Warning Events.", "ResourceKind": "events", "Section": "Kubernetes Events", "Category": "Events", "Severity": "medium", "Items": [] }, "WRK002": { "Total": 0, "URL": "https://kubernetes.io/docs/concepts/workloads/controllers/deployment/", "Name": "Deployment Missing Replicas", "Description": "Detects Deployments where the number of available replicas is less than desired.", "Recommendation": "Check Deployments that are not meeting their replica count. This may indicate rollout issues or failed pods.", "Weight": 3, "ID": "WRK002", "Message": "No issues detected for Deployment Missing Replicas.", "ResourceKind": "Deployment", "Section": "Workloads", "Category": "Workloads", "Severity": "Warning", "Items": [] }, "SEC003": { "Total": 380, "URL": "https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline", "Name": "Pods Running as Root", "Description": "Detects pods running with UID 0 or no explicit runAsUser setting (defaults to root).", "Recommendation": "Avoid running pods as root by explicitly setting runAsUser to a non-zero UID in pod or container securityContext.", "Weight": 5, "ID": "SEC003", "ResourceKind": "Pod", "Section": "Security", "Category": "Pod Security", "Severity": "High", "Items": [ { "Namespace": "aks-istio-ingress", "Resource": "pod/aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-hdfn4", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "aks-istio-ingress", "Resource": "pod/aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-hdfn4", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "aks-istio-ingress", "Resource": "pod/aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-zqwtb", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "aks-istio-ingress", "Resource": "pod/aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-zqwtb", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "aks-istio-system", "Resource": "pod/istiod-asm-1-23-7744d5fbf4-9572m", "Value": "Not Set (Defaults to root)", "Message": "Container discovery runs as root or has no runAsUser set" }, { "Namespace": "aks-istio-system", "Resource": "pod/istiod-asm-1-23-7744d5fbf4-9572m", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "aks-istio-system", "Resource": "pod/istiod-asm-1-23-7744d5fbf4-9572m", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "aks-istio-system", "Resource": "pod/istiod-asm-1-23-7744d5fbf4-rqzvt", "Value": "Not Set (Defaults to root)", "Message": "Container discovery runs as root or has no runAsUser set" }, { "Namespace": "aks-istio-system", "Resource": "pod/istiod-asm-1-23-7744d5fbf4-rqzvt", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "aks-istio-system", "Resource": "pod/istiod-asm-1-23-7744d5fbf4-rqzvt", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "app-routing-system", "Resource": "pod/nginx-69fcb489fd-4wgk9", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "app-routing-system", "Resource": "pod/nginx-69fcb489fd-4wgk9", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "app-routing-system", "Resource": "pod/nginx-69fcb489fd-64v6k", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "app-routing-system", "Resource": "pod/nginx-69fcb489fd-64v6k", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "argo-rollouts", "Resource": "pod/simple-deployment-74fd649f8d-996vt", "Value": "Not Set (Defaults to root)", "Message": "Container webserver-simple runs as root or has no runAsUser set" }, { "Namespace": "argo-rollouts", "Resource": "pod/simple-deployment-74fd649f8d-996vt", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "argo-rollouts", "Resource": "pod/simple-deployment-74fd649f8d-996vt", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "argo-workflows", "Resource": "pod/simple-deployment-74fd649f8d-24t56", "Value": "Not Set (Defaults to root)", "Message": "Container webserver-simple runs as root or has no runAsUser set" }, { "Namespace": "argo-workflows", "Resource": "pod/simple-deployment-74fd649f8d-24t56", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "argo-workflows", "Resource": "pod/simple-deployment-74fd649f8d-24t56", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "argocd", "Resource": "pod/argocd-application-controller-0", "Value": "Not Set (Defaults to root)", "Message": "Container argocd-application-controller runs as root or has no runAsUser set" }, { "Namespace": "argocd", "Resource": "pod/argocd-application-controller-0", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "argocd", "Resource": "pod/argocd-application-controller-0", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "argocd", "Resource": "pod/argocd-applicationset-controller-6fdf84dbb6-msffz", "Value": "Not Set (Defaults to root)", "Message": "Container argocd-applicationset-controller runs as root or has no runAsUser set" }, { "Namespace": "argocd", "Resource": "pod/argocd-applicationset-controller-6fdf84dbb6-msffz", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "argocd", "Resource": "pod/argocd-applicationset-controller-6fdf84dbb6-msffz", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "argocd", "Resource": "pod/argocd-dex-server-556c76889-h4kxj", "Value": "Not Set (Defaults to root)", "Message": "Container dex runs as root or has no runAsUser set" }, { "Namespace": "argocd", "Resource": "pod/argocd-dex-server-556c76889-h4kxj", "Value": "Not Set (Defaults to root)", "Message": "Container copyutil runs as root or has no runAsUser set" }, { "Namespace": "argocd", "Resource": "pod/argocd-dex-server-556c76889-h4kxj", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "argocd", "Resource": "pod/argocd-notifications-controller-6ff6bf8dd6-nbktr", "Value": "Not Set (Defaults to root)", "Message": "Container argocd-notifications-controller runs as root or has no runAsUser set" }, { "Namespace": "argocd", "Resource": "pod/argocd-notifications-controller-6ff6bf8dd6-nbktr", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "argocd", "Resource": "pod/argocd-notifications-controller-6ff6bf8dd6-nbktr", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "argocd", "Resource": "pod/argocd-repo-server-8568fc89b5-sx6ks", "Value": "Not Set (Defaults to root)", "Message": "Container argocd-repo-server runs as root or has no runAsUser set" }, { "Namespace": "argocd", "Resource": "pod/argocd-repo-server-8568fc89b5-sx6ks", "Value": "Not Set (Defaults to root)", "Message": "Container copyutil runs as root or has no runAsUser set" }, { "Namespace": "argocd", "Resource": "pod/argocd-repo-server-8568fc89b5-sx6ks", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "argocd", "Resource": "pod/argocd-repo-server-8568fc89b5-xrzzn", "Value": "Not Set (Defaults to root)", "Message": "Container argocd-repo-server runs as root or has no runAsUser set" }, { "Namespace": "argocd", "Resource": "pod/argocd-repo-server-8568fc89b5-xrzzn", "Value": "Not Set (Defaults to root)", "Message": "Container copyutil runs as root or has no runAsUser set" }, { "Namespace": "argocd", "Resource": "pod/argocd-repo-server-8568fc89b5-xrzzn", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "argocd", "Resource": "pod/argocd-server-54f9645b87-k4rz8", "Value": "Not Set (Defaults to root)", "Message": "Container argocd-server runs as root or has no runAsUser set" }, { "Namespace": "argocd", "Resource": "pod/argocd-server-54f9645b87-k4rz8", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "argocd", "Resource": "pod/argocd-server-54f9645b87-k4rz8", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "argocd", "Resource": "pod/argocd-server-54f9645b87-wwzgz", "Value": "Not Set (Defaults to root)", "Message": "Container argocd-server runs as root or has no runAsUser set" }, { "Namespace": "argocd", "Resource": "pod/argocd-server-54f9645b87-wwzgz", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "argocd", "Resource": "pod/argocd-server-54f9645b87-wwzgz", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "cert-manager", "Resource": "pod/simple-deployment-74fd649f8d-7cht8", "Value": "Not Set (Defaults to root)", "Message": "Container webserver-simple runs as root or has no runAsUser set" }, { "Namespace": "cert-manager", "Resource": "pod/simple-deployment-74fd649f8d-7cht8", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "cert-manager", "Resource": "pod/simple-deployment-74fd649f8d-7cht8", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "gatekeeper-system", "Resource": "pod/gatekeeper-audit-77858c8f69-7k782", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "gatekeeper-system", "Resource": "pod/gatekeeper-audit-77858c8f69-7k782", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "gatekeeper-system", "Resource": "pod/gatekeeper-controller-6f97954b4b-7tbnr", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "gatekeeper-system", "Resource": "pod/gatekeeper-controller-6f97954b4b-7tbnr", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "gatekeeper-system", "Resource": "pod/gatekeeper-controller-6f97954b4b-gwrgg", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "gatekeeper-system", "Resource": "pod/gatekeeper-controller-6f97954b4b-gwrgg", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "grafana", "Resource": "pod/simple-deployment-74fd649f8d-l7wrd", "Value": "Not Set (Defaults to root)", "Message": "Container webserver-simple runs as root or has no runAsUser set" }, { "Namespace": "grafana", "Resource": "pod/simple-deployment-74fd649f8d-l7wrd", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "grafana", "Resource": "pod/simple-deployment-74fd649f8d-l7wrd", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kiali-operator", "Resource": "pod/kiali-5b88cfb6f8-cm8dz", "Value": "Not Set (Defaults to root)", "Message": "Container kiali runs as root or has no runAsUser set" }, { "Namespace": "kiali-operator", "Resource": "pod/kiali-5b88cfb6f8-cm8dz", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kiali-operator", "Resource": "pod/kiali-5b88cfb6f8-cm8dz", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kiali-operator", "Resource": "pod/kiali-operator-696bd54db-mr8md", "Value": "Not Set (Defaults to root)", "Message": "Container operator runs as root or has no runAsUser set" }, { "Namespace": "kiali-operator", "Resource": "pod/kiali-operator-696bd54db-mr8md", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kiali-operator", "Resource": "pod/kiali-operator-696bd54db-mr8md", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-2l2wl", "Value": "Not Set (Defaults to root)", "Message": "Container node-driver-registrar runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-2l2wl", "Value": "Not Set (Defaults to root)", "Message": "Container secrets-store runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-2l2wl", "Value": "Not Set (Defaults to root)", "Message": "Container liveness-probe runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-2l2wl", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-2l2wl", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-6w2vp", "Value": "Not Set (Defaults to root)", "Message": "Container node-driver-registrar runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-6w2vp", "Value": "Not Set (Defaults to root)", "Message": "Container secrets-store runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-6w2vp", "Value": "Not Set (Defaults to root)", "Message": "Container liveness-probe runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-6w2vp", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-6w2vp", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-7879c", "Value": "Not Set (Defaults to root)", "Message": "Container node-driver-registrar runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-7879c", "Value": "Not Set (Defaults to root)", "Message": "Container secrets-store runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-7879c", "Value": "Not Set (Defaults to root)", "Message": "Container liveness-probe runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-7879c", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-7879c", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-m8m29", "Value": "Not Set (Defaults to root)", "Message": "Container node-driver-registrar runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-m8m29", "Value": "Not Set (Defaults to root)", "Message": "Container secrets-store runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-m8m29", "Value": "Not Set (Defaults to root)", "Message": "Container liveness-probe runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-m8m29", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-m8m29", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-vnmcd", "Value": "Not Set (Defaults to root)", "Message": "Container node-driver-registrar runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-vnmcd", "Value": "Not Set (Defaults to root)", "Message": "Container secrets-store runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-vnmcd", "Value": "Not Set (Defaults to root)", "Message": "Container liveness-probe runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-vnmcd", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-vnmcd", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-zrfbz", "Value": "Not Set (Defaults to root)", "Message": "Container node-driver-registrar runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-zrfbz", "Value": "Not Set (Defaults to root)", "Message": "Container secrets-store runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-zrfbz", "Value": "Not Set (Defaults to root)", "Message": "Container liveness-probe runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-zrfbz", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-zrfbz", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-provider-azure-68nhw", "Value": "Not Set (Defaults to root)", "Message": "Container provider-azure-installer runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-provider-azure-68nhw", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-provider-azure-68nhw", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-provider-azure-7bqmn", "Value": "Not Set (Defaults to root)", "Message": "Container provider-azure-installer runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-provider-azure-7bqmn", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-provider-azure-7bqmn", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-provider-azure-7r458", "Value": "Not Set (Defaults to root)", "Message": "Container provider-azure-installer runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-provider-azure-7r458", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-provider-azure-7r458", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-provider-azure-k9tdc", "Value": "Not Set (Defaults to root)", "Message": "Container provider-azure-installer runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-provider-azure-k9tdc", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-provider-azure-k9tdc", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-provider-azure-n952g", "Value": "Not Set (Defaults to root)", "Message": "Container provider-azure-installer runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-provider-azure-n952g", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-provider-azure-n952g", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-provider-azure-njpqh", "Value": "Not Set (Defaults to root)", "Message": "Container provider-azure-installer runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-provider-azure-njpqh", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-provider-azure-njpqh", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-4v8mz", "Value": "Not Set (Defaults to root)", "Message": "Container ama-logs runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-4v8mz", "Value": "Not Set (Defaults to root)", "Message": "Container ama-logs-prometheus runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-4v8mz", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-4v8mz", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-5vr2w", "Value": "Not Set (Defaults to root)", "Message": "Container ama-logs runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-5vr2w", "Value": "Not Set (Defaults to root)", "Message": "Container ama-logs-prometheus runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-5vr2w", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-5vr2w", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-fmd7b", "Value": "Not Set (Defaults to root)", "Message": "Container ama-logs runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-fmd7b", "Value": "Not Set (Defaults to root)", "Message": "Container ama-logs-prometheus runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-fmd7b", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-fmd7b", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-fpkw6", "Value": "Not Set (Defaults to root)", "Message": "Container ama-logs runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-fpkw6", "Value": "Not Set (Defaults to root)", "Message": "Container ama-logs-prometheus runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-fpkw6", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-fpkw6", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-gqs28", "Value": "Not Set (Defaults to root)", "Message": "Container ama-logs runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-gqs28", "Value": "Not Set (Defaults to root)", "Message": "Container ama-logs-prometheus runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-gqs28", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-gqs28", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-ndxrw", "Value": "Not Set (Defaults to root)", "Message": "Container ama-logs runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-ndxrw", "Value": "Not Set (Defaults to root)", "Message": "Container ama-logs-prometheus runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-ndxrw", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-ndxrw", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-rs-64765bd4b9-ldxwl", "Value": "Not Set (Defaults to root)", "Message": "Container ama-logs runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-rs-64765bd4b9-ldxwl", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-rs-64765bd4b9-ldxwl", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-7f878d975f-hlggb", "Value": "Not Set (Defaults to root)", "Message": "Container prometheus-collector runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-7f878d975f-hlggb", "Value": "Not Set (Defaults to root)", "Message": "Container addon-token-adapter runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-7f878d975f-hlggb", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-7f878d975f-hlggb", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-7f878d975f-q2mlg", "Value": "Not Set (Defaults to root)", "Message": "Container prometheus-collector runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-7f878d975f-q2mlg", "Value": "Not Set (Defaults to root)", "Message": "Container addon-token-adapter runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-7f878d975f-q2mlg", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-7f878d975f-q2mlg", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-node-2ssrw", "Value": "Not Set (Defaults to root)", "Message": "Container prometheus-collector runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-node-2ssrw", "Value": "Not Set (Defaults to root)", "Message": "Container addon-token-adapter runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-node-2ssrw", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-node-2ssrw", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-node-6kkz8", "Value": "Not Set (Defaults to root)", "Message": "Container prometheus-collector runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-node-6kkz8", "Value": "Not Set (Defaults to root)", "Message": "Container addon-token-adapter runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-node-6kkz8", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-node-6kkz8", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-node-9h44h", "Value": "Not Set (Defaults to root)", "Message": "Container prometheus-collector runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-node-9h44h", "Value": "Not Set (Defaults to root)", "Message": "Container addon-token-adapter runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-node-9h44h", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-node-9h44h", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-node-lhk42", "Value": "Not Set (Defaults to root)", "Message": "Container prometheus-collector runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-node-lhk42", "Value": "Not Set (Defaults to root)", "Message": "Container addon-token-adapter runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-node-lhk42", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-node-lhk42", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-node-nm5bf", "Value": "Not Set (Defaults to root)", "Message": "Container prometheus-collector runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-node-nm5bf", "Value": "Not Set (Defaults to root)", "Message": "Container addon-token-adapter runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-node-nm5bf", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-node-nm5bf", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-node-pqcz5", "Value": "Not Set (Defaults to root)", "Message": "Container prometheus-collector runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-node-pqcz5", "Value": "Not Set (Defaults to root)", "Message": "Container addon-token-adapter runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-node-pqcz5", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-node-pqcz5", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-operator-targets-66fb46c8d6-vskdg", "Value": "Not Set (Defaults to root)", "Message": "Container targetallocator runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-operator-targets-66fb46c8d6-vskdg", "Value": "Not Set (Defaults to root)", "Message": "Container config-reader runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-operator-targets-66fb46c8d6-vskdg", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/ama-metrics-operator-targets-66fb46c8d6-vskdg", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-ip-masq-agent-4522j", "Value": "Not Set (Defaults to root)", "Message": "Container azure-ip-masq-agent runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-ip-masq-agent-4522j", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-ip-masq-agent-4522j", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-ip-masq-agent-4c7cr", "Value": "Not Set (Defaults to root)", "Message": "Container azure-ip-masq-agent runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-ip-masq-agent-4c7cr", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-ip-masq-agent-4c7cr", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-ip-masq-agent-78rnw", "Value": "Not Set (Defaults to root)", "Message": "Container azure-ip-masq-agent runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-ip-masq-agent-78rnw", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-ip-masq-agent-78rnw", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-ip-masq-agent-84ltn", "Value": "Not Set (Defaults to root)", "Message": "Container azure-ip-masq-agent runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-ip-masq-agent-84ltn", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-ip-masq-agent-84ltn", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-ip-masq-agent-t4c2w", "Value": "Not Set (Defaults to root)", "Message": "Container azure-ip-masq-agent runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-ip-masq-agent-t4c2w", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-ip-masq-agent-t4c2w", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-ip-masq-agent-vbdd8", "Value": "Not Set (Defaults to root)", "Message": "Container azure-ip-masq-agent runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-ip-masq-agent-vbdd8", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-ip-masq-agent-vbdd8", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-npm-jsbbh", "Value": "Not Set (Defaults to root)", "Message": "Container azure-npm runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-npm-jsbbh", "Value": "Not Set (Defaults to root)", "Message": "Container block-wireserver runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-npm-jsbbh", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-npm-lp6sf", "Value": "Not Set (Defaults to root)", "Message": "Container azure-npm runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-npm-lp6sf", "Value": "Not Set (Defaults to root)", "Message": "Container block-wireserver runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-npm-lp6sf", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-npm-nv6xx", "Value": "Not Set (Defaults to root)", "Message": "Container azure-npm runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-npm-nv6xx", "Value": "Not Set (Defaults to root)", "Message": "Container block-wireserver runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-npm-nv6xx", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-npm-p6fpw", "Value": "Not Set (Defaults to root)", "Message": "Container azure-npm runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-npm-p6fpw", "Value": "Not Set (Defaults to root)", "Message": "Container block-wireserver runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-npm-p6fpw", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-npm-vsrfp", "Value": "Not Set (Defaults to root)", "Message": "Container azure-npm runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-npm-vsrfp", "Value": "Not Set (Defaults to root)", "Message": "Container block-wireserver runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-npm-vsrfp", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-npm-z8mcz", "Value": "Not Set (Defaults to root)", "Message": "Container azure-npm runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-npm-z8mcz", "Value": "Not Set (Defaults to root)", "Message": "Container block-wireserver runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-npm-z8mcz", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-policy-698f7c86b4-nnff2", "Value": "Not Set (Defaults to root)", "Message": "Container azure-policy runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-policy-698f7c86b4-nnff2", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-policy-698f7c86b4-nnff2", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-policy-webhook-764fdf5cd5-6vrc5", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-policy-webhook-764fdf5cd5-6vrc5", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-wi-webhook-controller-manager-7f95f666d4-7r44b", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-wi-webhook-controller-manager-7f95f666d4-7r44b", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-wi-webhook-controller-manager-7f95f666d4-xfh2p", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/azure-wi-webhook-controller-manager-7f95f666d4-xfh2p", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/cloud-node-manager-57rk2", "Value": "Not Set (Defaults to root)", "Message": "Container cloud-node-manager runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/cloud-node-manager-57rk2", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/cloud-node-manager-57rk2", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/cloud-node-manager-gl5xl", "Value": "Not Set (Defaults to root)", "Message": "Container cloud-node-manager runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/cloud-node-manager-gl5xl", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/cloud-node-manager-gl5xl", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/cloud-node-manager-l7v5j", "Value": "Not Set (Defaults to root)", "Message": "Container cloud-node-manager runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/cloud-node-manager-l7v5j", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/cloud-node-manager-l7v5j", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/cloud-node-manager-lr49d", "Value": "Not Set (Defaults to root)", "Message": "Container cloud-node-manager runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/cloud-node-manager-lr49d", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/cloud-node-manager-lr49d", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/cloud-node-manager-n5qdr", "Value": "Not Set (Defaults to root)", "Message": "Container cloud-node-manager runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/cloud-node-manager-n5qdr", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/cloud-node-manager-n5qdr", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/cloud-node-manager-xwrrd", "Value": "Not Set (Defaults to root)", "Message": "Container cloud-node-manager runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/cloud-node-manager-xwrrd", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/cloud-node-manager-xwrrd", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/coredns-658d6d767d-757xp", "Value": "Not Set (Defaults to root)", "Message": "Container coredns runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/coredns-658d6d767d-757xp", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/coredns-658d6d767d-757xp", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/coredns-658d6d767d-pt6l6", "Value": "Not Set (Defaults to root)", "Message": "Container coredns runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/coredns-658d6d767d-pt6l6", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/coredns-658d6d767d-pt6l6", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/coredns-autoscaler-5955d6bbdb-mz9kn", "Value": "Not Set (Defaults to root)", "Message": "Container autoscaler runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/coredns-autoscaler-5955d6bbdb-mz9kn", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/coredns-autoscaler-5955d6bbdb-mz9kn", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/eraser-controller-manager-864f9476c8-lhdfc", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/eraser-controller-manager-864f9476c8-lhdfc", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/extension-agent-66c4486d68-46cqq", "Value": "Not Set (Defaults to root)", "Message": "Container extension-agent runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/extension-agent-66c4486d68-46cqq", "Value": "Not Set (Defaults to root)", "Message": "Container fluent-bit runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/extension-agent-66c4486d68-46cqq", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/extension-agent-66c4486d68-46cqq", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/extension-operator-d95fd449b-ssrcx", "Value": "Not Set (Defaults to root)", "Message": "Container manager runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/extension-operator-d95fd449b-ssrcx", "Value": "Not Set (Defaults to root)", "Message": "Container fluent-bit runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/extension-operator-d95fd449b-ssrcx", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/extension-operator-d95fd449b-ssrcx", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/konnectivity-agent-9f65c5cd8-fzm5q", "Value": "Not Set (Defaults to root)", "Message": "Container konnectivity-agent runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/konnectivity-agent-9f65c5cd8-fzm5q", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/konnectivity-agent-9f65c5cd8-fzm5q", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/konnectivity-agent-9f65c5cd8-t9qdj", "Value": "Not Set (Defaults to root)", "Message": "Container konnectivity-agent runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/konnectivity-agent-9f65c5cd8-t9qdj", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/konnectivity-agent-9f65c5cd8-t9qdj", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/konnectivity-agent-autoscaler-cdfc7c46-vct7p", "Value": "Not Set (Defaults to root)", "Message": "Container autoscaler runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/konnectivity-agent-autoscaler-cdfc7c46-vct7p", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/konnectivity-agent-autoscaler-cdfc7c46-vct7p", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-26xkd", "Value": "Not Set (Defaults to root)", "Message": "Container kube-proxy runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-26xkd", "Value": "Not Set (Defaults to root)", "Message": "Container kube-proxy-bootstrap runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-26xkd", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-6mrql", "Value": "Not Set (Defaults to root)", "Message": "Container kube-proxy runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-6mrql", "Value": "Not Set (Defaults to root)", "Message": "Container kube-proxy-bootstrap runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-6mrql", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-9rbxf", "Value": "Not Set (Defaults to root)", "Message": "Container kube-proxy runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-9rbxf", "Value": "Not Set (Defaults to root)", "Message": "Container kube-proxy-bootstrap runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-9rbxf", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-njzgk", "Value": "Not Set (Defaults to root)", "Message": "Container kube-proxy runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-njzgk", "Value": "Not Set (Defaults to root)", "Message": "Container kube-proxy-bootstrap runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-njzgk", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-rvmxl", "Value": "Not Set (Defaults to root)", "Message": "Container kube-proxy runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-rvmxl", "Value": "Not Set (Defaults to root)", "Message": "Container kube-proxy-bootstrap runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-rvmxl", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-vp7xj", "Value": "Not Set (Defaults to root)", "Message": "Container kube-proxy runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-vp7xj", "Value": "Not Set (Defaults to root)", "Message": "Container kube-proxy-bootstrap runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-vp7xj", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/metrics-server-5f9ccffcc4-jsrjl", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/metrics-server-5f9ccffcc4-jsrjl", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/metrics-server-5f9ccffcc4-v88pw", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/metrics-server-5f9ccffcc4-v88pw", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-collector-ds-6xdfq", "Value": "Not Set (Defaults to root)", "Message": "Container microsoft-defender-pod-collector runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-collector-ds-6xdfq", "Value": "Not Set (Defaults to root)", "Message": "Container microsoft-defender-low-level-collector runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-collector-ds-6xdfq", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-collector-ds-6xdfq", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-collector-ds-89l74", "Value": "Not Set (Defaults to root)", "Message": "Container microsoft-defender-pod-collector runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-collector-ds-89l74", "Value": "Not Set (Defaults to root)", "Message": "Container microsoft-defender-low-level-collector runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-collector-ds-89l74", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-collector-ds-89l74", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-collector-ds-d7gwk", "Value": "Not Set (Defaults to root)", "Message": "Container microsoft-defender-pod-collector runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-collector-ds-d7gwk", "Value": "Not Set (Defaults to root)", "Message": "Container microsoft-defender-low-level-collector runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-collector-ds-d7gwk", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-collector-ds-d7gwk", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-collector-ds-mdcs8", "Value": "Not Set (Defaults to root)", "Message": "Container microsoft-defender-pod-collector runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-collector-ds-mdcs8", "Value": "Not Set (Defaults to root)", "Message": "Container microsoft-defender-low-level-collector runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-collector-ds-mdcs8", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-collector-ds-mdcs8", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-collector-ds-q6d6c", "Value": "Not Set (Defaults to root)", "Message": "Container microsoft-defender-pod-collector runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-collector-ds-q6d6c", "Value": "Not Set (Defaults to root)", "Message": "Container microsoft-defender-low-level-collector runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-collector-ds-q6d6c", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-collector-ds-q6d6c", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-collector-ds-wb5dm", "Value": "Not Set (Defaults to root)", "Message": "Container microsoft-defender-pod-collector runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-collector-ds-wb5dm", "Value": "Not Set (Defaults to root)", "Message": "Container microsoft-defender-low-level-collector runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-collector-ds-wb5dm", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-collector-ds-wb5dm", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-collector-misc-7df6776447-bcbph", "Value": "Not Set (Defaults to root)", "Message": "Container microsoft-defender-pod-collector runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-collector-misc-7df6776447-bcbph", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-collector-misc-7df6776447-bcbph", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-publisher-ds-2ql5b", "Value": "Not Set (Defaults to root)", "Message": "Container microsoft-defender-publisher runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-publisher-ds-2ql5b", "Value": "Not Set (Defaults to root)", "Message": "Container old-file-cleaner runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-publisher-ds-2ql5b", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-publisher-ds-2rsrw", "Value": "Not Set (Defaults to root)", "Message": "Container microsoft-defender-publisher runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-publisher-ds-2rsrw", "Value": "Not Set (Defaults to root)", "Message": "Container old-file-cleaner runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-publisher-ds-2rsrw", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-publisher-ds-jj6dh", "Value": "Not Set (Defaults to root)", "Message": "Container microsoft-defender-publisher runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-publisher-ds-jj6dh", "Value": "Not Set (Defaults to root)", "Message": "Container old-file-cleaner runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-publisher-ds-jj6dh", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-publisher-ds-l5crs", "Value": "Not Set (Defaults to root)", "Message": "Container microsoft-defender-publisher runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-publisher-ds-l5crs", "Value": "Not Set (Defaults to root)", "Message": "Container old-file-cleaner runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-publisher-ds-l5crs", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-publisher-ds-lfk8h", "Value": "Not Set (Defaults to root)", "Message": "Container microsoft-defender-publisher runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-publisher-ds-lfk8h", "Value": "Not Set (Defaults to root)", "Message": "Container old-file-cleaner runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-publisher-ds-lfk8h", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-publisher-ds-vz2c6", "Value": "Not Set (Defaults to root)", "Message": "Container microsoft-defender-publisher runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-publisher-ds-vz2c6", "Value": "Not Set (Defaults to root)", "Message": "Container old-file-cleaner runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/microsoft-defender-publisher-ds-vz2c6", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/retina-agent-cgv48", "Value": "Not Set (Defaults to root)", "Message": "Container retina runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/retina-agent-cgv48", "Value": "Not Set (Defaults to root)", "Message": "Container retina-agent-init runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/retina-agent-cgv48", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/retina-agent-gjxk8", "Value": "Not Set (Defaults to root)", "Message": "Container retina runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/retina-agent-gjxk8", "Value": "Not Set (Defaults to root)", "Message": "Container retina-agent-init runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/retina-agent-gjxk8", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/retina-agent-js76w", "Value": "Not Set (Defaults to root)", "Message": "Container retina runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/retina-agent-js76w", "Value": "Not Set (Defaults to root)", "Message": "Container retina-agent-init runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/retina-agent-js76w", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/retina-agent-lfn7d", "Value": "Not Set (Defaults to root)", "Message": "Container retina runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/retina-agent-lfn7d", "Value": "Not Set (Defaults to root)", "Message": "Container retina-agent-init runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/retina-agent-lfn7d", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/retina-agent-qc9bs", "Value": "Not Set (Defaults to root)", "Message": "Container retina runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/retina-agent-qc9bs", "Value": "Not Set (Defaults to root)", "Message": "Container retina-agent-init runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/retina-agent-qc9bs", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/retina-agent-wlt7b", "Value": "Not Set (Defaults to root)", "Message": "Container retina runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/retina-agent-wlt7b", "Value": "Not Set (Defaults to root)", "Message": "Container retina-agent-init runs as root or has no runAsUser set" }, { "Namespace": "kube-system", "Resource": "pod/retina-agent-wlt7b", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kubeview", "Resource": "pod/simple-deployment-74fd649f8d-qxp2r", "Value": "Not Set (Defaults to root)", "Message": "Container webserver-simple runs as root or has no runAsUser set" }, { "Namespace": "kubeview", "Resource": "pod/simple-deployment-74fd649f8d-qxp2r", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "kubeview", "Resource": "pod/simple-deployment-74fd649f8d-qxp2r", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "linkerd", "Resource": "pod/simple-deployment-74fd649f8d-mkmst", "Value": "Not Set (Defaults to root)", "Message": "Container webserver-simple runs as root or has no runAsUser set" }, { "Namespace": "linkerd", "Resource": "pod/simple-deployment-74fd649f8d-mkmst", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "linkerd", "Resource": "pod/simple-deployment-74fd649f8d-mkmst", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "nginx", "Resource": "pod/simple-deployment-74fd649f8d-hlcdk", "Value": "Not Set (Defaults to root)", "Message": "Container webserver-simple runs as root or has no runAsUser set" }, { "Namespace": "nginx", "Resource": "pod/simple-deployment-74fd649f8d-hlcdk", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "nginx", "Resource": "pod/simple-deployment-74fd649f8d-hlcdk", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "pets", "Resource": "pod/order-service-6c5bfb6946-b58xq", "Value": "Not Set (Defaults to root)", "Message": "Container order-service runs as root or has no runAsUser set" }, { "Namespace": "pets", "Resource": "pod/order-service-6c5bfb6946-b58xq", "Value": "Not Set (Defaults to root)", "Message": "Container wait-for-rabbitmq runs as root or has no runAsUser set" }, { "Namespace": "pets", "Resource": "pod/order-service-6c5bfb6946-b58xq", "Value": "Not Set (Defaults to root)", "Message": "Container istio-init runs as root or has no runAsUser set" }, { "Namespace": "pets", "Resource": "pod/order-service-6c5bfb6946-b58xq", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "pets", "Resource": "pod/product-service-5dd87dfb8-ssfxc", "Value": "Not Set (Defaults to root)", "Message": "Container product-service runs as root or has no runAsUser set" }, { "Namespace": "pets", "Resource": "pod/product-service-5dd87dfb8-ssfxc", "Value": "Not Set (Defaults to root)", "Message": "Container istio-init runs as root or has no runAsUser set" }, { "Namespace": "pets", "Resource": "pod/product-service-5dd87dfb8-ssfxc", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "pets", "Resource": "pod/rabbitmq-0", "Value": "Not Set (Defaults to root)", "Message": "Container rabbitmq runs as root or has no runAsUser set" }, { "Namespace": "pets", "Resource": "pod/rabbitmq-0", "Value": "Not Set (Defaults to root)", "Message": "Container istio-init runs as root or has no runAsUser set" }, { "Namespace": "pets", "Resource": "pod/rabbitmq-0", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "pets", "Resource": "pod/store-front-658994fd95-pk9qn", "Value": "Not Set (Defaults to root)", "Message": "Container store-front runs as root or has no runAsUser set" }, { "Namespace": "pets", "Resource": "pod/store-front-658994fd95-pk9qn", "Value": "Not Set (Defaults to root)", "Message": "Container istio-init runs as root or has no runAsUser set" }, { "Namespace": "pets", "Resource": "pod/store-front-658994fd95-pk9qn", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "prometheus", "Resource": "pod/simple-deployment-74fd649f8d-2x6w5", "Value": "Not Set (Defaults to root)", "Message": "Container webserver-simple runs as root or has no runAsUser set" }, { "Namespace": "prometheus", "Resource": "pod/simple-deployment-74fd649f8d-2x6w5", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "prometheus", "Resource": "pod/simple-deployment-74fd649f8d-2x6w5", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "sealed-secrets", "Resource": "pod/simple-deployment-74fd649f8d-stktp", "Value": "Not Set (Defaults to root)", "Message": "Container webserver-simple runs as root or has no runAsUser set" }, { "Namespace": "sealed-secrets", "Resource": "pod/simple-deployment-74fd649f8d-stktp", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "sealed-secrets", "Resource": "pod/simple-deployment-74fd649f8d-stktp", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "test", "Resource": "pod/simple-deployment-74fd649f8d-lhlkx", "Value": "Not Set (Defaults to root)", "Message": "Container webserver-simple runs as root or has no runAsUser set" }, { "Namespace": "test", "Resource": "pod/simple-deployment-74fd649f8d-lhlkx", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" }, { "Namespace": "test", "Resource": "pod/simple-deployment-74fd649f8d-lhlkx", "Value": "Not Set (Defaults to root)", "Message": "Container runs as root or has no runAsUser set" } ] }, "AKSRES001": { "ID": "AKSRES001", "Severity": "Medium", "URL": "https://learn.microsoft.com/azure/aks/cluster-autoscaler", "FailMessage": "", "Name": "Cluster Autoscaler", "Recommendation": "Cluster Autoscaler is enabled.", "Status": "✅ PASS", "Category": "Resource Management", "Total": 0, "Items": null }, "SEC010": { "Total": 309, "URL": "https://kubernetes.io/docs/concepts/storage/volumes/#hostpath", "Name": "HostPath Volume Usage", "Description": "Flags pods that use hostPath volumes, which mount parts of the host filesystem. This bypasses isolation and can be dangerous if misused.\n", "Recommendation": "Avoid using hostPath unless absolutely necessary. Use persistent volumes instead.", "Weight": 3, "ID": "SEC010", "ResourceKind": "Pod", "Section": "Security", "Category": "Pod Security", "Severity": "High", "Items": [ { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-2l2wl", "Volume": "mountpoint-dir", "Path": "/var/lib/kubelet/pods", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-2l2wl", "Volume": "registration-dir", "Path": "/var/lib/kubelet/plugins_registry/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-2l2wl", "Volume": "plugin-dir", "Path": "/var/lib/kubelet/plugins/csi-secrets-store/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-2l2wl", "Volume": "providers-dir", "Path": "/var/run/secrets-store-csi-providers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-2l2wl", "Volume": "providers-dir-0", "Path": "/etc/kubernetes/secrets-store-csi-providers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-6w2vp", "Volume": "mountpoint-dir", "Path": "/var/lib/kubelet/pods", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-6w2vp", "Volume": "registration-dir", "Path": "/var/lib/kubelet/plugins_registry/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-6w2vp", "Volume": "plugin-dir", "Path": "/var/lib/kubelet/plugins/csi-secrets-store/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-6w2vp", "Volume": "providers-dir", "Path": "/var/run/secrets-store-csi-providers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-6w2vp", "Volume": "providers-dir-0", "Path": "/etc/kubernetes/secrets-store-csi-providers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-7879c", "Volume": "mountpoint-dir", "Path": "/var/lib/kubelet/pods", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-7879c", "Volume": "registration-dir", "Path": "/var/lib/kubelet/plugins_registry/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-7879c", "Volume": "plugin-dir", "Path": "/var/lib/kubelet/plugins/csi-secrets-store/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-7879c", "Volume": "providers-dir", "Path": "/var/run/secrets-store-csi-providers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-7879c", "Volume": "providers-dir-0", "Path": "/etc/kubernetes/secrets-store-csi-providers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-m8m29", "Volume": "mountpoint-dir", "Path": "/var/lib/kubelet/pods", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-m8m29", "Volume": "registration-dir", "Path": "/var/lib/kubelet/plugins_registry/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-m8m29", "Volume": "plugin-dir", "Path": "/var/lib/kubelet/plugins/csi-secrets-store/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-m8m29", "Volume": "providers-dir", "Path": "/var/run/secrets-store-csi-providers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-m8m29", "Volume": "providers-dir-0", "Path": "/etc/kubernetes/secrets-store-csi-providers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-vnmcd", "Volume": "mountpoint-dir", "Path": "/var/lib/kubelet/pods", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-vnmcd", "Volume": "registration-dir", "Path": "/var/lib/kubelet/plugins_registry/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-vnmcd", "Volume": "plugin-dir", "Path": "/var/lib/kubelet/plugins/csi-secrets-store/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-vnmcd", "Volume": "providers-dir", "Path": "/var/run/secrets-store-csi-providers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-vnmcd", "Volume": "providers-dir-0", "Path": "/etc/kubernetes/secrets-store-csi-providers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-zrfbz", "Volume": "mountpoint-dir", "Path": "/var/lib/kubelet/pods", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-zrfbz", "Volume": "registration-dir", "Path": "/var/lib/kubelet/plugins_registry/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-zrfbz", "Volume": "plugin-dir", "Path": "/var/lib/kubelet/plugins/csi-secrets-store/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-zrfbz", "Volume": "providers-dir", "Path": "/var/run/secrets-store-csi-providers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-zrfbz", "Volume": "providers-dir-0", "Path": "/etc/kubernetes/secrets-store-csi-providers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-provider-azure-68nhw", "Volume": "provider-vol", "Path": "/var/run/secrets-store-csi-providers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-provider-azure-7bqmn", "Volume": "provider-vol", "Path": "/var/run/secrets-store-csi-providers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-provider-azure-7r458", "Volume": "provider-vol", "Path": "/var/run/secrets-store-csi-providers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-provider-azure-k9tdc", "Volume": "provider-vol", "Path": "/var/run/secrets-store-csi-providers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-provider-azure-n952g", "Volume": "provider-vol", "Path": "/var/run/secrets-store-csi-providers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-provider-azure-njpqh", "Volume": "provider-vol", "Path": "/var/run/secrets-store-csi-providers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-4v8mz", "Volume": "host-root", "Path": "/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-4v8mz", "Volume": "container-hostname", "Path": "/etc/hostname", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-4v8mz", "Volume": "host-log", "Path": "/var/log", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-4v8mz", "Volume": "mdsd-sock", "Path": "/var/run/mdsd-ci", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-4v8mz", "Volume": "containerlog-path", "Path": "/var/lib/docker/containers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-4v8mz", "Volume": "containerlog-path-2", "Path": "/mnt/docker", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-4v8mz", "Volume": "containerlog-path-3", "Path": "/mnt/containers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-4v8mz", "Volume": "azure-json-path", "Path": "/etc/kubernetes", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-5vr2w", "Volume": "host-root", "Path": "/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-5vr2w", "Volume": "container-hostname", "Path": "/etc/hostname", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-5vr2w", "Volume": "host-log", "Path": "/var/log", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-5vr2w", "Volume": "mdsd-sock", "Path": "/var/run/mdsd-ci", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-5vr2w", "Volume": "containerlog-path", "Path": "/var/lib/docker/containers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-5vr2w", "Volume": "containerlog-path-2", "Path": "/mnt/docker", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-5vr2w", "Volume": "containerlog-path-3", "Path": "/mnt/containers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-5vr2w", "Volume": "azure-json-path", "Path": "/etc/kubernetes", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-fmd7b", "Volume": "host-root", "Path": "/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-fmd7b", "Volume": "container-hostname", "Path": "/etc/hostname", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-fmd7b", "Volume": "host-log", "Path": "/var/log", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-fmd7b", "Volume": "mdsd-sock", "Path": "/var/run/mdsd-ci", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-fmd7b", "Volume": "containerlog-path", "Path": "/var/lib/docker/containers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-fmd7b", "Volume": "containerlog-path-2", "Path": "/mnt/docker", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-fmd7b", "Volume": "containerlog-path-3", "Path": "/mnt/containers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-fmd7b", "Volume": "azure-json-path", "Path": "/etc/kubernetes", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-fpkw6", "Volume": "host-root", "Path": "/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-fpkw6", "Volume": "container-hostname", "Path": "/etc/hostname", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-fpkw6", "Volume": "host-log", "Path": "/var/log", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-fpkw6", "Volume": "mdsd-sock", "Path": "/var/run/mdsd-ci", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-fpkw6", "Volume": "containerlog-path", "Path": "/var/lib/docker/containers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-fpkw6", "Volume": "containerlog-path-2", "Path": "/mnt/docker", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-fpkw6", "Volume": "containerlog-path-3", "Path": "/mnt/containers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-fpkw6", "Volume": "azure-json-path", "Path": "/etc/kubernetes", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-gqs28", "Volume": "host-root", "Path": "/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-gqs28", "Volume": "container-hostname", "Path": "/etc/hostname", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-gqs28", "Volume": "host-log", "Path": "/var/log", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-gqs28", "Volume": "mdsd-sock", "Path": "/var/run/mdsd-ci", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-gqs28", "Volume": "containerlog-path", "Path": "/var/lib/docker/containers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-gqs28", "Volume": "containerlog-path-2", "Path": "/mnt/docker", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-gqs28", "Volume": "containerlog-path-3", "Path": "/mnt/containers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-gqs28", "Volume": "azure-json-path", "Path": "/etc/kubernetes", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-ndxrw", "Volume": "host-root", "Path": "/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-ndxrw", "Volume": "container-hostname", "Path": "/etc/hostname", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-ndxrw", "Volume": "host-log", "Path": "/var/log", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-ndxrw", "Volume": "mdsd-sock", "Path": "/var/run/mdsd-ci", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-ndxrw", "Volume": "containerlog-path", "Path": "/var/lib/docker/containers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-ndxrw", "Volume": "containerlog-path-2", "Path": "/mnt/docker", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-ndxrw", "Volume": "containerlog-path-3", "Path": "/mnt/containers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-ndxrw", "Volume": "azure-json-path", "Path": "/etc/kubernetes", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-rs-64765bd4b9-ldxwl", "Volume": "container-hostname", "Path": "/etc/hostname", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-rs-64765bd4b9-ldxwl", "Volume": "host-log", "Path": "/var/log", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-rs-64765bd4b9-ldxwl", "Volume": "azure-json-path", "Path": "/etc/kubernetes", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-metrics-7f878d975f-hlggb", "Volume": "host-log-containers", "Path": "/var/log/containers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-metrics-7f878d975f-hlggb", "Volume": "host-log-pods", "Path": "/var/log/pods", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-metrics-7f878d975f-hlggb", "Volume": "anchors-mariner", "Path": "/etc/pki/ca-trust/anchors/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-metrics-7f878d975f-hlggb", "Volume": "anchors-ubuntu", "Path": "/usr/local/share/ca-certificates/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-metrics-7f878d975f-q2mlg", "Volume": "host-log-containers", "Path": "/var/log/containers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-metrics-7f878d975f-q2mlg", "Volume": "host-log-pods", "Path": "/var/log/pods", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-metrics-7f878d975f-q2mlg", "Volume": "anchors-mariner", "Path": "/etc/pki/ca-trust/anchors/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-metrics-7f878d975f-q2mlg", "Volume": "anchors-ubuntu", "Path": "/usr/local/share/ca-certificates/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-2ssrw", "Volume": "host-log-containers", "Path": "/var/log/containers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-2ssrw", "Volume": "host-log-pods", "Path": "/var/log/pods", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-2ssrw", "Volume": "anchors-mariner", "Path": "/etc/pki/ca-trust/anchors/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-2ssrw", "Volume": "anchors-ubuntu", "Path": "/usr/local/share/ca-certificates/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-6kkz8", "Volume": "host-log-containers", "Path": "/var/log/containers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-6kkz8", "Volume": "host-log-pods", "Path": "/var/log/pods", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-6kkz8", "Volume": "anchors-mariner", "Path": "/etc/pki/ca-trust/anchors/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-6kkz8", "Volume": "anchors-ubuntu", "Path": "/usr/local/share/ca-certificates/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-9h44h", "Volume": "host-log-containers", "Path": "/var/log/containers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-9h44h", "Volume": "host-log-pods", "Path": "/var/log/pods", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-9h44h", "Volume": "anchors-mariner", "Path": "/etc/pki/ca-trust/anchors/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-9h44h", "Volume": "anchors-ubuntu", "Path": "/usr/local/share/ca-certificates/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-lhk42", "Volume": "host-log-containers", "Path": "/var/log/containers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-lhk42", "Volume": "host-log-pods", "Path": "/var/log/pods", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-lhk42", "Volume": "anchors-mariner", "Path": "/etc/pki/ca-trust/anchors/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-lhk42", "Volume": "anchors-ubuntu", "Path": "/usr/local/share/ca-certificates/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-nm5bf", "Volume": "host-log-containers", "Path": "/var/log/containers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-nm5bf", "Volume": "host-log-pods", "Path": "/var/log/pods", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-nm5bf", "Volume": "anchors-mariner", "Path": "/etc/pki/ca-trust/anchors/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-nm5bf", "Volume": "anchors-ubuntu", "Path": "/usr/local/share/ca-certificates/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-pqcz5", "Volume": "host-log-containers", "Path": "/var/log/containers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-pqcz5", "Volume": "host-log-pods", "Path": "/var/log/pods", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-pqcz5", "Volume": "anchors-mariner", "Path": "/etc/pki/ca-trust/anchors/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-pqcz5", "Volume": "anchors-ubuntu", "Path": "/usr/local/share/ca-certificates/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "azure-ip-masq-agent-4522j", "Volume": "iptableslock", "Path": "/run/xtables.lock", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "azure-ip-masq-agent-4c7cr", "Volume": "iptableslock", "Path": "/run/xtables.lock", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "azure-ip-masq-agent-78rnw", "Volume": "iptableslock", "Path": "/run/xtables.lock", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "azure-ip-masq-agent-84ltn", "Volume": "iptableslock", "Path": "/run/xtables.lock", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "azure-ip-masq-agent-t4c2w", "Volume": "iptableslock", "Path": "/run/xtables.lock", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "azure-ip-masq-agent-vbdd8", "Volume": "iptableslock", "Path": "/run/xtables.lock", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "azure-npm-jsbbh", "Volume": "log", "Path": "/var/log", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "azure-npm-jsbbh", "Volume": "xtables-lock", "Path": "/run/xtables.lock", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "azure-npm-jsbbh", "Volume": "protocols", "Path": "/etc/protocols", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "azure-npm-lp6sf", "Volume": "log", "Path": "/var/log", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "azure-npm-lp6sf", "Volume": "xtables-lock", "Path": "/run/xtables.lock", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "azure-npm-lp6sf", "Volume": "protocols", "Path": "/etc/protocols", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "azure-npm-nv6xx", "Volume": "log", "Path": "/var/log", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "azure-npm-nv6xx", "Volume": "xtables-lock", "Path": "/run/xtables.lock", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "azure-npm-nv6xx", "Volume": "protocols", "Path": "/etc/protocols", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "azure-npm-p6fpw", "Volume": "log", "Path": "/var/log", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "azure-npm-p6fpw", "Volume": "xtables-lock", "Path": "/run/xtables.lock", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "azure-npm-p6fpw", "Volume": "protocols", "Path": "/etc/protocols", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "azure-npm-vsrfp", "Volume": "log", "Path": "/var/log", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "azure-npm-vsrfp", "Volume": "xtables-lock", "Path": "/run/xtables.lock", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "azure-npm-vsrfp", "Volume": "protocols", "Path": "/etc/protocols", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "azure-npm-z8mcz", "Volume": "log", "Path": "/var/log", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "azure-npm-z8mcz", "Volume": "xtables-lock", "Path": "/run/xtables.lock", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "azure-npm-z8mcz", "Volume": "protocols", "Path": "/etc/protocols", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "azure-policy-698f7c86b4-nnff2", "Volume": "acs-credential", "Path": "/etc/kubernetes/azure.json", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "azure-policy-698f7c86b4-nnff2", "Volume": "ca-certs", "Path": "/etc/ssl/certs", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "azure-policy-698f7c86b4-nnff2", "Volume": "etc-pki-ca-certs", "Path": "/etc/pki/ca-trust/extracted", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "extension-agent-66c4486d68-46cqq", "Volume": "varlog", "Path": "/var/log", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "extension-agent-66c4486d68-46cqq", "Volume": "varlibdockercontainers", "Path": "/var/lib/docker/containers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "extension-agent-66c4486d68-46cqq", "Volume": "acs-credential", "Path": "/etc/kubernetes/azure.json", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "extension-operator-d95fd449b-ssrcx", "Volume": "varlog", "Path": "/var/log", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "extension-operator-d95fd449b-ssrcx", "Volume": "varlibdockercontainers", "Path": "/var/lib/docker/containers", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "extension-operator-d95fd449b-ssrcx", "Volume": "acs-credential", "Path": "/etc/kubernetes/azure.json", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "kube-proxy-26xkd", "Volume": "iptableslock", "Path": "/run/xtables.lock", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "kube-proxy-26xkd", "Volume": "sysctls", "Path": "/etc/sysctl.d", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "kube-proxy-26xkd", "Volume": "modules", "Path": "/lib/modules", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "kube-proxy-6mrql", "Volume": "iptableslock", "Path": "/run/xtables.lock", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "kube-proxy-6mrql", "Volume": "sysctls", "Path": "/etc/sysctl.d", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "kube-proxy-6mrql", "Volume": "modules", "Path": "/lib/modules", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "kube-proxy-9rbxf", "Volume": "iptableslock", "Path": "/run/xtables.lock", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "kube-proxy-9rbxf", "Volume": "sysctls", "Path": "/etc/sysctl.d", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "kube-proxy-9rbxf", "Volume": "modules", "Path": "/lib/modules", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "kube-proxy-njzgk", "Volume": "iptableslock", "Path": "/run/xtables.lock", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "kube-proxy-njzgk", "Volume": "sysctls", "Path": "/etc/sysctl.d", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "kube-proxy-njzgk", "Volume": "modules", "Path": "/lib/modules", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "kube-proxy-rvmxl", "Volume": "iptableslock", "Path": "/run/xtables.lock", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "kube-proxy-rvmxl", "Volume": "sysctls", "Path": "/etc/sysctl.d", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "kube-proxy-rvmxl", "Volume": "modules", "Path": "/lib/modules", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "kube-proxy-vp7xj", "Volume": "iptableslock", "Path": "/run/xtables.lock", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "kube-proxy-vp7xj", "Volume": "sysctls", "Path": "/etc/sysctl.d", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "kube-proxy-vp7xj", "Volume": "modules", "Path": "/lib/modules", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-6xdfq", "Volume": "host-log", "Path": "/var/log", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-6xdfq", "Volume": "debugfs", "Path": "/sys/kernel", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-6xdfq", "Volume": "modules", "Path": "/lib/modules", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-6xdfq", "Volume": "usr-src", "Path": "/usr/src", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-6xdfq", "Volume": "containerd-file-sock", "Path": "/run/containerd/containerd.sock", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-6xdfq", "Volume": "proc", "Path": "/proc", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-6xdfq", "Volume": "bin", "Path": "/bin", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-6xdfq", "Volume": "etc", "Path": "/etc", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-6xdfq", "Volume": "opt", "Path": "/opt", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-6xdfq", "Volume": "usr", "Path": "/usr", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-6xdfq", "Volume": "run", "Path": "/run", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-6xdfq", "Volume": "bpffs", "Path": "/sys/fs/bpf", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-89l74", "Volume": "host-log", "Path": "/var/log", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-89l74", "Volume": "debugfs", "Path": "/sys/kernel", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-89l74", "Volume": "modules", "Path": "/lib/modules", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-89l74", "Volume": "usr-src", "Path": "/usr/src", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-89l74", "Volume": "containerd-file-sock", "Path": "/run/containerd/containerd.sock", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-89l74", "Volume": "proc", "Path": "/proc", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-89l74", "Volume": "bin", "Path": "/bin", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-89l74", "Volume": "etc", "Path": "/etc", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-89l74", "Volume": "opt", "Path": "/opt", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-89l74", "Volume": "usr", "Path": "/usr", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-89l74", "Volume": "run", "Path": "/run", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-89l74", "Volume": "bpffs", "Path": "/sys/fs/bpf", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-d7gwk", "Volume": "host-log", "Path": "/var/log", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-d7gwk", "Volume": "debugfs", "Path": "/sys/kernel", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-d7gwk", "Volume": "modules", "Path": "/lib/modules", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-d7gwk", "Volume": "usr-src", "Path": "/usr/src", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-d7gwk", "Volume": "containerd-file-sock", "Path": "/run/containerd/containerd.sock", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-d7gwk", "Volume": "proc", "Path": "/proc", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-d7gwk", "Volume": "bin", "Path": "/bin", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-d7gwk", "Volume": "etc", "Path": "/etc", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-d7gwk", "Volume": "opt", "Path": "/opt", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-d7gwk", "Volume": "usr", "Path": "/usr", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-d7gwk", "Volume": "run", "Path": "/run", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-d7gwk", "Volume": "bpffs", "Path": "/sys/fs/bpf", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-mdcs8", "Volume": "host-log", "Path": "/var/log", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-mdcs8", "Volume": "debugfs", "Path": "/sys/kernel", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-mdcs8", "Volume": "modules", "Path": "/lib/modules", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-mdcs8", "Volume": "usr-src", "Path": "/usr/src", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-mdcs8", "Volume": "containerd-file-sock", "Path": "/run/containerd/containerd.sock", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-mdcs8", "Volume": "proc", "Path": "/proc", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-mdcs8", "Volume": "bin", "Path": "/bin", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-mdcs8", "Volume": "etc", "Path": "/etc", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-mdcs8", "Volume": "opt", "Path": "/opt", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-mdcs8", "Volume": "usr", "Path": "/usr", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-mdcs8", "Volume": "run", "Path": "/run", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-mdcs8", "Volume": "bpffs", "Path": "/sys/fs/bpf", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-q6d6c", "Volume": "host-log", "Path": "/var/log", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-q6d6c", "Volume": "debugfs", "Path": "/sys/kernel", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-q6d6c", "Volume": "modules", "Path": "/lib/modules", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-q6d6c", "Volume": "usr-src", "Path": "/usr/src", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-q6d6c", "Volume": "containerd-file-sock", "Path": "/run/containerd/containerd.sock", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-q6d6c", "Volume": "proc", "Path": "/proc", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-q6d6c", "Volume": "bin", "Path": "/bin", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-q6d6c", "Volume": "etc", "Path": "/etc", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-q6d6c", "Volume": "opt", "Path": "/opt", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-q6d6c", "Volume": "usr", "Path": "/usr", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-q6d6c", "Volume": "run", "Path": "/run", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-q6d6c", "Volume": "bpffs", "Path": "/sys/fs/bpf", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-wb5dm", "Volume": "host-log", "Path": "/var/log", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-wb5dm", "Volume": "debugfs", "Path": "/sys/kernel", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-wb5dm", "Volume": "modules", "Path": "/lib/modules", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-wb5dm", "Volume": "usr-src", "Path": "/usr/src", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-wb5dm", "Volume": "containerd-file-sock", "Path": "/run/containerd/containerd.sock", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-wb5dm", "Volume": "proc", "Path": "/proc", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-wb5dm", "Volume": "bin", "Path": "/bin", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-wb5dm", "Volume": "etc", "Path": "/etc", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-wb5dm", "Volume": "opt", "Path": "/opt", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-wb5dm", "Volume": "usr", "Path": "/usr", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-wb5dm", "Volume": "run", "Path": "/run", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-wb5dm", "Volume": "bpffs", "Path": "/sys/fs/bpf", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-misc-7df6776447-bcbph", "Volume": "host-log", "Path": "/var/log", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-2ql5b", "Volume": "cert-onboarding", "Path": "/var/microsoft/microsoft-defender-for-cloud", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-2ql5b", "Volume": "host-root", "Path": "/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-2ql5b", "Volume": "docker-sock", "Path": "/var/run", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-2ql5b", "Volume": "container-hostname", "Path": "/etc/hostname", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-2ql5b", "Volume": "host-log", "Path": "/var/log", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-2ql5b", "Volume": "azure-json-path", "Path": "/etc/kubernetes", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-2rsrw", "Volume": "cert-onboarding", "Path": "/var/microsoft/microsoft-defender-for-cloud", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-2rsrw", "Volume": "host-root", "Path": "/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-2rsrw", "Volume": "docker-sock", "Path": "/var/run", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-2rsrw", "Volume": "container-hostname", "Path": "/etc/hostname", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-2rsrw", "Volume": "host-log", "Path": "/var/log", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-2rsrw", "Volume": "azure-json-path", "Path": "/etc/kubernetes", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-jj6dh", "Volume": "cert-onboarding", "Path": "/var/microsoft/microsoft-defender-for-cloud", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-jj6dh", "Volume": "host-root", "Path": "/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-jj6dh", "Volume": "docker-sock", "Path": "/var/run", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-jj6dh", "Volume": "container-hostname", "Path": "/etc/hostname", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-jj6dh", "Volume": "host-log", "Path": "/var/log", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-jj6dh", "Volume": "azure-json-path", "Path": "/etc/kubernetes", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-l5crs", "Volume": "cert-onboarding", "Path": "/var/microsoft/microsoft-defender-for-cloud", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-l5crs", "Volume": "host-root", "Path": "/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-l5crs", "Volume": "docker-sock", "Path": "/var/run", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-l5crs", "Volume": "container-hostname", "Path": "/etc/hostname", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-l5crs", "Volume": "host-log", "Path": "/var/log", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-l5crs", "Volume": "azure-json-path", "Path": "/etc/kubernetes", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-lfk8h", "Volume": "cert-onboarding", "Path": "/var/microsoft/microsoft-defender-for-cloud", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-lfk8h", "Volume": "host-root", "Path": "/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-lfk8h", "Volume": "docker-sock", "Path": "/var/run", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-lfk8h", "Volume": "container-hostname", "Path": "/etc/hostname", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-lfk8h", "Volume": "host-log", "Path": "/var/log", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-lfk8h", "Volume": "azure-json-path", "Path": "/etc/kubernetes", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-vz2c6", "Volume": "cert-onboarding", "Path": "/var/microsoft/microsoft-defender-for-cloud", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-vz2c6", "Volume": "host-root", "Path": "/", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-vz2c6", "Volume": "docker-sock", "Path": "/var/run", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-vz2c6", "Volume": "container-hostname", "Path": "/etc/hostname", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-vz2c6", "Volume": "host-log", "Path": "/var/log", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-vz2c6", "Volume": "azure-json-path", "Path": "/etc/kubernetes", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-cgv48", "Volume": "debug", "Path": "/sys/kernel/debug", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-cgv48", "Volume": "trace", "Path": "/sys/kernel/tracing", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-cgv48", "Volume": "bpf", "Path": "/sys/fs/bpf", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-cgv48", "Volume": "cgroup", "Path": "/sys/fs/cgroup", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-cgv48", "Volume": "cilium", "Path": "/var/run/cilium", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-gjxk8", "Volume": "debug", "Path": "/sys/kernel/debug", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-gjxk8", "Volume": "trace", "Path": "/sys/kernel/tracing", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-gjxk8", "Volume": "bpf", "Path": "/sys/fs/bpf", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-gjxk8", "Volume": "cgroup", "Path": "/sys/fs/cgroup", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-gjxk8", "Volume": "cilium", "Path": "/var/run/cilium", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-js76w", "Volume": "debug", "Path": "/sys/kernel/debug", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-js76w", "Volume": "trace", "Path": "/sys/kernel/tracing", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-js76w", "Volume": "bpf", "Path": "/sys/fs/bpf", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-js76w", "Volume": "cgroup", "Path": "/sys/fs/cgroup", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-js76w", "Volume": "cilium", "Path": "/var/run/cilium", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-lfn7d", "Volume": "debug", "Path": "/sys/kernel/debug", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-lfn7d", "Volume": "trace", "Path": "/sys/kernel/tracing", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-lfn7d", "Volume": "bpf", "Path": "/sys/fs/bpf", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-lfn7d", "Volume": "cgroup", "Path": "/sys/fs/cgroup", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-lfn7d", "Volume": "cilium", "Path": "/var/run/cilium", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-qc9bs", "Volume": "debug", "Path": "/sys/kernel/debug", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-qc9bs", "Volume": "trace", "Path": "/sys/kernel/tracing", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-qc9bs", "Volume": "bpf", "Path": "/sys/fs/bpf", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-qc9bs", "Volume": "cgroup", "Path": "/sys/fs/cgroup", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-qc9bs", "Volume": "cilium", "Path": "/var/run/cilium", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-wlt7b", "Volume": "debug", "Path": "/sys/kernel/debug", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-wlt7b", "Volume": "trace", "Path": "/sys/kernel/tracing", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-wlt7b", "Volume": "bpf", "Path": "/sys/fs/bpf", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-wlt7b", "Volume": "cgroup", "Path": "/sys/fs/cgroup", "Issue": "hostPath volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-wlt7b", "Volume": "cilium", "Path": "/var/run/cilium", "Issue": "hostPath volume used" } ] }, "SEC005": { "Total": 0, "URL": "https://kubernetes.io/docs/concepts/security/pod-security-standards/#host-namespaces", "Name": "Pods Using hostIPC", "Description": "Detects pods that use hostIPC, which can compromise pod isolation and allow access to shared memory on the host.", "Recommendation": "Avoid using hostIPC in pods unless absolutely required for specific functionality.", "Weight": 3, "ID": "SEC005", "Message": "No issues detected for Pods Using hostIPC.", "ResourceKind": "Pod", "Section": "Security", "Category": "Pod Security", "Severity": "High", "Items": [] }, "NS001": { "Total": 14, "URL": "https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/", "Name": "Empty Namespaces", "Description": "Finds namespaces with no running pods.", "Recommendation": "These may be stale or unused and safe to delete after verifying they contain no critical resources.", "Weight": 1, "ID": "NS001", "ResourceKind": "namespaces", "Section": "Namespaces", "Category": "Namespaces", "Severity": "low", "Items": [ { "Namespace": "1", "Status": "📂 Empty" }, { "Namespace": "10", "Status": "📂 Empty" }, { "Namespace": "2", "Status": "📂 Empty" }, { "Namespace": "3", "Status": "📂 Empty" }, { "Namespace": "4", "Status": "📂 Empty" }, { "Namespace": "5", "Status": "📂 Empty" }, { "Namespace": "6", "Status": "📂 Empty" }, { "Namespace": "7", "Status": "📂 Empty" }, { "Namespace": "8", "Status": "📂 Empty" }, { "Namespace": "9", "Status": "📂 Empty" }, { "Namespace": "aks-istio-egress", "Status": "📂 Empty" }, { "Namespace": "default", "Status": "📂 Empty" }, { "Namespace": "kube-node-lease", "Status": "📂 Empty" }, { "Namespace": "kube-public", "Status": "📂 Empty" } ] }, "NS002": { "Total": 32, "URL": "https://kubernetes.io/docs/concepts/policy/resource-quotas/", "Name": "Missing or Weak ResourceQuotas", "Description": "Detects namespaces with missing or incomplete ResourceQuota definitions.", "Recommendation": "Apply CPU, memory, and pod quotas to enforce fair resource usage.", "Weight": 3, "ID": "NS002", "ResourceKind": "resourcequotas", "Section": "Namespaces", "Category": "Namespaces", "Severity": "medium", "Items": [ { "Namespace": "1", "Issue": "❌ No ResourceQuota" }, { "Namespace": "10", "Issue": "❌ No ResourceQuota" }, { "Namespace": "2", "Issue": "❌ No ResourceQuota" }, { "Namespace": "3", "Issue": "❌ No ResourceQuota" }, { "Namespace": "4", "Issue": "❌ No ResourceQuota" }, { "Namespace": "5", "Issue": "❌ No ResourceQuota" }, { "Namespace": "6", "Issue": "❌ No ResourceQuota" }, { "Namespace": "7", "Issue": "❌ No ResourceQuota" }, { "Namespace": "8", "Issue": "❌ No ResourceQuota" }, { "Namespace": "9", "Issue": "❌ No ResourceQuota" }, { "Namespace": "aks-istio-egress", "Issue": "❌ No ResourceQuota" }, { "Namespace": "aks-istio-ingress", "Issue": "❌ No ResourceQuota" }, { "Namespace": "aks-istio-system", "Issue": "❌ No ResourceQuota" }, { "Namespace": "app-routing-system", "Issue": "❌ No ResourceQuota" }, { "Namespace": "argo-rollouts", "Issue": "❌ No ResourceQuota" }, { "Namespace": "argo-workflows", "Issue": "❌ No ResourceQuota" }, { "Namespace": "argocd", "Issue": "❌ No ResourceQuota" }, { "Namespace": "cert-manager", "Issue": "❌ No ResourceQuota" }, { "Namespace": "default", "Issue": "❌ No ResourceQuota" }, { "Namespace": "gatekeeper-system", "Issue": "❌ No ResourceQuota" }, { "Namespace": "grafana", "Issue": "❌ No ResourceQuota" }, { "Namespace": "kiali-operator", "Issue": "❌ No ResourceQuota" }, { "Namespace": "kube-node-lease", "Issue": "❌ No ResourceQuota" }, { "Namespace": "kube-public", "Issue": "❌ No ResourceQuota" }, { "Namespace": "kube-system", "Issue": "❌ No ResourceQuota" }, { "Namespace": "kubeview", "Issue": "❌ No ResourceQuota" }, { "Namespace": "linkerd", "Issue": "❌ No ResourceQuota" }, { "Namespace": "nginx", "Issue": "❌ No ResourceQuota" }, { "Namespace": "pets", "Issue": "❌ No ResourceQuota" }, { "Namespace": "prometheus", "Issue": "❌ No ResourceQuota" }, { "Namespace": "sealed-secrets", "Issue": "❌ No ResourceQuota" }, { "Namespace": "test", "Issue": "❌ No ResourceQuota" } ] }, "AKSIAM003": { "ID": "AKSIAM003", "Severity": "Medium", "URL": "https://learn.microsoft.com/azure/aks/workload-identity-overview", "FailMessage": "", "Name": "Workload Identity Enabled", "Recommendation": "Workload Identity Enabled is enabled.", "Status": "✅ PASS", "Category": "Identity & Access", "Total": 0, "Items": null }, "AKSMON001": { "ID": "AKSMON001", "Severity": "High", "URL": "https://learn.microsoft.com/azure/azure-monitor/containers/container-insights-overview", "FailMessage": "", "Name": "Azure Monitor", "Recommendation": "Azure Monitor is enabled.", "Status": "✅ PASS", "Category": "Monitoring & Logging", "Total": 0, "Items": null }, "AKSSEC001": { "ID": "AKSSEC001", "Severity": "High", "URL": "https://learn.microsoft.com/azure/aks/private-clusters", "FailMessage": "Cluster API server is publicly accessible, increasing security risks.", "Name": "Private Cluster", "Recommendation": "Configure the cluster as a private cluster to restrict API server access to your virtual network.", "Status": "❌ FAIL", "Category": "Security", "Total": 1, "Items": { "Issue": "Configure the cluster as a private cluster to restrict API server access to your virtual network.", "Resource": "Private Cluster" } }, "POD004": { "Total": 0, "URL": "https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#pod-phase", "Name": "Pending Pods", "Description": "Detects pods stuck in a 'Pending' state due to scheduling or resource issues.", "Recommendation": "Inspect scheduling constraints, resource availability, and missing dependencies.", "Weight": 3, "ID": "POD004", "Message": "No issues detected for Pending Pods.", "ResourceKind": "Pod", "Section": "Pods", "Category": "Workloads", "Severity": "Warning", "Items": [] }, "RBAC004": { "Total": 4, "URL": "https://kubernetes.io/docs/reference/access-authn-authz/rbac/", "Name": "Orphaned and Ineffective Roles", "Description": "Flags Roles and ClusterRoles that are unused, lack subjects, or define no rules.", "Recommendation": "Delete Roles and ClusterRoles that are not bound or do not define any rules.", "Weight": 1, "ID": "RBAC004", "ResourceKind": "Role, ClusterRole", "Section": "Security", "Category": "RBAC", "Severity": "Low", "Items": [ { "Namespace": "cluster-wide", "Resource": "clusterrolebinding/system:node", "Value": "system:node", "Message": "ClusterRoleBinding has no subjects" }, { "Namespace": "cluster-wide", "Resource": "clusterrole/aks-secretproviderclasses-admin-role", "Value": "aks-secretproviderclasses-admin-role", "Message": "Unused ClusterRole" }, { "Namespace": "cluster-wide", "Resource": "clusterrole/aks-secretproviderclasses-viewer-role", "Value": "aks-secretproviderclasses-viewer-role", "Message": "Unused ClusterRole" }, { "Namespace": "cluster-wide", "Resource": "clusterrole/eraser-imagejob-pods-cluster-role", "Value": "eraser-imagejob-pods-cluster-role", "Message": "ClusterRole has no rules" } ] }, "WRK005": { "Total": 94, "URL": "https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/", "Name": "Missing Resource Requests or Limits", "Description": "Checks for containers that are missing CPU or memory resource requests or limits.", "Recommendation": "Specify resource requests and limits on all containers.", "Weight": 3, "ID": "WRK005", "ResourceKind": "Pod", "Section": "Workloads", "Category": "Workloads", "Severity": "Warning", "Items": [ { "Namespace": "aks-istio-ingress", "Resource": "Deployment/aks-istio-ingressgateway-external-asm-1-23", "Value": "istio-proxy", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "aks-istio-system", "Resource": "Deployment/istiod-asm-1-23", "Value": "discovery", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "app-routing-system", "Resource": "Deployment/nginx", "Value": "controller", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "argo-rollouts", "Resource": "Deployment/simple-deployment", "Value": "webserver-simple", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "argo-workflows", "Resource": "Deployment/simple-deployment", "Value": "webserver-simple", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "argocd", "Resource": "Deployment/argocd-applicationset-controller", "Value": "argocd-applicationset-controller", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "argocd", "Resource": "Deployment/argocd-dex-server", "Value": "dex", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "argocd", "Resource": "Deployment/argocd-dex-server", "Value": "copyutil", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "argocd", "Resource": "Deployment/argocd-notifications-controller", "Value": "argocd-notifications-controller", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "argocd", "Resource": "Deployment/argocd-redis-ha-haproxy", "Value": "haproxy", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "argocd", "Resource": "Deployment/argocd-redis-ha-haproxy", "Value": "secret-init", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "argocd", "Resource": "Deployment/argocd-redis-ha-haproxy", "Value": "config-init", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "argocd", "Resource": "Deployment/argocd-repo-server", "Value": "argocd-repo-server", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "argocd", "Resource": "Deployment/argocd-repo-server", "Value": "copyutil", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "argocd", "Resource": "Deployment/argocd-server", "Value": "argocd-server", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "cert-manager", "Resource": "Deployment/simple-deployment", "Value": "webserver-simple", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "gatekeeper-system", "Resource": "Deployment/gatekeeper-audit", "Value": "gatekeeper-audit-container", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "gatekeeper-system", "Resource": "Deployment/gatekeeper-controller", "Value": "gatekeeper-controller-container", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "grafana", "Resource": "Deployment/simple-deployment", "Value": "webserver-simple", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kiali-operator", "Resource": "Deployment/kiali", "Value": "kiali", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kiali-operator", "Resource": "Deployment/kiali-operator", "Value": "operator", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "Deployment/ama-logs-rs", "Value": "ama-logs", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "Deployment/ama-metrics", "Value": "prometheus-collector", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "Deployment/ama-metrics", "Value": "addon-token-adapter", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "Deployment/ama-metrics-ksm", "Value": "ama-metrics-ksm", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "Deployment/ama-metrics-operator-targets", "Value": "targetallocator", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "Deployment/ama-metrics-operator-targets", "Value": "config-reader", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "Deployment/azure-policy", "Value": "azure-policy", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "Deployment/azure-policy-webhook", "Value": "azure-policy-webhook", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "Deployment/azure-wi-webhook-controller-manager", "Value": "manager", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "Deployment/coredns", "Value": "coredns", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "Deployment/coredns-autoscaler", "Value": "autoscaler", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "Deployment/eraser-controller-manager", "Value": "manager", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "Deployment/extension-agent", "Value": "extension-agent", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "Deployment/extension-agent", "Value": "fluent-bit", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "Deployment/extension-operator", "Value": "manager", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "Deployment/extension-operator", "Value": "fluent-bit", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "Deployment/keda-admission-webhooks", "Value": "keda-admission-webhooks", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "Deployment/keda-operator", "Value": "keda-operator", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "Deployment/keda-operator-metrics-apiserver", "Value": "keda-operator-metrics-apiserver", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "Deployment/konnectivity-agent", "Value": "konnectivity-agent", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "Deployment/konnectivity-agent-autoscaler", "Value": "autoscaler", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "Deployment/metrics-server", "Value": "metrics-server-vpa", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "Deployment/metrics-server", "Value": "metrics-server", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "Deployment/microsoft-defender-collector-misc", "Value": "microsoft-defender-pod-collector", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "Deployment/vpa-admission-controller", "Value": "admission-controller", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "Deployment/vpa-recommender", "Value": "recommender", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "Deployment/vpa-updater", "Value": "updater", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kubeview", "Resource": "Deployment/simple-deployment", "Value": "webserver-simple", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "linkerd", "Resource": "Deployment/simple-deployment", "Value": "webserver-simple", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "nginx", "Resource": "Deployment/simple-deployment", "Value": "webserver-simple", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "pets", "Resource": "Deployment/order-service", "Value": "order-service", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "pets", "Resource": "Deployment/order-service", "Value": "wait-for-rabbitmq", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "pets", "Resource": "Deployment/product-service", "Value": "product-service", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "pets", "Resource": "Deployment/store-front", "Value": "store-front", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "prometheus", "Resource": "Deployment/simple-deployment", "Value": "webserver-simple", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "sealed-secrets", "Resource": "Deployment/simple-deployment", "Value": "webserver-simple", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "test", "Resource": "Deployment/simple-deployment", "Value": "webserver-simple", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "argocd", "Resource": "StatefulSet/argocd-application-controller", "Value": "argocd-application-controller", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "argocd", "Resource": "StatefulSet/argocd-redis-ha-server", "Value": "redis", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "argocd", "Resource": "StatefulSet/argocd-redis-ha-server", "Value": "sentinel", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "argocd", "Resource": "StatefulSet/argocd-redis-ha-server", "Value": "split-brain-fix", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "argocd", "Resource": "StatefulSet/argocd-redis-ha-server", "Value": "config-init", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "pets", "Resource": "StatefulSet/rabbitmq", "Value": "rabbitmq", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "DaemonSet/aks-secrets-store-csi-driver", "Value": "node-driver-registrar", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "DaemonSet/aks-secrets-store-csi-driver", "Value": "secrets-store", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "DaemonSet/aks-secrets-store-csi-driver", "Value": "liveness-probe", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "DaemonSet/aks-secrets-store-csi-driver-windows", "Value": "node-driver-registrar", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "DaemonSet/aks-secrets-store-csi-driver-windows", "Value": "secrets-store", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "DaemonSet/aks-secrets-store-csi-driver-windows", "Value": "liveness-probe", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "DaemonSet/aks-secrets-store-provider-azure", "Value": "provider-azure-installer", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "DaemonSet/aks-secrets-store-provider-azure-windows", "Value": "provider-azure-installer", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "DaemonSet/ama-logs", "Value": "ama-logs", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "DaemonSet/ama-logs", "Value": "ama-logs-prometheus", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "DaemonSet/ama-logs-windows", "Value": "ama-logs-windows", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "DaemonSet/ama-metrics-node", "Value": "prometheus-collector", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "DaemonSet/ama-metrics-node", "Value": "addon-token-adapter", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "DaemonSet/ama-metrics-win-node", "Value": "prometheus-collector", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "DaemonSet/ama-metrics-win-node", "Value": "addon-token-adapter-win", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "DaemonSet/azure-ip-masq-agent", "Value": "azure-ip-masq-agent", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "DaemonSet/azure-npm", "Value": "azure-npm", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "DaemonSet/azure-npm", "Value": "block-wireserver", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "DaemonSet/cloud-node-manager", "Value": "cloud-node-manager", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "DaemonSet/cloud-node-manager-windows", "Value": "cloud-node-manager", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "DaemonSet/kube-proxy", "Value": "kube-proxy", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "DaemonSet/kube-proxy", "Value": "kube-proxy-bootstrap", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "DaemonSet/microsoft-defender-collector-ds", "Value": "microsoft-defender-pod-collector", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "DaemonSet/microsoft-defender-collector-ds", "Value": "microsoft-defender-low-level-collector", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "DaemonSet/microsoft-defender-publisher-ds", "Value": "microsoft-defender-publisher", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "DaemonSet/microsoft-defender-publisher-ds", "Value": "old-file-cleaner", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "DaemonSet/retina-agent", "Value": "retina", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "DaemonSet/retina-agent", "Value": "retina-agent-init", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "DaemonSet/retina-agent-win", "Value": "retinawin", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" }, { "Namespace": "kube-system", "Resource": "DaemonSet/windows-kube-proxy-initializer", "Value": "pause", "Message": "CPU and Memory Requests and CPU and Memory Limits missing" } ] }, "AKSRES003": { "ID": "AKSRES003", "Severity": "Medium", "URL": "https://learn.microsoft.com/azure/aks/vertical-pod-autoscaler", "FailMessage": "", "Name": "Vertical Pod Autoscaler (VPA) is enabled", "Recommendation": "Vertical Pod Autoscaler (VPA) is enabled is enabled.", "Status": "✅ PASS", "Category": "Resource Management", "Total": 0, "Items": null }, "NODE002": { "Total": 2, "URL": "https://kubernetes.io/docs/tasks/debug/debug-cluster/resource-usage-monitoring/", "Name": "Node Resource Pressure", "Description": "Detects nodes under high CPU, memory, or disk pressure.", "Recommendation": "Investigate and rebalance workloads on nodes with high resource usage.", "Weight": 6, "ID": "NODE002", "ResourceKind": "Node", "Section": "Nodes", "Category": "Nodes", "Severity": "Medium", "Items": [ { "Node": "aks-systempool-19995743-vmss00000m", "CPU Status": "✅ Normal", "CPU %": "8.84%", "CPU Used": "168 mC", "CPU Total": "1900 mC", "Mem Status": "🟡 Warning", "Mem %": "52.23%", "Mem Used": "3412 Mi", "Mem Total": "6533 Mi", "Disk %": "52%", "Disk Status": "✅ Normal" }, { "Node": "aks-systempool-19995743-vmss00000n", "CPU Status": "✅ Normal", "CPU %": "8.68%", "CPU Used": "165 mC", "CPU Total": "1900 mC", "Mem Status": "🟡 Warning", "Mem %": "50.30%", "Mem Used": "3286 Mi", "Mem Total": "6533 Mi", "Disk %": "50%", "Disk Status": "✅ Normal" }, { "Node": "aks-systempool-19995743-vmss00000o", "CPU Status": "✅ Normal", "CPU %": "8.63%", "CPU Used": "164 mC", "CPU Total": "1900 mC", "Mem Status": "✅ Normal", "Mem %": "49.61%", "Mem Used": "3241 Mi", "Mem Total": "6533 Mi", "Disk %": "49%", "Disk Status": "✅ Normal" }, { "Node": "aks-workloadpool-10479701-vmss00000e", "CPU Status": "✅ Normal", "CPU %": "31.01%", "CPU Used": "1197 mC", "CPU Total": "3860 mC", "Mem Status": "✅ Normal", "Mem %": "22.45%", "Mem Used": "3274 Mi", "Mem Total": "14584 Mi", "Disk %": "22%", "Disk Status": "✅ Normal" }, { "Node": "aks-workloadpool-10479701-vmss00000f", "CPU Status": "✅ Normal", "CPU %": "30.34%", "CPU Used": "1171 mC", "CPU Total": "3860 mC", "Mem Status": "✅ Normal", "Mem %": "16.83%", "Mem Used": "2454 Mi", "Mem Total": "14584 Mi", "Disk %": "16%", "Disk Status": "✅ Normal" }, { "Node": "aks-workloadpool-10479701-vmss00000g", "CPU Status": "✅ Normal", "CPU %": "3.52%", "CPU Used": "136 mC", "CPU Total": "3860 mC", "Mem Status": "✅ Normal", "Mem %": "14.12%", "Mem Used": "2059 Mi", "Mem Total": "14584 Mi", "Disk %": "14%", "Disk Status": "✅ Normal" } ] }, "POD003": { "Total": 0, "URL": "https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#pod-phase", "Name": "Failed Pods", "Description": "Detects pods in a failed phase, typically due to startup errors, crashes, or misconfiguration.", "Recommendation": "Investigate failed pods for common issues like image errors, resource constraints, or crash loops.", "Weight": 4, "ID": "POD003", "Message": "No issues detected for Failed Pods.", "ResourceKind": "Pod", "Section": "Pods", "Category": "Workloads", "Severity": "Error", "Items": [] }, "AKSNET004": { "ID": "AKSNET004", "Severity": "Medium", "URL": "https://learn.microsoft.com/azure/aks/concepts-network#networking-options", "FailMessage": "", "Name": "Azure CNI Networking Recommended", "Recommendation": "Azure CNI Networking Recommended is enabled.", "Status": "✅ PASS", "Category": "Networking", "Total": 0, "Items": null }, "AKSNET001": { "ID": "AKSNET001", "Severity": "High", "URL": "https://learn.microsoft.com/azure/aks/operator-best-practices-cluster-security#secure-access-to-the-api-server-and-cluster-nodes", "FailMessage": "", "Name": "Authorized IP Ranges", "Recommendation": "Authorized IP Ranges is enabled.", "Status": "✅ PASS", "Category": "Networking", "Total": 0, "Items": null }, "CFG001": { "Total": 20, "URL": "https://kubernetes.io/docs/concepts/configuration/configmap/", "Name": "Orphaned ConfigMaps", "Description": "Detects ConfigMaps that are not referenced by any pod, workload, service, or ingress.", "Recommendation": "Delete unused ConfigMaps to clean up the cluster and reduce confusion.", "Weight": 1, "ID": "CFG001", "ResourceKind": "ConfigMap", "Section": "Configuration Hygiene", "Category": "Best Practices", "Severity": "Medium", "Items": [ { "Namespace": "aks-istio-system", "Resource": "configmap/istio-asm-1-23", "Value": "-", "Message": "ConfigMap is not used by any workloads or services." }, { "Namespace": "aks-istio-system", "Resource": "configmap/istio-gateway-status-leader", "Value": "-", "Message": "ConfigMap is not used by any workloads or services." }, { "Namespace": "aks-istio-system", "Resource": "configmap/istio-leader", "Value": "-", "Message": "ConfigMap is not used by any workloads or services." }, { "Namespace": "aks-istio-system", "Resource": "configmap/istio-namespace-controller-election", "Value": "-", "Message": "ConfigMap is not used by any workloads or services." }, { "Namespace": "aks-istio-system", "Resource": "configmap/istio-sidecar-injector-asm-1-23", "Value": "-", "Message": "ConfigMap is not used by any workloads or services." }, { "Namespace": "app-routing-system", "Resource": "configmap/nginx", "Value": "-", "Message": "ConfigMap is not used by any workloads or services." }, { "Namespace": "argocd", "Resource": "configmap/argocd-notifications-cm", "Value": "-", "Message": "ConfigMap is not used by any workloads or services." }, { "Namespace": "argocd", "Resource": "configmap/argocd-rbac-cm", "Value": "-", "Message": "ConfigMap is not used by any workloads or services." }, { "Namespace": "kube-system", "Resource": "configmap/azure-ip-masq-agent-config-reconciled", "Value": "-", "Message": "ConfigMap is not used by any workloads or services." }, { "Namespace": "kube-system", "Resource": "configmap/cluster-autoscaler-status", "Value": "-", "Message": "ConfigMap is not used by any workloads or services." }, { "Namespace": "kube-system", "Resource": "configmap/container-azm-ms-aks-k8scluster", "Value": "-", "Message": "ConfigMap is not used by any workloads or services." }, { "Namespace": "kube-system", "Resource": "configmap/coredns-autoscaler", "Value": "-", "Message": "ConfigMap is not used by any workloads or services." }, { "Namespace": "kube-system", "Resource": "configmap/eraser-system-exclusion", "Value": "-", "Message": "ConfigMap is not used by any workloads or services." }, { "Namespace": "kube-system", "Resource": "configmap/extension-apiserver-authentication", "Value": "-", "Message": "ConfigMap is not used by any workloads or services." }, { "Namespace": "kube-system", "Resource": "configmap/extension-immutable-values", "Value": "-", "Message": "ConfigMap is not used by any workloads or services." }, { "Namespace": "kube-system", "Resource": "configmap/extensioncontrollerleaderid-lock", "Value": "-", "Message": "ConfigMap is not used by any workloads or services." }, { "Namespace": "kube-system", "Resource": "configmap/konnectivity-agent-autoscaler", "Value": "-", "Message": "ConfigMap is not used by any workloads or services." }, { "Namespace": "kube-system", "Resource": "configmap/kube-apiserver-legacy-service-account-token-tracking", "Value": "-", "Message": "ConfigMap is not used by any workloads or services." }, { "Namespace": "kube-system", "Resource": "configmap/overlay-upgrade-data", "Value": "-", "Message": "ConfigMap is not used by any workloads or services." }, { "Namespace": "kube-system", "Resource": "configmap/retina-config-win", "Value": "-", "Message": "ConfigMap is not used by any workloads or services." } ] }, "AKSIAM007": { "ID": "AKSIAM007", "Severity": "High", "URL": "https://learn.microsoft.com/azure/aks/manage-local-accounts-managed-azure-ad", "FailMessage": "", "Name": "Local Accounts Disabled", "Recommendation": "Local Accounts Disabled is enabled.", "Status": "✅ PASS", "Category": "Identity & Access", "Total": 0, "Items": null }, "RBAC002": { "Total": 21, "URL": "https://kubernetes.io/docs/reference/access-authn-authz/rbac/", "Name": "RBAC Overexposure", "Description": "Identifies dangerous RBAC grants such as cluster-admin, wildcard permissions, and sensitive resource access in roles and bindings.", "Recommendation": "Avoid cluster-admin, wildcard, and sensitive resource access in roles. Use least privilege.", "Weight": 5, "ID": "RBAC002", "ResourceKind": "ClusterRoleBinding", "Section": "Security", "Category": "RBAC", "Severity": "Critical", "Items": [ { "Namespace": "🌍 Cluster-Wide", "Resource": "ClusterRoleBinding/aks-cluster-admin-binding", "Value": "User/clusterAdmin", "Message": "cluster-admin binding (built-in)" }, { "Namespace": "🌍 Cluster-Wide", "Resource": "ClusterRoleBinding/aks-cluster-admin-binding", "Value": "User/clusterUser", "Message": "cluster-admin binding (built-in)" }, { "Namespace": "🌍 Cluster-Wide", "Resource": "ClusterRoleBinding/aks-cluster-admin-binding-aad", "Value": "Group/e591c663-c79c-47a4-94b8-f646b8647046", "Message": "cluster-admin binding (built-in)" }, { "Namespace": "🌍 Cluster-Wide", "Resource": "ClusterRoleBinding/aks-secretprovidersyncing-rolebinding", "Value": "ServiceAccount/aks-secrets-store-csi-driver", "Message": "Access to sensitive resources" }, { "Namespace": "🌍 Cluster-Wide", "Resource": "ClusterRoleBinding/aks-service-rolebinding", "Value": "User/aks-support", "Message": "Access to sensitive resources" }, { "Namespace": "🌍 Cluster-Wide", "Resource": "ClusterRoleBinding/argocd-application-controller", "Value": "ServiceAccount/argocd-application-controller", "Message": "Wildcard permission role" }, { "Namespace": "🌍 Cluster-Wide", "Resource": "ClusterRoleBinding/cluster-admin", "Value": "Group/system:masters", "Message": "cluster-admin binding (built-in)" }, { "Namespace": "🌍 Cluster-Wide", "Resource": "ClusterRoleBinding/extension-operator", "Value": "ServiceAccount/extension-operatorsa", "Message": "cluster-admin binding (built-in)" }, { "Namespace": "🌍 Cluster-Wide", "Resource": "ClusterRoleBinding/kiali-operator", "Value": "ServiceAccount/kiali-operator", "Message": "Access to sensitive resources" }, { "Namespace": "🌍 Cluster-Wide", "Resource": "ClusterRoleBinding/system:controller:clusterrole-aggregation-controller", "Value": "ServiceAccount/clusterrole-aggregation-controller", "Message": "Access to sensitive resources (built-in)" }, { "Namespace": "🌍 Cluster-Wide", "Resource": "ClusterRoleBinding/system:controller:legacy-service-account-token-cleaner", "Value": "ServiceAccount/legacy-service-account-token-cleaner", "Message": "Access to sensitive resources (built-in)" }, { "Namespace": "🌍 Cluster-Wide", "Resource": "ClusterRoleBinding/system:kube-controller-manager", "Value": "User/system:kube-controller-manager", "Message": "Access to sensitive resources (built-in)" }, { "Namespace": "🌍 Cluster-Wide", "Resource": "ClusterRoleBinding/system:kube-scheduler", "Value": "User/system:kube-scheduler", "Message": "Access to sensitive resources (built-in)" }, { "Namespace": "🌍 Cluster-Wide", "Resource": "ClusterRoleBinding/system:persistent-volume-binding", "Value": "ServiceAccount/persistent-volume-binder", "Message": "Access to sensitive resources (built-in)" }, { "Namespace": "aks-istio-system", "Resource": "RoleBinding/istiod-asm-1-23", "Value": "ServiceAccount/istiod-asm-1-23", "Message": "Access to sensitive resources" }, { "Namespace": "argocd", "Resource": "RoleBinding/argocd-redis-ha-haproxy", "Value": "ServiceAccount/argocd-redis-ha-haproxy", "Message": "Access to sensitive resources" }, { "Namespace": "argocd", "Resource": "RoleBinding/argocd-server", "Value": "ServiceAccount/argocd-server", "Message": "Access to sensitive resources" }, { "Namespace": "gatekeeper-system", "Resource": "RoleBinding/gatekeeper-manager-rolebinding", "Value": "ServiceAccount/gatekeeper-admin", "Message": "Access to sensitive resources" }, { "Namespace": "kube-system", "Resource": "RoleBinding/azure-policy-webhook-rolebinding", "Value": "ServiceAccount/azure-policy-webhook-account", "Message": "Access to sensitive resources" }, { "Namespace": "kube-system", "Resource": "RoleBinding/keda-operator-certs", "Value": "ServiceAccount/keda-operator", "Message": "Access to sensitive resources" }, { "Namespace": "kube-system", "Resource": "RoleBinding/system:controller:token-cleaner", "Value": "ServiceAccount/token-cleaner", "Message": "Access to sensitive resources" } ] }, "JOB001": { "Total": 0, "URL": "https://kubernetes.io/docs/concepts/workloads/controllers/job/#pod-backoff-failure-policy", "Name": "Stuck Kubernetes Jobs", "Description": "Finds Jobs that have started but not completed within a threshold.", "Recommendation": "Jobs that haven't completed may be stuck due to node issues, misconfiguration, or missing pods.", "Weight": 2, "ID": "JOB001", "Message": "No issues detected for Stuck Kubernetes Jobs.", "ResourceKind": "jobs", "Section": "Jobs", "Category": "Jobs", "Severity": "medium", "Items": [] }, "NODE001": { "Total": 0, "URL": "https://kubernetes.io/docs/concepts/architecture/nodes/", "Name": "Node Readiness and Conditions", "Description": "Detects nodes that are not in Ready state or reporting other warning conditions.", "Recommendation": "Investigate NotReady nodes to avoid workload disruption.", "Weight": 8, "ID": "NODE001", "Message": "No issues detected for Node Readiness and Conditions.", "ResourceKind": "Node", "Section": "Nodes", "Category": "Nodes", "Severity": "High", "Items": [ { "Node": "aks-systempool-19995743-vmss00000m", "Status": "✅ Healthy", "Issues": "None" }, { "Node": "aks-systempool-19995743-vmss00000n", "Status": "✅ Healthy", "Issues": "None" }, { "Node": "aks-systempool-19995743-vmss00000o", "Status": "✅ Healthy", "Issues": "None" }, { "Node": "aks-workloadpool-10479701-vmss00000e", "Status": "✅ Healthy", "Issues": "None" }, { "Node": "aks-workloadpool-10479701-vmss00000f", "Status": "✅ Healthy", "Issues": "None" }, { "Node": "aks-workloadpool-10479701-vmss00000g", "Status": "✅ Healthy", "Issues": "None" } ] }, "SEC012": { "Total": 70, "URL": "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted", "Name": "Added Linux Capabilities", "Description": "Flags containers that add extra Linux capabilities using securityContext.capabilities.add.\n", "Recommendation": "Avoid adding capabilities unless necessary. Most apps don’t need them.", "Weight": 2, "ID": "SEC012", "ResourceKind": "Pod", "Section": "Security", "Category": "Pod Security", "Severity": "Medium", "Items": [ { "Namespace": "app-routing-system", "Pod": "nginx-69fcb489fd-4wgk9", "Container": "controller", "Capabilities": "NET_BIND_SERVICE", "Issue": "Added Linux capabilities" }, { "Namespace": "app-routing-system", "Pod": "nginx-69fcb489fd-64v6k", "Container": "controller", "Capabilities": "NET_BIND_SERVICE", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "ama-logs-4v8mz", "Container": "ama-logs", "Capabilities": "DAC_OVERRIDE", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "ama-logs-4v8mz", "Container": "ama-logs-prometheus", "Capabilities": "DAC_OVERRIDE", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "ama-logs-5vr2w", "Container": "ama-logs", "Capabilities": "DAC_OVERRIDE", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "ama-logs-5vr2w", "Container": "ama-logs-prometheus", "Capabilities": "DAC_OVERRIDE", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "ama-logs-fmd7b", "Container": "ama-logs", "Capabilities": "DAC_OVERRIDE", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "ama-logs-fmd7b", "Container": "ama-logs-prometheus", "Capabilities": "DAC_OVERRIDE", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "ama-logs-fpkw6", "Container": "ama-logs", "Capabilities": "DAC_OVERRIDE", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "ama-logs-fpkw6", "Container": "ama-logs-prometheus", "Capabilities": "DAC_OVERRIDE", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "ama-logs-gqs28", "Container": "ama-logs", "Capabilities": "DAC_OVERRIDE", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "ama-logs-gqs28", "Container": "ama-logs-prometheus", "Capabilities": "DAC_OVERRIDE", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "ama-logs-ndxrw", "Container": "ama-logs", "Capabilities": "DAC_OVERRIDE", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "ama-logs-ndxrw", "Container": "ama-logs-prometheus", "Capabilities": "DAC_OVERRIDE", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "ama-logs-rs-64765bd4b9-ldxwl", "Container": "ama-logs", "Capabilities": "DAC_OVERRIDE", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "ama-metrics-7f878d975f-hlggb", "Container": "prometheus-collector", "Capabilities": "DAC_OVERRIDE", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "ama-metrics-7f878d975f-hlggb", "Container": "addon-token-adapter", "Capabilities": "NET_ADMIN, NET_RAW", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "ama-metrics-7f878d975f-q2mlg", "Container": "prometheus-collector", "Capabilities": "DAC_OVERRIDE", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "ama-metrics-7f878d975f-q2mlg", "Container": "addon-token-adapter", "Capabilities": "NET_ADMIN, NET_RAW", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-2ssrw", "Container": "prometheus-collector", "Capabilities": "DAC_OVERRIDE", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-2ssrw", "Container": "addon-token-adapter", "Capabilities": "NET_ADMIN, NET_RAW", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-6kkz8", "Container": "prometheus-collector", "Capabilities": "DAC_OVERRIDE", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-6kkz8", "Container": "addon-token-adapter", "Capabilities": "NET_ADMIN, NET_RAW", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-9h44h", "Container": "prometheus-collector", "Capabilities": "DAC_OVERRIDE", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-9h44h", "Container": "addon-token-adapter", "Capabilities": "NET_ADMIN, NET_RAW", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-lhk42", "Container": "prometheus-collector", "Capabilities": "DAC_OVERRIDE", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-lhk42", "Container": "addon-token-adapter", "Capabilities": "NET_ADMIN, NET_RAW", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-nm5bf", "Container": "prometheus-collector", "Capabilities": "DAC_OVERRIDE", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-nm5bf", "Container": "addon-token-adapter", "Capabilities": "NET_ADMIN, NET_RAW", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-pqcz5", "Container": "prometheus-collector", "Capabilities": "DAC_OVERRIDE", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-pqcz5", "Container": "addon-token-adapter", "Capabilities": "NET_ADMIN, NET_RAW", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "azure-ip-masq-agent-4522j", "Container": "azure-ip-masq-agent", "Capabilities": "NET_ADMIN, NET_RAW", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "azure-ip-masq-agent-4c7cr", "Container": "azure-ip-masq-agent", "Capabilities": "NET_ADMIN, NET_RAW", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "azure-ip-masq-agent-78rnw", "Container": "azure-ip-masq-agent", "Capabilities": "NET_ADMIN, NET_RAW", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "azure-ip-masq-agent-84ltn", "Container": "azure-ip-masq-agent", "Capabilities": "NET_ADMIN, NET_RAW", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "azure-ip-masq-agent-t4c2w", "Container": "azure-ip-masq-agent", "Capabilities": "NET_ADMIN, NET_RAW", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "azure-ip-masq-agent-vbdd8", "Container": "azure-ip-masq-agent", "Capabilities": "NET_ADMIN, NET_RAW", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "azure-npm-jsbbh", "Container": "azure-npm", "Capabilities": "NET_ADMIN, NET_RAW", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "azure-npm-lp6sf", "Container": "azure-npm", "Capabilities": "NET_ADMIN, NET_RAW", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "azure-npm-nv6xx", "Container": "azure-npm", "Capabilities": "NET_ADMIN, NET_RAW", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "azure-npm-p6fpw", "Container": "azure-npm", "Capabilities": "NET_ADMIN, NET_RAW", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "azure-npm-vsrfp", "Container": "azure-npm", "Capabilities": "NET_ADMIN, NET_RAW", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "azure-npm-z8mcz", "Container": "azure-npm", "Capabilities": "NET_ADMIN, NET_RAW", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "coredns-658d6d767d-757xp", "Container": "coredns", "Capabilities": "NET_BIND_SERVICE", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "coredns-658d6d767d-pt6l6", "Container": "coredns", "Capabilities": "NET_BIND_SERVICE", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-6xdfq", "Container": "microsoft-defender-pod-collector", "Capabilities": "NET_RAW, NET_ADMIN", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-6xdfq", "Container": "microsoft-defender-low-level-collector", "Capabilities": "SYS_ADMIN, SYS_RESOURCE, SYS_PTRACE, SYSLOG, IPC_LOCK, NET_ADMIN, NET_RAW", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-89l74", "Container": "microsoft-defender-pod-collector", "Capabilities": "NET_RAW, NET_ADMIN", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-89l74", "Container": "microsoft-defender-low-level-collector", "Capabilities": "SYS_ADMIN, SYS_RESOURCE, SYS_PTRACE, SYSLOG, IPC_LOCK, NET_ADMIN, NET_RAW", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-d7gwk", "Container": "microsoft-defender-pod-collector", "Capabilities": "NET_RAW, NET_ADMIN", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-d7gwk", "Container": "microsoft-defender-low-level-collector", "Capabilities": "SYS_ADMIN, SYS_RESOURCE, SYS_PTRACE, SYSLOG, IPC_LOCK, NET_ADMIN, NET_RAW", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-mdcs8", "Container": "microsoft-defender-pod-collector", "Capabilities": "NET_RAW, NET_ADMIN", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-mdcs8", "Container": "microsoft-defender-low-level-collector", "Capabilities": "SYS_ADMIN, SYS_RESOURCE, SYS_PTRACE, SYSLOG, IPC_LOCK, NET_ADMIN, NET_RAW", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-q6d6c", "Container": "microsoft-defender-pod-collector", "Capabilities": "NET_RAW, NET_ADMIN", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-q6d6c", "Container": "microsoft-defender-low-level-collector", "Capabilities": "SYS_ADMIN, SYS_RESOURCE, SYS_PTRACE, SYSLOG, IPC_LOCK, NET_ADMIN, NET_RAW", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-wb5dm", "Container": "microsoft-defender-pod-collector", "Capabilities": "NET_RAW, NET_ADMIN", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-wb5dm", "Container": "microsoft-defender-low-level-collector", "Capabilities": "SYS_ADMIN, SYS_RESOURCE, SYS_PTRACE, SYSLOG, IPC_LOCK, NET_ADMIN, NET_RAW", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-misc-7df6776447-bcbph", "Container": "microsoft-defender-pod-collector", "Capabilities": "NET_RAW, NET_ADMIN", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-2ql5b", "Container": "microsoft-defender-publisher", "Capabilities": "NET_RAW, NET_ADMIN", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-2rsrw", "Container": "microsoft-defender-publisher", "Capabilities": "NET_RAW, NET_ADMIN", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-jj6dh", "Container": "microsoft-defender-publisher", "Capabilities": "NET_RAW, NET_ADMIN", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-l5crs", "Container": "microsoft-defender-publisher", "Capabilities": "NET_RAW, NET_ADMIN", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-lfk8h", "Container": "microsoft-defender-publisher", "Capabilities": "NET_RAW, NET_ADMIN", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-vz2c6", "Container": "microsoft-defender-publisher", "Capabilities": "NET_RAW, NET_ADMIN", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "retina-agent-cgv48", "Container": "retina", "Capabilities": "SYS_ADMIN, SYS_RESOURCE, NET_ADMIN, NET_RAW, IPC_LOCK", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "retina-agent-gjxk8", "Container": "retina", "Capabilities": "SYS_ADMIN, SYS_RESOURCE, NET_ADMIN, NET_RAW, IPC_LOCK", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "retina-agent-js76w", "Container": "retina", "Capabilities": "SYS_ADMIN, SYS_RESOURCE, NET_ADMIN, NET_RAW, IPC_LOCK", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "retina-agent-lfn7d", "Container": "retina", "Capabilities": "SYS_ADMIN, SYS_RESOURCE, NET_ADMIN, NET_RAW, IPC_LOCK", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "retina-agent-qc9bs", "Container": "retina", "Capabilities": "SYS_ADMIN, SYS_RESOURCE, NET_ADMIN, NET_RAW, IPC_LOCK", "Issue": "Added Linux capabilities" }, { "Namespace": "kube-system", "Pod": "retina-agent-wlt7b", "Container": "retina", "Capabilities": "SYS_ADMIN, SYS_RESOURCE, NET_ADMIN, NET_RAW, IPC_LOCK", "Issue": "Added Linux capabilities" } ] }, "AKSIAM001": { "ID": "AKSIAM001", "Severity": "High", "URL": "https://learn.microsoft.com/azure/aks/manage-azure-rbac?tabs=azure-cli", "FailMessage": "", "Name": "RBAC Enabled", "Recommendation": "RBAC Enabled is enabled.", "Status": "✅ PASS", "Category": "Identity & Access", "Total": 0, "Items": null }, "POD001": { "Total": 0, "URL": "https://kubernetes.io/docs/tasks/debug/debug-application/debug-running-pod/#application-crashes", "Name": "Pods with High Restarts", "Description": "Detects pods that have restarted more than the defined threshold.", "Recommendation": "Review logs and events for frequently restarting pods and address root causes such as crashes, missing configs, or failing probes.", "Weight": 3, "ID": "POD001", "Message": "No issues detected for Pods with High Restarts.", "ResourceKind": "Pod", "Section": "Pods", "Category": "Workloads", "Severity": "Warning", "Items": [] }, "SEC016": { "Total": 33, "URL": "https://kubernetes.io/docs/concepts/configuration/secret/", "Name": "Non-Existent Secret References", "Description": "Flags pods referencing Secrets that do not exist. This may cause runtime failures.", "Recommendation": "Verify that all Secrets referenced by pods exist in the target namespace.", "Weight": 4, "ID": "SEC016", "ResourceKind": "Pod", "Section": "Security", "Category": "Pod Security", "Severity": "High", "Items": [ { "Namespace": "aks-istio-system", "Pod": "istiod-asm-1-23-7744d5fbf4-9572m", "Volume": "cacerts", "Secret": "cacerts", "Issue": "Missing secret reference in volume" }, { "Namespace": "aks-istio-system", "Pod": "istiod-asm-1-23-7744d5fbf4-9572m", "Volume": "istio-kubeconfig", "Secret": "istio-kubeconfig", "Issue": "Missing secret reference in volume" }, { "Namespace": "aks-istio-system", "Pod": "istiod-asm-1-23-7744d5fbf4-9572m", "Volume": "istio-csr-dns-cert", "Secret": "istiod-tls", "Issue": "Missing secret reference in volume" }, { "Namespace": "aks-istio-system", "Pod": "istiod-asm-1-23-7744d5fbf4-rqzvt", "Volume": "cacerts", "Secret": "cacerts", "Issue": "Missing secret reference in volume" }, { "Namespace": "aks-istio-system", "Pod": "istiod-asm-1-23-7744d5fbf4-rqzvt", "Volume": "istio-kubeconfig", "Secret": "istio-kubeconfig", "Issue": "Missing secret reference in volume" }, { "Namespace": "aks-istio-system", "Pod": "istiod-asm-1-23-7744d5fbf4-rqzvt", "Volume": "istio-csr-dns-cert", "Secret": "istiod-tls", "Issue": "Missing secret reference in volume" }, { "Namespace": "argocd", "Pod": "argocd-application-controller-0", "Volume": "argocd-repo-server-tls", "Secret": "argocd-repo-server-tls", "Issue": "Missing secret reference in volume" }, { "Namespace": "argocd", "Pod": "argocd-applicationset-controller-6fdf84dbb6-msffz", "Volume": "argocd-repo-server-tls", "Secret": "argocd-repo-server-tls", "Issue": "Missing secret reference in volume" }, { "Namespace": "argocd", "Pod": "argocd-dex-server-556c76889-h4kxj", "Volume": "argocd-dex-server-tls", "Secret": "argocd-dex-server-tls", "Issue": "Missing secret reference in volume" }, { "Namespace": "argocd", "Pod": "argocd-notifications-controller-6ff6bf8dd6-nbktr", "Volume": "argocd-repo-server-tls", "Secret": "argocd-repo-server-tls", "Issue": "Missing secret reference in volume" }, { "Namespace": "argocd", "Pod": "argocd-repo-server-8568fc89b5-sx6ks", "Volume": "argocd-repo-server-tls", "Secret": "argocd-repo-server-tls", "Issue": "Missing secret reference in volume" }, { "Namespace": "argocd", "Pod": "argocd-repo-server-8568fc89b5-xrzzn", "Volume": "argocd-repo-server-tls", "Secret": "argocd-repo-server-tls", "Issue": "Missing secret reference in volume" }, { "Namespace": "argocd", "Pod": "argocd-server-54f9645b87-k4rz8", "Volume": "argocd-repo-server-tls", "Secret": "argocd-repo-server-tls", "Issue": "Missing secret reference in volume" }, { "Namespace": "argocd", "Pod": "argocd-server-54f9645b87-k4rz8", "Volume": "argocd-dex-server-tls", "Secret": "argocd-dex-server-tls", "Issue": "Missing secret reference in volume" }, { "Namespace": "argocd", "Pod": "argocd-server-54f9645b87-wwzgz", "Volume": "argocd-repo-server-tls", "Secret": "argocd-repo-server-tls", "Issue": "Missing secret reference in volume" }, { "Namespace": "argocd", "Pod": "argocd-server-54f9645b87-wwzgz", "Volume": "argocd-dex-server-tls", "Secret": "argocd-dex-server-tls", "Issue": "Missing secret reference in volume" }, { "Namespace": "kiali-operator", "Pod": "kiali-5b88cfb6f8-cm8dz", "Volume": "kiali-secret", "Secret": "kiali", "Issue": "Missing secret reference in volume" }, { "Namespace": "kube-system", "Pod": "ama-logs-4v8mz", "Volume": "ama-logs-adx-secret", "Secret": "ama-logs-adx-secret", "Issue": "Missing secret reference in volume" }, { "Namespace": "kube-system", "Pod": "ama-logs-5vr2w", "Volume": "ama-logs-adx-secret", "Secret": "ama-logs-adx-secret", "Issue": "Missing secret reference in volume" }, { "Namespace": "kube-system", "Pod": "ama-logs-fmd7b", "Volume": "ama-logs-adx-secret", "Secret": "ama-logs-adx-secret", "Issue": "Missing secret reference in volume" }, { "Namespace": "kube-system", "Pod": "ama-logs-fpkw6", "Volume": "ama-logs-adx-secret", "Secret": "ama-logs-adx-secret", "Issue": "Missing secret reference in volume" }, { "Namespace": "kube-system", "Pod": "ama-logs-gqs28", "Volume": "ama-logs-adx-secret", "Secret": "ama-logs-adx-secret", "Issue": "Missing secret reference in volume" }, { "Namespace": "kube-system", "Pod": "ama-logs-ndxrw", "Volume": "ama-logs-adx-secret", "Secret": "ama-logs-adx-secret", "Issue": "Missing secret reference in volume" }, { "Namespace": "kube-system", "Pod": "ama-logs-rs-64765bd4b9-ldxwl", "Volume": "ama-logs-adx-secret", "Secret": "ama-logs-adx-secret", "Issue": "Missing secret reference in volume" }, { "Namespace": "kube-system", "Pod": "ama-metrics-7f878d975f-hlggb", "Volume": "ama-metrics-tls-secret-volume", "Secret": "ama-metrics-mtls-secret", "Issue": "Missing secret reference in volume" }, { "Namespace": "kube-system", "Pod": "ama-metrics-7f878d975f-q2mlg", "Volume": "ama-metrics-tls-secret-volume", "Secret": "ama-metrics-mtls-secret", "Issue": "Missing secret reference in volume" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-2ssrw", "Volume": "ama-metrics-tls-secret-volume", "Secret": "ama-metrics-mtls-secret", "Issue": "Missing secret reference in volume" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-6kkz8", "Volume": "ama-metrics-tls-secret-volume", "Secret": "ama-metrics-mtls-secret", "Issue": "Missing secret reference in volume" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-9h44h", "Volume": "ama-metrics-tls-secret-volume", "Secret": "ama-metrics-mtls-secret", "Issue": "Missing secret reference in volume" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-lhk42", "Volume": "ama-metrics-tls-secret-volume", "Secret": "ama-metrics-mtls-secret", "Issue": "Missing secret reference in volume" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-nm5bf", "Volume": "ama-metrics-tls-secret-volume", "Secret": "ama-metrics-mtls-secret", "Issue": "Missing secret reference in volume" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-pqcz5", "Volume": "ama-metrics-tls-secret-volume", "Secret": "ama-metrics-mtls-secret", "Issue": "Missing secret reference in volume" }, { "Namespace": "kube-system", "Pod": "ama-metrics-operator-targets-66fb46c8d6-vskdg", "Volume": "ama-metrics-tls-secret-volume", "Secret": "ama-metrics-mtls-secret", "Issue": "Missing secret reference in volume" } ] }, "AKSIAM006": { "ID": "AKSIAM006", "Severity": "High", "URL": "https://learn.microsoft.com/azure/aks/manage-azure-rbac?tabs=azure-cli", "FailMessage": "", "Name": "AAD Managed Authentication Enabled", "Recommendation": "AAD Managed Authentication Enabled is enabled.", "Status": "✅ PASS", "Category": "Identity & Access", "Total": 0, "Items": null }, "AKSBP001": { "ID": "AKSBP001", "Severity": "High", "URL": "https://learn.microsoft.com/azure/aks/policy-reference", "FailMessage": "The 'Only Allowed Images' policy is either missing or not enforcing deny mode, increasing the risk of running untrusted images.", "Name": "Allowed Container Images Policy Enforcement", "Recommendation": "Deploy and enforce the 'Only Allowed Images' policy with deny mode to restrict unapproved images.", "Status": "❌ FAIL", "Category": "Best Practices", "Total": 1, "Items": { "Issue": "Deploy and enforce the 'Only Allowed Images' policy with deny mode to restrict unapproved images.", "Resource": "Allowed Container Images Policy Enforcement" } }, "SEC006": { "Total": 155, "URL": "https://kubernetes.io/docs/concepts/security/pod-security-standards/", "Name": "Pods Missing Secure Defaults", "Description": "Checks if pods are missing recommended securityContext fields such as runAsNonRoot, readOnlyRootFilesystem, or allowPrivilegeEscalation.\n", "Recommendation": "Set runAsNonRoot=true, readOnlyRootFilesystem=true, and allowPrivilegeEscalation=false for all pods and containers.\n", "Weight": 3, "ID": "SEC006", "ResourceKind": "Pod", "Section": "Security", "Category": "Pod Security", "Severity": "Medium", "Items": [ { "Namespace": "app-routing-system", "Pod": "nginx-69fcb489fd-4wgk9", "Container": "controller", "Flags": "runAsNonRoot: True, readOnlyRootFilesystem: , allowPrivilegeEscalation: False", "Issue": "Missing one or more secure defaults" }, { "Namespace": "app-routing-system", "Pod": "nginx-69fcb489fd-64v6k", "Container": "controller", "Flags": "runAsNonRoot: True, readOnlyRootFilesystem: , allowPrivilegeEscalation: False", "Issue": "Missing one or more secure defaults" }, { "Namespace": "argo-rollouts", "Pod": "simple-deployment-74fd649f8d-996vt", "Container": "webserver-simple", "Flags": "Missing securityContext", "Issue": "No securityContext defined" }, { "Namespace": "argo-workflows", "Pod": "simple-deployment-74fd649f8d-24t56", "Container": "webserver-simple", "Flags": "Missing securityContext", "Issue": "No securityContext defined" }, { "Namespace": "argocd", "Pod": "argocd-notifications-controller-6ff6bf8dd6-nbktr", "Container": "argocd-notifications-controller", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False", "Issue": "Missing one or more secure defaults" }, { "Namespace": "argocd", "Pod": "argocd-redis-ha-haproxy-fb657456c-kjbkq", "Container": "haproxy", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False", "Issue": "Missing one or more secure defaults" }, { "Namespace": "argocd", "Pod": "argocd-redis-ha-haproxy-fb657456c-kjlpf", "Container": "haproxy", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False", "Issue": "Missing one or more secure defaults" }, { "Namespace": "argocd", "Pod": "argocd-redis-ha-haproxy-fb657456c-tnjmb", "Container": "haproxy", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False", "Issue": "Missing one or more secure defaults" }, { "Namespace": "argocd", "Pod": "argocd-redis-ha-server-0", "Container": "redis", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False", "Issue": "Missing one or more secure defaults" }, { "Namespace": "argocd", "Pod": "argocd-redis-ha-server-0", "Container": "sentinel", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False", "Issue": "Missing one or more secure defaults" }, { "Namespace": "argocd", "Pod": "argocd-redis-ha-server-0", "Container": "split-brain-fix", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False", "Issue": "Missing one or more secure defaults" }, { "Namespace": "argocd", "Pod": "argocd-redis-ha-server-1", "Container": "redis", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False", "Issue": "Missing one or more secure defaults" }, { "Namespace": "argocd", "Pod": "argocd-redis-ha-server-1", "Container": "sentinel", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False", "Issue": "Missing one or more secure defaults" }, { "Namespace": "argocd", "Pod": "argocd-redis-ha-server-1", "Container": "split-brain-fix", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False", "Issue": "Missing one or more secure defaults" }, { "Namespace": "argocd", "Pod": "argocd-redis-ha-server-2", "Container": "redis", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False", "Issue": "Missing one or more secure defaults" }, { "Namespace": "argocd", "Pod": "argocd-redis-ha-server-2", "Container": "sentinel", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False", "Issue": "Missing one or more secure defaults" }, { "Namespace": "argocd", "Pod": "argocd-redis-ha-server-2", "Container": "split-brain-fix", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False", "Issue": "Missing one or more secure defaults" }, { "Namespace": "cert-manager", "Pod": "simple-deployment-74fd649f8d-7cht8", "Container": "webserver-simple", "Flags": "Missing securityContext", "Issue": "No securityContext defined" }, { "Namespace": "grafana", "Pod": "simple-deployment-74fd649f8d-l7wrd", "Container": "webserver-simple", "Flags": "Missing securityContext", "Issue": "No securityContext defined" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-2l2wl", "Container": "node-driver-registrar", "Flags": "Missing securityContext", "Issue": "No securityContext defined" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-2l2wl", "Container": "secrets-store", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-2l2wl", "Container": "liveness-probe", "Flags": "Missing securityContext", "Issue": "No securityContext defined" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-6w2vp", "Container": "node-driver-registrar", "Flags": "Missing securityContext", "Issue": "No securityContext defined" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-6w2vp", "Container": "secrets-store", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-6w2vp", "Container": "liveness-probe", "Flags": "Missing securityContext", "Issue": "No securityContext defined" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-7879c", "Container": "node-driver-registrar", "Flags": "Missing securityContext", "Issue": "No securityContext defined" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-7879c", "Container": "secrets-store", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-7879c", "Container": "liveness-probe", "Flags": "Missing securityContext", "Issue": "No securityContext defined" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-m8m29", "Container": "node-driver-registrar", "Flags": "Missing securityContext", "Issue": "No securityContext defined" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-m8m29", "Container": "secrets-store", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-m8m29", "Container": "liveness-probe", "Flags": "Missing securityContext", "Issue": "No securityContext defined" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-vnmcd", "Container": "node-driver-registrar", "Flags": "Missing securityContext", "Issue": "No securityContext defined" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-vnmcd", "Container": "secrets-store", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-vnmcd", "Container": "liveness-probe", "Flags": "Missing securityContext", "Issue": "No securityContext defined" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-zrfbz", "Container": "node-driver-registrar", "Flags": "Missing securityContext", "Issue": "No securityContext defined" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-zrfbz", "Container": "secrets-store", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-zrfbz", "Container": "liveness-probe", "Flags": "Missing securityContext", "Issue": "No securityContext defined" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-provider-azure-68nhw", "Container": "provider-azure-installer", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-provider-azure-7bqmn", "Container": "provider-azure-installer", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-provider-azure-7r458", "Container": "provider-azure-installer", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-provider-azure-k9tdc", "Container": "provider-azure-installer", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-provider-azure-n952g", "Container": "provider-azure-installer", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-provider-azure-njpqh", "Container": "provider-azure-installer", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "ama-logs-4v8mz", "Container": "ama-logs", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "ama-logs-4v8mz", "Container": "ama-logs-prometheus", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "ama-logs-5vr2w", "Container": "ama-logs", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "ama-logs-5vr2w", "Container": "ama-logs-prometheus", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "ama-logs-fmd7b", "Container": "ama-logs", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "ama-logs-fmd7b", "Container": "ama-logs-prometheus", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "ama-logs-fpkw6", "Container": "ama-logs", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "ama-logs-fpkw6", "Container": "ama-logs-prometheus", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "ama-logs-gqs28", "Container": "ama-logs", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "ama-logs-gqs28", "Container": "ama-logs-prometheus", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "ama-logs-ndxrw", "Container": "ama-logs", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "ama-logs-ndxrw", "Container": "ama-logs-prometheus", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "ama-logs-rs-64765bd4b9-ldxwl", "Container": "ama-logs", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "ama-metrics-7f878d975f-hlggb", "Container": "prometheus-collector", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "ama-metrics-7f878d975f-hlggb", "Container": "addon-token-adapter", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "ama-metrics-7f878d975f-q2mlg", "Container": "prometheus-collector", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "ama-metrics-7f878d975f-q2mlg", "Container": "addon-token-adapter", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "ama-metrics-ksm-5bd68b9c-8l9lp", "Container": "ama-metrics-ksm", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-2ssrw", "Container": "prometheus-collector", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-2ssrw", "Container": "addon-token-adapter", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-6kkz8", "Container": "prometheus-collector", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-6kkz8", "Container": "addon-token-adapter", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-9h44h", "Container": "prometheus-collector", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-9h44h", "Container": "addon-token-adapter", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-lhk42", "Container": "prometheus-collector", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-lhk42", "Container": "addon-token-adapter", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-nm5bf", "Container": "prometheus-collector", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-nm5bf", "Container": "addon-token-adapter", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-pqcz5", "Container": "prometheus-collector", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-pqcz5", "Container": "addon-token-adapter", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "ama-metrics-operator-targets-66fb46c8d6-vskdg", "Container": "targetallocator", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "ama-metrics-operator-targets-66fb46c8d6-vskdg", "Container": "config-reader", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "azure-ip-masq-agent-4522j", "Container": "azure-ip-masq-agent", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "azure-ip-masq-agent-4c7cr", "Container": "azure-ip-masq-agent", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "azure-ip-masq-agent-78rnw", "Container": "azure-ip-masq-agent", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "azure-ip-masq-agent-84ltn", "Container": "azure-ip-masq-agent", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "azure-ip-masq-agent-t4c2w", "Container": "azure-ip-masq-agent", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "azure-ip-masq-agent-vbdd8", "Container": "azure-ip-masq-agent", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "azure-npm-jsbbh", "Container": "azure-npm", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "azure-npm-lp6sf", "Container": "azure-npm", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "azure-npm-nv6xx", "Container": "azure-npm", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "azure-npm-p6fpw", "Container": "azure-npm", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "azure-npm-vsrfp", "Container": "azure-npm", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "azure-npm-z8mcz", "Container": "azure-npm", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "azure-policy-698f7c86b4-nnff2", "Container": "azure-policy", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "cloud-node-manager-57rk2", "Container": "cloud-node-manager", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "cloud-node-manager-gl5xl", "Container": "cloud-node-manager", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "cloud-node-manager-l7v5j", "Container": "cloud-node-manager", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "cloud-node-manager-lr49d", "Container": "cloud-node-manager", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "cloud-node-manager-n5qdr", "Container": "cloud-node-manager", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "cloud-node-manager-xwrrd", "Container": "cloud-node-manager", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "coredns-658d6d767d-757xp", "Container": "coredns", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "coredns-658d6d767d-pt6l6", "Container": "coredns", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "coredns-autoscaler-5955d6bbdb-mz9kn", "Container": "autoscaler", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "extension-agent-66c4486d68-46cqq", "Container": "extension-agent", "Flags": "Missing securityContext", "Issue": "No securityContext defined" }, { "Namespace": "kube-system", "Pod": "extension-agent-66c4486d68-46cqq", "Container": "fluent-bit", "Flags": "Missing securityContext", "Issue": "No securityContext defined" }, { "Namespace": "kube-system", "Pod": "extension-operator-d95fd449b-ssrcx", "Container": "manager", "Flags": "Missing securityContext", "Issue": "No securityContext defined" }, { "Namespace": "kube-system", "Pod": "extension-operator-d95fd449b-ssrcx", "Container": "fluent-bit", "Flags": "Missing securityContext", "Issue": "No securityContext defined" }, { "Namespace": "kube-system", "Pod": "keda-admission-webhooks-787f866c7c-4b64k", "Container": "keda-admission-webhooks", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "keda-admission-webhooks-787f866c7c-dw2sg", "Container": "keda-admission-webhooks", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "keda-operator-6b85944bfb-4zpbp", "Container": "keda-operator", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "keda-operator-6b85944bfb-sx9sj", "Container": "keda-operator", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "keda-operator-metrics-apiserver-8468875db7-86c5h", "Container": "keda-operator-metrics-apiserver", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "keda-operator-metrics-apiserver-8468875db7-ngp4h", "Container": "keda-operator-metrics-apiserver", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: True, allowPrivilegeEscalation: False", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "konnectivity-agent-9f65c5cd8-fzm5q", "Container": "konnectivity-agent", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "konnectivity-agent-9f65c5cd8-t9qdj", "Container": "konnectivity-agent", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "konnectivity-agent-autoscaler-cdfc7c46-vct7p", "Container": "autoscaler", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "kube-proxy-26xkd", "Container": "kube-proxy", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "kube-proxy-6mrql", "Container": "kube-proxy", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "kube-proxy-9rbxf", "Container": "kube-proxy", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "kube-proxy-njzgk", "Container": "kube-proxy", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "kube-proxy-rvmxl", "Container": "kube-proxy", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "kube-proxy-vp7xj", "Container": "kube-proxy", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-6xdfq", "Container": "microsoft-defender-pod-collector", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-6xdfq", "Container": "microsoft-defender-low-level-collector", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-89l74", "Container": "microsoft-defender-pod-collector", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-89l74", "Container": "microsoft-defender-low-level-collector", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-d7gwk", "Container": "microsoft-defender-pod-collector", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-d7gwk", "Container": "microsoft-defender-low-level-collector", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-mdcs8", "Container": "microsoft-defender-pod-collector", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-mdcs8", "Container": "microsoft-defender-low-level-collector", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-q6d6c", "Container": "microsoft-defender-pod-collector", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-q6d6c", "Container": "microsoft-defender-low-level-collector", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-wb5dm", "Container": "microsoft-defender-pod-collector", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-wb5dm", "Container": "microsoft-defender-low-level-collector", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-misc-7df6776447-bcbph", "Container": "microsoft-defender-pod-collector", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-2ql5b", "Container": "microsoft-defender-publisher", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-2rsrw", "Container": "microsoft-defender-publisher", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-jj6dh", "Container": "microsoft-defender-publisher", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-l5crs", "Container": "microsoft-defender-publisher", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-lfk8h", "Container": "microsoft-defender-publisher", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-vz2c6", "Container": "microsoft-defender-publisher", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "retina-agent-cgv48", "Container": "retina", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "retina-agent-gjxk8", "Container": "retina", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "retina-agent-js76w", "Container": "retina", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "retina-agent-lfn7d", "Container": "retina", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "retina-agent-qc9bs", "Container": "retina", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "retina-agent-wlt7b", "Container": "retina", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "vpa-admission-controller-7d9f8d57bd-lrcch", "Container": "admission-controller", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "vpa-admission-controller-7d9f8d57bd-tnqvx", "Container": "admission-controller", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "vpa-recommender-74bfff7f75-sspdc", "Container": "recommender", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kube-system", "Pod": "vpa-updater-5d6d49f8b6-pxkz8", "Container": "updater", "Flags": "runAsNonRoot: , readOnlyRootFilesystem: , allowPrivilegeEscalation: ", "Issue": "Missing one or more secure defaults" }, { "Namespace": "kubeview", "Pod": "simple-deployment-74fd649f8d-qxp2r", "Container": "webserver-simple", "Flags": "Missing securityContext", "Issue": "No securityContext defined" }, { "Namespace": "linkerd", "Pod": "simple-deployment-74fd649f8d-mkmst", "Container": "webserver-simple", "Flags": "Missing securityContext", "Issue": "No securityContext defined" }, { "Namespace": "nginx", "Pod": "simple-deployment-74fd649f8d-hlcdk", "Container": "webserver-simple", "Flags": "Missing securityContext", "Issue": "No securityContext defined" }, { "Namespace": "pets", "Pod": "order-service-6c5bfb6946-b58xq", "Container": "order-service", "Flags": "Missing securityContext", "Issue": "No securityContext defined" }, { "Namespace": "pets", "Pod": "product-service-5dd87dfb8-ssfxc", "Container": "product-service", "Flags": "Missing securityContext", "Issue": "No securityContext defined" }, { "Namespace": "pets", "Pod": "rabbitmq-0", "Container": "rabbitmq", "Flags": "Missing securityContext", "Issue": "No securityContext defined" }, { "Namespace": "pets", "Pod": "store-front-658994fd95-pk9qn", "Container": "store-front", "Flags": "Missing securityContext", "Issue": "No securityContext defined" }, { "Namespace": "prometheus", "Pod": "simple-deployment-74fd649f8d-2x6w5", "Container": "webserver-simple", "Flags": "Missing securityContext", "Issue": "No securityContext defined" }, { "Namespace": "sealed-secrets", "Pod": "simple-deployment-74fd649f8d-stktp", "Container": "webserver-simple", "Flags": "Missing securityContext", "Issue": "No securityContext defined" }, { "Namespace": "test", "Pod": "simple-deployment-74fd649f8d-lhlkx", "Container": "webserver-simple", "Flags": "Missing securityContext", "Issue": "No securityContext defined" } ] }, "PVC001": { "Total": 0, "URL": "https://kubernetes.io/docs/concepts/storage/persistent-volumes/", "Name": "Unused Persistent Volume Claims", "Description": "Detects PVCs not attached to any pod.", "Recommendation": "Review and delete unused PVCs to reclaim storage.", "Weight": 2, "ID": "PVC001", "Message": "No issues detected for Unused Persistent Volume Claims.", "ResourceKind": "PersistentVolumeClaim", "Section": "Storage", "Category": "Volumes", "Severity": "Medium", "Items": [] }, "RBAC001": { "Total": 10, "URL": "https://kubernetes.io/docs/reference/access-authn-authz/rbac/", "Name": "RBAC Misconfigurations", "Description": "Detects invalid roleRefs, missing roles, orphaned service accounts, and incorrect subject namespaces in RoleBindings and ClusterRoleBindings.", "Recommendation": "Fix missing roleRefs, service accounts, and invalid namespaces in RoleBindings and ClusterRoleBindings.", "Weight": 4, "ID": "RBAC001", "ResourceKind": "ClusterRoleBinding", "Section": "Security", "Category": "RBAC", "Severity": "High", "Items": [ { "Namespace": "kube-system", "Resource": "RoleBinding/system::leader-locking-kube-controller-manager", "Value": "ServiceAccount/kube-controller-manager", "Message": "ServiceAccount not found" }, { "Namespace": "kube-system", "Resource": "RoleBinding/system::leader-locking-kube-scheduler", "Value": "ServiceAccount/kube-scheduler", "Message": "ServiceAccount not found" }, { "Namespace": "kube-system", "Resource": "RoleBinding/system:controller:cloud-provider", "Value": "ServiceAccount/cloud-provider", "Message": "ServiceAccount not found" }, { "Namespace": "aks-istio-system", "Resource": "ClusterRoleBinding/istio-reader-clusterrole-asm-1-23-aks-istio-system", "Value": "ServiceAccount/istio-reader-service-account", "Message": "ServiceAccount not found" }, { "Namespace": "kube-system", "Resource": "ClusterRoleBinding/secretproviderrotation-rolebinding", "Value": "ServiceAccount/secrets-store-csi-driver", "Message": "ServiceAccount not found" }, { "Namespace": "kube-system", "Resource": "ClusterRoleBinding/system:azure-cloud-provider", "Value": "ServiceAccount/azure-cloud-provider", "Message": "ServiceAccount not found" }, { "Namespace": "kube-system", "Resource": "ClusterRoleBinding/system:azure-cloud-provider-secret-getter", "Value": "ServiceAccount/azure-cloud-provider", "Message": "ServiceAccount not found" }, { "Namespace": "kube-system", "Resource": "ClusterRoleBinding/system:controller:route-controller", "Value": "ServiceAccount/route-controller", "Message": "ServiceAccount not found" }, { "Namespace": "kube-system", "Resource": "ClusterRoleBinding/system:controller:service-controller", "Value": "ServiceAccount/service-controller", "Message": "ServiceAccount not found" }, { "Namespace": "kube-system", "Resource": "ClusterRoleBinding/system:kube-dns", "Value": "ServiceAccount/kube-dns", "Message": "ServiceAccount not found" } ] }, "POD002": { "Total": 0, "URL": "https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#pod-phase", "Name": "Long Running Pods", "Description": "Flags pods that have been running longer than configured thresholds.", "Recommendation": "Review long-running pods and determine if they should be restarted or replaced by updated deployments.", "Weight": 2, "ID": "POD002", "Message": "No issues detected for Long Running Pods.", "ResourceKind": "Pod", "Section": "Pods", "Category": "Workloads", "Severity": "Warning", "Items": [] }, "NET004": { "Total": 16, "URL": "https://kubernetes.io/docs/concepts/services-networking/network-policies/", "Name": "Namespace Missing Network Policy", "Description": "Detects namespaces that have running pods but no associated NetworkPolicy resources. This could allow unrestricted pod-to-pod communication.\n", "Recommendation": "Apply a default deny-all ingress/egress NetworkPolicy in each namespace that hosts workloads, then selectively allow traffic as needed.\n", "Weight": 3, "ID": "NET004", "ResourceKind": "Namespace", "Section": "Networking", "Category": "Security", "Severity": "Medium", "Items": [ { "Namespace": "aks-istio-ingress", "Pods": 2, "Policies": 0, "Issue": "No NetworkPolicy in active namespace" }, { "Namespace": "aks-istio-system", "Pods": 2, "Policies": 0, "Issue": "No NetworkPolicy in active namespace" }, { "Namespace": "app-routing-system", "Pods": 2, "Policies": 0, "Issue": "No NetworkPolicy in active namespace" }, { "Namespace": "argo-rollouts", "Pods": 1, "Policies": 0, "Issue": "No NetworkPolicy in active namespace" }, { "Namespace": "argo-workflows", "Pods": 1, "Policies": 0, "Issue": "No NetworkPolicy in active namespace" }, { "Namespace": "cert-manager", "Pods": 1, "Policies": 0, "Issue": "No NetworkPolicy in active namespace" }, { "Namespace": "gatekeeper-system", "Pods": 3, "Policies": 0, "Issue": "No NetworkPolicy in active namespace" }, { "Namespace": "grafana", "Pods": 1, "Policies": 0, "Issue": "No NetworkPolicy in active namespace" }, { "Namespace": "kiali-operator", "Pods": 2, "Policies": 0, "Issue": "No NetworkPolicy in active namespace" }, { "Namespace": "kubeview", "Pods": 1, "Policies": 0, "Issue": "No NetworkPolicy in active namespace" }, { "Namespace": "linkerd", "Pods": 1, "Policies": 0, "Issue": "No NetworkPolicy in active namespace" }, { "Namespace": "nginx", "Pods": 1, "Policies": 0, "Issue": "No NetworkPolicy in active namespace" }, { "Namespace": "pets", "Pods": 4, "Policies": 0, "Issue": "No NetworkPolicy in active namespace" }, { "Namespace": "prometheus", "Pods": 1, "Policies": 0, "Issue": "No NetworkPolicy in active namespace" }, { "Namespace": "sealed-secrets", "Pods": 1, "Policies": 0, "Issue": "No NetworkPolicy in active namespace" }, { "Namespace": "test", "Pods": 1, "Policies": 0, "Issue": "No NetworkPolicy in active namespace" } ] }, "AKSBP005": { "ID": "AKSBP005", "Severity": "Medium", "URL": "https://learn.microsoft.com/azure/aks/concepts-storage#ephemeral-os-disk", "FailMessage": "", "Name": "Ephemeral OS Disks Enabled", "Recommendation": "Ephemeral OS Disks Enabled is enabled.", "Status": "✅ PASS", "Category": "Best Practices", "Total": 0, "Items": null }, "SEC014": { "Total": 180, "URL": "https://kubernetes.io/docs/concepts/containers/images/", "Name": "Untrusted Image Registries", "Description": "Flags images that are not pulled from approved registries.\n", "Recommendation": "Use only trusted registries. Restrict deployment sources via policy.", "Weight": 3, "ID": "SEC014", "ResourceKind": "Pod", "Section": "Security", "Category": "Pod Security", "Severity": "High", "Items": [ { "Namespace": "aks-istio-ingress", "Pod": "aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-hdfn4", "Container": "istio-proxy", "Image": "mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless", "Issue": "Image from untrusted registry" }, { "Namespace": "aks-istio-ingress", "Pod": "aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-zqwtb", "Container": "istio-proxy", "Image": "mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless", "Issue": "Image from untrusted registry" }, { "Namespace": "aks-istio-system", "Pod": "istiod-asm-1-23-7744d5fbf4-9572m", "Container": "discovery", "Image": "mcr.microsoft.com/oss/istio/pilot:1.23.5-distroless", "Issue": "Image from untrusted registry" }, { "Namespace": "aks-istio-system", "Pod": "istiod-asm-1-23-7744d5fbf4-rqzvt", "Container": "discovery", "Image": "mcr.microsoft.com/oss/istio/pilot:1.23.5-distroless", "Issue": "Image from untrusted registry" }, { "Namespace": "app-routing-system", "Pod": "nginx-69fcb489fd-4wgk9", "Container": "controller", "Image": "mcr.microsoft.com/oss/kubernetes/ingress/nginx-ingress-controller:v1.11.5", "Issue": "Image from untrusted registry" }, { "Namespace": "app-routing-system", "Pod": "nginx-69fcb489fd-64v6k", "Container": "controller", "Image": "mcr.microsoft.com/oss/kubernetes/ingress/nginx-ingress-controller:v1.11.5", "Issue": "Image from untrusted registry" }, { "Namespace": "argo-rollouts", "Pod": "simple-deployment-74fd649f8d-996vt", "Container": "webserver-simple", "Image": "docker.io/kostiscodefresh/gitops-simple-app:v1.0", "Issue": "Image from untrusted registry" }, { "Namespace": "argo-workflows", "Pod": "simple-deployment-74fd649f8d-24t56", "Container": "webserver-simple", "Image": "docker.io/kostiscodefresh/gitops-simple-app:v1.0", "Issue": "Image from untrusted registry" }, { "Namespace": "argocd", "Pod": "argocd-application-controller-0", "Container": "argocd-application-controller", "Image": "mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1", "Issue": "Image from untrusted registry" }, { "Namespace": "argocd", "Pod": "argocd-applicationset-controller-6fdf84dbb6-msffz", "Container": "argocd-applicationset-controller", "Image": "mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1", "Issue": "Image from untrusted registry" }, { "Namespace": "argocd", "Pod": "argocd-dex-server-556c76889-h4kxj", "Container": "dex", "Image": "mcr.microsoft.com/oss/v2/dexidp/dex:v2.41.1", "Issue": "Image from untrusted registry" }, { "Namespace": "argocd", "Pod": "argocd-notifications-controller-6ff6bf8dd6-nbktr", "Container": "argocd-notifications-controller", "Image": "mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1", "Issue": "Image from untrusted registry" }, { "Namespace": "argocd", "Pod": "argocd-redis-ha-haproxy-fb657456c-kjbkq", "Container": "haproxy", "Image": "mcr.microsoft.com/oss/v2/haproxy/haproxy:v2.9.11", "Issue": "Image from untrusted registry" }, { "Namespace": "argocd", "Pod": "argocd-redis-ha-haproxy-fb657456c-kjlpf", "Container": "haproxy", "Image": "mcr.microsoft.com/oss/v2/haproxy/haproxy:v2.9.11", "Issue": "Image from untrusted registry" }, { "Namespace": "argocd", "Pod": "argocd-redis-ha-haproxy-fb657456c-tnjmb", "Container": "haproxy", "Image": "mcr.microsoft.com/oss/v2/haproxy/haproxy:v2.9.11", "Issue": "Image from untrusted registry" }, { "Namespace": "argocd", "Pod": "argocd-redis-ha-server-0", "Container": "redis", "Image": "mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7", "Issue": "Image from untrusted registry" }, { "Namespace": "argocd", "Pod": "argocd-redis-ha-server-0", "Container": "sentinel", "Image": "mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7", "Issue": "Image from untrusted registry" }, { "Namespace": "argocd", "Pod": "argocd-redis-ha-server-0", "Container": "split-brain-fix", "Image": "mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7", "Issue": "Image from untrusted registry" }, { "Namespace": "argocd", "Pod": "argocd-redis-ha-server-1", "Container": "redis", "Image": "mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7", "Issue": "Image from untrusted registry" }, { "Namespace": "argocd", "Pod": "argocd-redis-ha-server-1", "Container": "sentinel", "Image": "mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7", "Issue": "Image from untrusted registry" }, { "Namespace": "argocd", "Pod": "argocd-redis-ha-server-1", "Container": "split-brain-fix", "Image": "mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7", "Issue": "Image from untrusted registry" }, { "Namespace": "argocd", "Pod": "argocd-redis-ha-server-2", "Container": "redis", "Image": "mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7", "Issue": "Image from untrusted registry" }, { "Namespace": "argocd", "Pod": "argocd-redis-ha-server-2", "Container": "sentinel", "Image": "mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7", "Issue": "Image from untrusted registry" }, { "Namespace": "argocd", "Pod": "argocd-redis-ha-server-2", "Container": "split-brain-fix", "Image": "mcr.microsoft.com/oss/v2/valkey-io/valkey:v7.2.7", "Issue": "Image from untrusted registry" }, { "Namespace": "argocd", "Pod": "argocd-repo-server-8568fc89b5-sx6ks", "Container": "argocd-repo-server", "Image": "mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1", "Issue": "Image from untrusted registry" }, { "Namespace": "argocd", "Pod": "argocd-repo-server-8568fc89b5-xrzzn", "Container": "argocd-repo-server", "Image": "mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1", "Issue": "Image from untrusted registry" }, { "Namespace": "argocd", "Pod": "argocd-server-54f9645b87-k4rz8", "Container": "argocd-server", "Image": "mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1", "Issue": "Image from untrusted registry" }, { "Namespace": "argocd", "Pod": "argocd-server-54f9645b87-wwzgz", "Container": "argocd-server", "Image": "mcr.microsoft.com/oss/v2/argoproj/argocd:v3.0.0-rc.3-1", "Issue": "Image from untrusted registry" }, { "Namespace": "cert-manager", "Pod": "simple-deployment-74fd649f8d-7cht8", "Container": "webserver-simple", "Image": "docker.io/kostiscodefresh/gitops-simple-app:v1.0", "Issue": "Image from untrusted registry" }, { "Namespace": "gatekeeper-system", "Pod": "gatekeeper-audit-77858c8f69-7k782", "Container": "gatekeeper-audit-container", "Image": "mcr.microsoft.com/oss/v2/open-policy-agent/gatekeeper:v3.18.2-1", "Issue": "Image from untrusted registry" }, { "Namespace": "gatekeeper-system", "Pod": "gatekeeper-controller-6f97954b4b-7tbnr", "Container": "gatekeeper-controller-container", "Image": "mcr.microsoft.com/oss/v2/open-policy-agent/gatekeeper:v3.18.2-1", "Issue": "Image from untrusted registry" }, { "Namespace": "gatekeeper-system", "Pod": "gatekeeper-controller-6f97954b4b-gwrgg", "Container": "gatekeeper-controller-container", "Image": "mcr.microsoft.com/oss/v2/open-policy-agent/gatekeeper:v3.18.2-1", "Issue": "Image from untrusted registry" }, { "Namespace": "grafana", "Pod": "simple-deployment-74fd649f8d-l7wrd", "Container": "webserver-simple", "Image": "docker.io/kostiscodefresh/gitops-simple-app:v1.0", "Issue": "Image from untrusted registry" }, { "Namespace": "kiali-operator", "Pod": "kiali-5b88cfb6f8-cm8dz", "Container": "kiali", "Image": "quay.io/kiali/kiali:v2.7.1", "Issue": "Image from untrusted registry" }, { "Namespace": "kiali-operator", "Pod": "kiali-operator-696bd54db-mr8md", "Container": "operator", "Image": "quay.io/kiali/kiali-operator:v2.7.1", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-2l2wl", "Container": "node-driver-registrar", "Image": "mcr.microsoft.com/oss/kubernetes-csi/csi-node-driver-registrar:v2.11.1", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-2l2wl", "Container": "secrets-store", "Image": "mcr.microsoft.com/oss/kubernetes-csi/secrets-store/driver:v1.4.8", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-2l2wl", "Container": "liveness-probe", "Image": "mcr.microsoft.com/oss/kubernetes-csi/livenessprobe:v2.13.1", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-6w2vp", "Container": "node-driver-registrar", "Image": "mcr.microsoft.com/oss/kubernetes-csi/csi-node-driver-registrar:v2.11.1", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-6w2vp", "Container": "secrets-store", "Image": "mcr.microsoft.com/oss/kubernetes-csi/secrets-store/driver:v1.4.8", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-6w2vp", "Container": "liveness-probe", "Image": "mcr.microsoft.com/oss/kubernetes-csi/livenessprobe:v2.13.1", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-7879c", "Container": "node-driver-registrar", "Image": "mcr.microsoft.com/oss/kubernetes-csi/csi-node-driver-registrar:v2.11.1", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-7879c", "Container": "secrets-store", "Image": "mcr.microsoft.com/oss/kubernetes-csi/secrets-store/driver:v1.4.8", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-7879c", "Container": "liveness-probe", "Image": "mcr.microsoft.com/oss/kubernetes-csi/livenessprobe:v2.13.1", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-m8m29", "Container": "node-driver-registrar", "Image": "mcr.microsoft.com/oss/kubernetes-csi/csi-node-driver-registrar:v2.11.1", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-m8m29", "Container": "secrets-store", "Image": "mcr.microsoft.com/oss/kubernetes-csi/secrets-store/driver:v1.4.8", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-m8m29", "Container": "liveness-probe", "Image": "mcr.microsoft.com/oss/kubernetes-csi/livenessprobe:v2.13.1", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-vnmcd", "Container": "node-driver-registrar", "Image": "mcr.microsoft.com/oss/kubernetes-csi/csi-node-driver-registrar:v2.11.1", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-vnmcd", "Container": "secrets-store", "Image": "mcr.microsoft.com/oss/kubernetes-csi/secrets-store/driver:v1.4.8", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-vnmcd", "Container": "liveness-probe", "Image": "mcr.microsoft.com/oss/kubernetes-csi/livenessprobe:v2.13.1", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-zrfbz", "Container": "node-driver-registrar", "Image": "mcr.microsoft.com/oss/kubernetes-csi/csi-node-driver-registrar:v2.11.1", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-zrfbz", "Container": "secrets-store", "Image": "mcr.microsoft.com/oss/kubernetes-csi/secrets-store/driver:v1.4.8", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-zrfbz", "Container": "liveness-probe", "Image": "mcr.microsoft.com/oss/kubernetes-csi/livenessprobe:v2.13.1", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-provider-azure-68nhw", "Container": "provider-azure-installer", "Image": "mcr.microsoft.com/oss/azure/secrets-store/provider-azure:v1.6.2", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-provider-azure-7bqmn", "Container": "provider-azure-installer", "Image": "mcr.microsoft.com/oss/azure/secrets-store/provider-azure:v1.6.2", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-provider-azure-7r458", "Container": "provider-azure-installer", "Image": "mcr.microsoft.com/oss/azure/secrets-store/provider-azure:v1.6.2", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-provider-azure-k9tdc", "Container": "provider-azure-installer", "Image": "mcr.microsoft.com/oss/azure/secrets-store/provider-azure:v1.6.2", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-provider-azure-n952g", "Container": "provider-azure-installer", "Image": "mcr.microsoft.com/oss/azure/secrets-store/provider-azure:v1.6.2", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-provider-azure-njpqh", "Container": "provider-azure-installer", "Image": "mcr.microsoft.com/oss/azure/secrets-store/provider-azure:v1.6.2", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "ama-logs-4v8mz", "Container": "ama-logs", "Image": "mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "ama-logs-4v8mz", "Container": "ama-logs-prometheus", "Image": "mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "ama-logs-5vr2w", "Container": "ama-logs", "Image": "mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "ama-logs-5vr2w", "Container": "ama-logs-prometheus", "Image": "mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "ama-logs-fmd7b", "Container": "ama-logs", "Image": "mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "ama-logs-fmd7b", "Container": "ama-logs-prometheus", "Image": "mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "ama-logs-fpkw6", "Container": "ama-logs", "Image": "mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "ama-logs-fpkw6", "Container": "ama-logs-prometheus", "Image": "mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "ama-logs-gqs28", "Container": "ama-logs", "Image": "mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "ama-logs-gqs28", "Container": "ama-logs-prometheus", "Image": "mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "ama-logs-ndxrw", "Container": "ama-logs", "Image": "mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "ama-logs-ndxrw", "Container": "ama-logs-prometheus", "Image": "mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "ama-logs-rs-64765bd4b9-ldxwl", "Container": "ama-logs", "Image": "mcr.microsoft.com/azuremonitor/containerinsights/ciprod:3.1.26", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "ama-metrics-7f878d975f-hlggb", "Container": "prometheus-collector", "Image": "mcr.microsoft.com/azuremonitor/containerinsights/ciprod/prometheus-collector/images:6.15.0-main-02-21-2025-4acb2b4c", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "ama-metrics-7f878d975f-hlggb", "Container": "addon-token-adapter", "Image": "mcr.microsoft.com/aks/msi/addon-token-adapter:master.250224.1", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "ama-metrics-7f878d975f-q2mlg", "Container": "prometheus-collector", "Image": "mcr.microsoft.com/azuremonitor/containerinsights/ciprod/prometheus-collector/images:6.15.0-main-02-21-2025-4acb2b4c", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "ama-metrics-7f878d975f-q2mlg", "Container": "addon-token-adapter", "Image": "mcr.microsoft.com/aks/msi/addon-token-adapter:master.250224.1", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "ama-metrics-ksm-5bd68b9c-8l9lp", "Container": "ama-metrics-ksm", "Image": "mcr.microsoft.com/oss/kubernetes/kube-state-metrics:v2.12.0", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-2ssrw", "Container": "prometheus-collector", "Image": "mcr.microsoft.com/azuremonitor/containerinsights/ciprod/prometheus-collector/images:6.15.0-main-02-21-2025-4acb2b4c", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-2ssrw", "Container": "addon-token-adapter", "Image": "mcr.microsoft.com/aks/msi/addon-token-adapter:master.250224.1", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-6kkz8", "Container": "prometheus-collector", "Image": "mcr.microsoft.com/azuremonitor/containerinsights/ciprod/prometheus-collector/images:6.15.0-main-02-21-2025-4acb2b4c", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-6kkz8", "Container": "addon-token-adapter", "Image": "mcr.microsoft.com/aks/msi/addon-token-adapter:master.250224.1", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-9h44h", "Container": "prometheus-collector", "Image": "mcr.microsoft.com/azuremonitor/containerinsights/ciprod/prometheus-collector/images:6.15.0-main-02-21-2025-4acb2b4c", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-9h44h", "Container": "addon-token-adapter", "Image": "mcr.microsoft.com/aks/msi/addon-token-adapter:master.250224.1", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-lhk42", "Container": "prometheus-collector", "Image": "mcr.microsoft.com/azuremonitor/containerinsights/ciprod/prometheus-collector/images:6.15.0-main-02-21-2025-4acb2b4c", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-lhk42", "Container": "addon-token-adapter", "Image": "mcr.microsoft.com/aks/msi/addon-token-adapter:master.250224.1", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-nm5bf", "Container": "prometheus-collector", "Image": "mcr.microsoft.com/azuremonitor/containerinsights/ciprod/prometheus-collector/images:6.15.0-main-02-21-2025-4acb2b4c", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-nm5bf", "Container": "addon-token-adapter", "Image": "mcr.microsoft.com/aks/msi/addon-token-adapter:master.250224.1", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-pqcz5", "Container": "prometheus-collector", "Image": "mcr.microsoft.com/azuremonitor/containerinsights/ciprod/prometheus-collector/images:6.15.0-main-02-21-2025-4acb2b4c", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "ama-metrics-node-pqcz5", "Container": "addon-token-adapter", "Image": "mcr.microsoft.com/aks/msi/addon-token-adapter:master.250224.1", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "ama-metrics-operator-targets-66fb46c8d6-vskdg", "Container": "targetallocator", "Image": "mcr.microsoft.com/azuremonitor/containerinsights/ciprod/prometheus-collector/images:6.15.0-main-02-21-2025-4acb2b4c-targetallocator", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "ama-metrics-operator-targets-66fb46c8d6-vskdg", "Container": "config-reader", "Image": "mcr.microsoft.com/azuremonitor/containerinsights/ciprod/prometheus-collector/images:6.15.0-main-02-21-2025-4acb2b4c-cfg", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "azure-ip-masq-agent-4522j", "Container": "azure-ip-masq-agent", "Image": "mcr.microsoft.com/oss/v2/azure/ip-masq-agent-v2:v0.1.15-2", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "azure-ip-masq-agent-4c7cr", "Container": "azure-ip-masq-agent", "Image": "mcr.microsoft.com/oss/v2/azure/ip-masq-agent-v2:v0.1.15-2", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "azure-ip-masq-agent-78rnw", "Container": "azure-ip-masq-agent", "Image": "mcr.microsoft.com/oss/v2/azure/ip-masq-agent-v2:v0.1.15-2", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "azure-ip-masq-agent-84ltn", "Container": "azure-ip-masq-agent", "Image": "mcr.microsoft.com/oss/v2/azure/ip-masq-agent-v2:v0.1.15-2", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "azure-ip-masq-agent-t4c2w", "Container": "azure-ip-masq-agent", "Image": "mcr.microsoft.com/oss/v2/azure/ip-masq-agent-v2:v0.1.15-2", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "azure-ip-masq-agent-vbdd8", "Container": "azure-ip-masq-agent", "Image": "mcr.microsoft.com/oss/v2/azure/ip-masq-agent-v2:v0.1.15-2", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "azure-npm-jsbbh", "Container": "azure-npm", "Image": "mcr.microsoft.com/containernetworking/azure-npm:v1.5.45", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "azure-npm-lp6sf", "Container": "azure-npm", "Image": "mcr.microsoft.com/containernetworking/azure-npm:v1.5.45", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "azure-npm-nv6xx", "Container": "azure-npm", "Image": "mcr.microsoft.com/containernetworking/azure-npm:v1.5.45", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "azure-npm-p6fpw", "Container": "azure-npm", "Image": "mcr.microsoft.com/containernetworking/azure-npm:v1.5.45", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "azure-npm-vsrfp", "Container": "azure-npm", "Image": "mcr.microsoft.com/containernetworking/azure-npm:v1.5.45", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "azure-npm-z8mcz", "Container": "azure-npm", "Image": "mcr.microsoft.com/containernetworking/azure-npm:v1.5.45", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "azure-policy-698f7c86b4-nnff2", "Container": "azure-policy", "Image": "mcr.microsoft.com/azure-policy/policy-kubernetes-addon-prod:1.10.1", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "azure-policy-webhook-764fdf5cd5-6vrc5", "Container": "azure-policy-webhook", "Image": "mcr.microsoft.com/azure-policy/policy-kubernetes-webhook:1.10.0", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "azure-wi-webhook-controller-manager-7f95f666d4-7r44b", "Container": "manager", "Image": "mcr.microsoft.com/oss/azure/workload-identity/webhook:v1.4.0", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "azure-wi-webhook-controller-manager-7f95f666d4-xfh2p", "Container": "manager", "Image": "mcr.microsoft.com/oss/azure/workload-identity/webhook:v1.4.0", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "cloud-node-manager-57rk2", "Container": "cloud-node-manager", "Image": "mcr.microsoft.com/oss/kubernetes/azure-cloud-node-manager:v1.30.10", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "cloud-node-manager-gl5xl", "Container": "cloud-node-manager", "Image": "mcr.microsoft.com/oss/kubernetes/azure-cloud-node-manager:v1.30.10", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "cloud-node-manager-l7v5j", "Container": "cloud-node-manager", "Image": "mcr.microsoft.com/oss/kubernetes/azure-cloud-node-manager:v1.30.10", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "cloud-node-manager-lr49d", "Container": "cloud-node-manager", "Image": "mcr.microsoft.com/oss/kubernetes/azure-cloud-node-manager:v1.30.10", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "cloud-node-manager-n5qdr", "Container": "cloud-node-manager", "Image": "mcr.microsoft.com/oss/kubernetes/azure-cloud-node-manager:v1.30.10", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "cloud-node-manager-xwrrd", "Container": "cloud-node-manager", "Image": "mcr.microsoft.com/oss/kubernetes/azure-cloud-node-manager:v1.30.10", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "coredns-658d6d767d-757xp", "Container": "coredns", "Image": "mcr.microsoft.com/oss/v2/kubernetes/coredns:v1.9.4-5", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "coredns-658d6d767d-pt6l6", "Container": "coredns", "Image": "mcr.microsoft.com/oss/v2/kubernetes/coredns:v1.9.4-5", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "coredns-autoscaler-5955d6bbdb-mz9kn", "Container": "autoscaler", "Image": "mcr.microsoft.com/oss/v2/kubernetes/autoscaler/cluster-proportional-autoscaler:v1.8.11-5", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "eraser-controller-manager-864f9476c8-lhdfc", "Container": "manager", "Image": "mcr.microsoft.com/oss/v2/eraser/eraser-manager:v1.4.0-2", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "extension-agent-66c4486d68-46cqq", "Container": "extension-agent", "Image": "mcr.microsoft.com/azurearck8s/aks/stable/config-agent:1.23.3", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "extension-agent-66c4486d68-46cqq", "Container": "fluent-bit", "Image": "mcr.microsoft.com/azurearck8s/aks/stable/fluent-bit-collector:1.23.3", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "extension-operator-d95fd449b-ssrcx", "Container": "manager", "Image": "mcr.microsoft.com/azurearck8s/aks/stable/extensionoperator:1.23.3", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "extension-operator-d95fd449b-ssrcx", "Container": "fluent-bit", "Image": "mcr.microsoft.com/azurearck8s/aks/stable/fluent-bit-collector:1.23.3", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "keda-admission-webhooks-787f866c7c-4b64k", "Container": "keda-admission-webhooks", "Image": "mcr.microsoft.com/oss/kedacore/keda-admission-webhooks:2.14.1", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "keda-admission-webhooks-787f866c7c-dw2sg", "Container": "keda-admission-webhooks", "Image": "mcr.microsoft.com/oss/kedacore/keda-admission-webhooks:2.14.1", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "keda-operator-6b85944bfb-4zpbp", "Container": "keda-operator", "Image": "mcr.microsoft.com/oss/kedacore/keda:2.14.1", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "keda-operator-6b85944bfb-sx9sj", "Container": "keda-operator", "Image": "mcr.microsoft.com/oss/kedacore/keda:2.14.1", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "keda-operator-metrics-apiserver-8468875db7-86c5h", "Container": "keda-operator-metrics-apiserver", "Image": "mcr.microsoft.com/oss/kedacore/keda-metrics-apiserver:2.14.1", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "keda-operator-metrics-apiserver-8468875db7-ngp4h", "Container": "keda-operator-metrics-apiserver", "Image": "mcr.microsoft.com/oss/kedacore/keda-metrics-apiserver:2.14.1", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "konnectivity-agent-9f65c5cd8-fzm5q", "Container": "konnectivity-agent", "Image": "mcr.microsoft.com/oss/kubernetes/apiserver-network-proxy/agent:v0.30.3-hotfix.20240819", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "konnectivity-agent-9f65c5cd8-t9qdj", "Container": "konnectivity-agent", "Image": "mcr.microsoft.com/oss/kubernetes/apiserver-network-proxy/agent:v0.30.3-hotfix.20240819", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "konnectivity-agent-autoscaler-cdfc7c46-vct7p", "Container": "autoscaler", "Image": "mcr.microsoft.com/oss/v2/kubernetes/autoscaler/cluster-proportional-autoscaler:v1.8.11-5", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "kube-proxy-26xkd", "Container": "kube-proxy", "Image": "mcr.microsoft.com/oss/kubernetes/kube-proxy:v1.30.11", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "kube-proxy-6mrql", "Container": "kube-proxy", "Image": "mcr.microsoft.com/oss/kubernetes/kube-proxy:v1.30.11", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "kube-proxy-9rbxf", "Container": "kube-proxy", "Image": "mcr.microsoft.com/oss/kubernetes/kube-proxy:v1.30.11", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "kube-proxy-njzgk", "Container": "kube-proxy", "Image": "mcr.microsoft.com/oss/kubernetes/kube-proxy:v1.30.11", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "kube-proxy-rvmxl", "Container": "kube-proxy", "Image": "mcr.microsoft.com/oss/kubernetes/kube-proxy:v1.30.11", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "kube-proxy-vp7xj", "Container": "kube-proxy", "Image": "mcr.microsoft.com/oss/kubernetes/kube-proxy:v1.30.11", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "metrics-server-5f9ccffcc4-jsrjl", "Container": "metrics-server-vpa", "Image": "mcr.microsoft.com/oss/v2/kubernetes/autoscaler/addon-resizer:v1.8.23-2", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "metrics-server-5f9ccffcc4-jsrjl", "Container": "metrics-server", "Image": "mcr.microsoft.com/oss/v2/kubernetes/metrics-server:v0.6.3-5", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "metrics-server-5f9ccffcc4-v88pw", "Container": "metrics-server-vpa", "Image": "mcr.microsoft.com/oss/v2/kubernetes/autoscaler/addon-resizer:v1.8.23-2", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "metrics-server-5f9ccffcc4-v88pw", "Container": "metrics-server", "Image": "mcr.microsoft.com/oss/v2/kubernetes/metrics-server:v0.6.3-5", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-6xdfq", "Container": "microsoft-defender-pod-collector", "Image": "mcr.microsoft.com/azuredefender/stable/pod-collector:1.0.164", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-6xdfq", "Container": "microsoft-defender-low-level-collector", "Image": "mcr.microsoft.com/azuredefender/stable/low-level-collector:2.0.198", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-89l74", "Container": "microsoft-defender-pod-collector", "Image": "mcr.microsoft.com/azuredefender/stable/pod-collector:1.0.164", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-89l74", "Container": "microsoft-defender-low-level-collector", "Image": "mcr.microsoft.com/azuredefender/stable/low-level-collector:2.0.198", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-d7gwk", "Container": "microsoft-defender-pod-collector", "Image": "mcr.microsoft.com/azuredefender/stable/pod-collector:1.0.164", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-d7gwk", "Container": "microsoft-defender-low-level-collector", "Image": "mcr.microsoft.com/azuredefender/stable/low-level-collector:2.0.198", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-mdcs8", "Container": "microsoft-defender-pod-collector", "Image": "mcr.microsoft.com/azuredefender/stable/pod-collector:1.0.164", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-mdcs8", "Container": "microsoft-defender-low-level-collector", "Image": "mcr.microsoft.com/azuredefender/stable/low-level-collector:2.0.198", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-q6d6c", "Container": "microsoft-defender-pod-collector", "Image": "mcr.microsoft.com/azuredefender/stable/pod-collector:1.0.164", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-q6d6c", "Container": "microsoft-defender-low-level-collector", "Image": "mcr.microsoft.com/azuredefender/stable/low-level-collector:2.0.198", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-wb5dm", "Container": "microsoft-defender-pod-collector", "Image": "mcr.microsoft.com/azuredefender/stable/pod-collector:1.0.164", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-wb5dm", "Container": "microsoft-defender-low-level-collector", "Image": "mcr.microsoft.com/azuredefender/stable/low-level-collector:2.0.198", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-misc-7df6776447-bcbph", "Container": "microsoft-defender-pod-collector", "Image": "mcr.microsoft.com/azuredefender/stable/pod-collector:1.0.164", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-2ql5b", "Container": "microsoft-defender-publisher", "Image": "mcr.microsoft.com/azuredefender/stable/security-publisher:1.0.204", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-2rsrw", "Container": "microsoft-defender-publisher", "Image": "mcr.microsoft.com/azuredefender/stable/security-publisher:1.0.204", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-jj6dh", "Container": "microsoft-defender-publisher", "Image": "mcr.microsoft.com/azuredefender/stable/security-publisher:1.0.204", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-l5crs", "Container": "microsoft-defender-publisher", "Image": "mcr.microsoft.com/azuredefender/stable/security-publisher:1.0.204", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-lfk8h", "Container": "microsoft-defender-publisher", "Image": "mcr.microsoft.com/azuredefender/stable/security-publisher:1.0.204", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-vz2c6", "Container": "microsoft-defender-publisher", "Image": "mcr.microsoft.com/azuredefender/stable/security-publisher:1.0.204", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "retina-agent-cgv48", "Container": "retina", "Image": "mcr.microsoft.com/containernetworking/retina-agent:v0.0.30", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "retina-agent-gjxk8", "Container": "retina", "Image": "mcr.microsoft.com/containernetworking/retina-agent:v0.0.30", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "retina-agent-js76w", "Container": "retina", "Image": "mcr.microsoft.com/containernetworking/retina-agent:v0.0.30", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "retina-agent-lfn7d", "Container": "retina", "Image": "mcr.microsoft.com/containernetworking/retina-agent:v0.0.30", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "retina-agent-qc9bs", "Container": "retina", "Image": "mcr.microsoft.com/containernetworking/retina-agent:v0.0.30", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "retina-agent-wlt7b", "Container": "retina", "Image": "mcr.microsoft.com/containernetworking/retina-agent:v0.0.30", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "vpa-admission-controller-7d9f8d57bd-lrcch", "Container": "admission-controller", "Image": "mcr.microsoft.com/oss/kubernetes/autoscaler/vpa-admission-controller:1.0.0", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "vpa-admission-controller-7d9f8d57bd-tnqvx", "Container": "admission-controller", "Image": "mcr.microsoft.com/oss/kubernetes/autoscaler/vpa-admission-controller:1.0.0", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "vpa-recommender-74bfff7f75-sspdc", "Container": "recommender", "Image": "mcr.microsoft.com/oss/kubernetes/autoscaler/vpa-recommender:1.0.0", "Issue": "Image from untrusted registry" }, { "Namespace": "kube-system", "Pod": "vpa-updater-5d6d49f8b6-pxkz8", "Container": "updater", "Image": "mcr.microsoft.com/oss/kubernetes/autoscaler/vpa-updater:1.0.0", "Issue": "Image from untrusted registry" }, { "Namespace": "kubeview", "Pod": "simple-deployment-74fd649f8d-qxp2r", "Container": "webserver-simple", "Image": "docker.io/kostiscodefresh/gitops-simple-app:v1.0", "Issue": "Image from untrusted registry" }, { "Namespace": "linkerd", "Pod": "simple-deployment-74fd649f8d-mkmst", "Container": "webserver-simple", "Image": "docker.io/kostiscodefresh/gitops-simple-app:v1.0", "Issue": "Image from untrusted registry" }, { "Namespace": "nginx", "Pod": "simple-deployment-74fd649f8d-hlcdk", "Container": "webserver-simple", "Image": "docker.io/kostiscodefresh/gitops-simple-app:v1.0", "Issue": "Image from untrusted registry" }, { "Namespace": "pets", "Pod": "order-service-6c5bfb6946-b58xq", "Container": "istio-proxy", "Image": "mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless", "Issue": "Image from untrusted registry" }, { "Namespace": "pets", "Pod": "product-service-5dd87dfb8-ssfxc", "Container": "istio-proxy", "Image": "mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless", "Issue": "Image from untrusted registry" }, { "Namespace": "pets", "Pod": "rabbitmq-0", "Container": "rabbitmq", "Image": "mcr.microsoft.com/mirror/docker/library/rabbitmq:3.10-management-alpine", "Issue": "Image from untrusted registry" }, { "Namespace": "pets", "Pod": "rabbitmq-0", "Container": "istio-proxy", "Image": "mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless", "Issue": "Image from untrusted registry" }, { "Namespace": "pets", "Pod": "store-front-658994fd95-pk9qn", "Container": "istio-proxy", "Image": "mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless", "Issue": "Image from untrusted registry" }, { "Namespace": "prometheus", "Pod": "simple-deployment-74fd649f8d-2x6w5", "Container": "webserver-simple", "Image": "docker.io/kostiscodefresh/gitops-simple-app:v1.0", "Issue": "Image from untrusted registry" }, { "Namespace": "sealed-secrets", "Pod": "simple-deployment-74fd649f8d-stktp", "Container": "webserver-simple", "Image": "docker.io/kostiscodefresh/gitops-simple-app:v1.0", "Issue": "Image from untrusted registry" }, { "Namespace": "test", "Pod": "simple-deployment-74fd649f8d-lhlkx", "Container": "webserver-simple", "Image": "docker.io/kostiscodefresh/gitops-simple-app:v1.0", "Issue": "Image from untrusted registry" } ] }, "AKSDR001": { "ID": "AKSDR001", "Severity": "High", "URL": "https://learn.microsoft.com/azure/aks/availability-zones", "FailMessage": "", "Name": "Agent Pools with Availability Zones", "Recommendation": "Agent Pools with Availability Zones is enabled.", "Status": "✅ PASS", "Category": "Disaster Recovery", "Total": 0, "Items": null }, "POD006": { "Total": 0, "URL": "https://kubernetes.io/docs/tasks/debug/debug-cluster/debug-running-pod/", "Name": "Leftover Debug Pods", "Description": "Detects pods created by 'kubectl debug' that haven't been cleaned up.", "Recommendation": "Delete any leftover debug pods and review your debugging practices.", "Weight": 2, "ID": "POD006", "Message": "No issues detected for Leftover Debug Pods.", "ResourceKind": "Pod", "Section": "Pods", "Category": "Workloads", "Severity": "Warning", "Items": [] }, "AKSBP002": { "ID": "AKSBP002", "Severity": "High", "URL": "https://learn.microsoft.com/azure/aks/policy-reference", "FailMessage": "The 'No Privileged Containers' policy is either missing or not enforcing deny mode, allowing potentially insecure workloads.", "Name": "No Privileged Containers Policy Enforcement", "Recommendation": "Deploy and enforce the 'No Privileged Containers' policy in deny mode to block privileged containers and enhance security.", "Status": "❌ FAIL", "Category": "Best Practices", "Total": 1, "Items": { "Issue": "Deploy and enforce the 'No Privileged Containers' policy in deny mode to block privileged containers and enhance security.", "Resource": "No Privileged Containers Policy Enforcement" } }, "AKSIAM005": { "ID": "AKSIAM005", "Severity": "High", "URL": "https://learn.microsoft.com/azure/aks/enable-authentication-microsoft-entra-id", "FailMessage": "", "Name": "AAD RBAC Authorization Integrated", "Recommendation": "AAD RBAC Authorization Integrated is enabled.", "Status": "✅ PASS", "Category": "Identity & Access", "Total": 0, "Items": null }, "AKSSEC003": { "ID": "AKSSEC003", "Severity": "High", "URL": "https://learn.microsoft.com/azure/defender-for-cloud/defender-for-containers-introduction", "FailMessage": "", "Name": "Defender for Containers", "Recommendation": "Defender for Containers is enabled.", "Status": "✅ PASS", "Category": "Security", "Total": 0, "Items": null }, "AKSBP003": { "ID": "AKSBP003", "Severity": "Medium", "URL": "https://learn.microsoft.com/azure/aks/use-multiple-node-pools", "FailMessage": "", "Name": "Multiple Node Pools", "Recommendation": "Multiple Node Pools is enabled.", "Status": "✅ PASS", "Category": "Best Practices", "Total": 0, "Items": null }, "POD007": { "Total": 3, "URL": "https://kubernetes.io/docs/concepts/containers/images/#image-tags", "Name": "Container images do not use latest tag", "Description": "Flags containers using the 'latest' tag in their image, which can cause unpredictable upgrades.", "Recommendation": "Specify an explicit image tag (e.g., ':v1.2.3') to ensure consistent deployments.", "Weight": 3, "ID": "POD007", "ResourceKind": "Pod", "Section": "Pods", "Category": "Resource Management", "Severity": "High", "Items": [ { "Namespace": "pets", "Resource": "pod/order-service-6c5bfb6946-b58xq", "Value": "ghcr.io/azure-samples/aks-store-demo/order-service:latest, mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless", "Message": "Container image uses the 'latest' tag, which can lead to unpredictable deployments." }, { "Namespace": "pets", "Resource": "pod/product-service-5dd87dfb8-ssfxc", "Value": "ghcr.io/azure-samples/aks-store-demo/product-service:latest, mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless", "Message": "Container image uses the 'latest' tag, which can lead to unpredictable deployments." }, { "Namespace": "pets", "Resource": "pod/store-front-658994fd95-pk9qn", "Value": "ghcr.io/azure-samples/aks-store-demo/store-front:latest, mcr.microsoft.com/oss/istio/proxyv2:1.23.5-distroless", "Message": "Container image uses the 'latest' tag, which can lead to unpredictable deployments." } ] }, "AKSBP011": { "ID": "AKSBP011", "Severity": "High", "URL": "https://learn.microsoft.com/azure/aks/use-system-pools?tabs=azure-cli#recommendations", "FailMessage": "", "Name": "System Node Pool Minimum Size", "Recommendation": "System Node Pool Minimum Size is enabled.", "Status": "✅ PASS", "Category": "Best Practices", "Total": 0, "Items": null }, "WRK003": { "Total": 0, "URL": "https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/", "Name": "StatefulSet Incomplete Rollout", "Description": "Detects StatefulSets where the number of ready replicas is less than the desired count.", "Recommendation": "Investigate StatefulSets with missing ready replicas. This may indicate issues with pod readiness or volume binding.", "Weight": 3, "ID": "WRK003", "Message": "No issues detected for StatefulSet Incomplete Rollout.", "ResourceKind": "StatefulSet", "Section": "Workloads", "Category": "Workloads", "Severity": "Warning", "Items": [] }, "AKSSEC005": { "ID": "AKSSEC005", "Severity": "High", "URL": "https://learn.microsoft.com/azure/aks/csi-secrets-store-driver", "FailMessage": "", "Name": "Azure Key Vault Integration", "Recommendation": "Azure Key Vault Integration is enabled.", "Status": "✅ PASS", "Category": "Security", "Total": 0, "Items": null }, "WRK004": { "Total": 0, "URL": "https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/", "Name": "HPA Misconfiguration or Inactivity", "Description": "Checks for HPAs that have missing targets, no metrics, or inactive scaling.", "Recommendation": "Review HorizontalPodAutoscalers with missing targets, no metrics, or disabled scaling.", "Weight": 1, "ID": "WRK004", "Message": "No issues detected for HPA Misconfiguration or Inactivity.", "ResourceKind": "HorizontalPodAutoscaler", "Section": "Workloads", "Category": "Workloads", "Severity": "Warning", "Items": [] }, "AKSBP004": { "ID": "AKSBP004", "Severity": "High", "URL": "https://learn.microsoft.com/azure/aks/use-azure-linux", "FailMessage": "", "Name": "Azure Linux as Host OS", "Recommendation": "Azure Linux as Host OS is enabled.", "Status": "✅ PASS", "Category": "Best Practices", "Total": 0, "Items": null }, "AKSNET003": { "ID": "AKSNET003", "Severity": "Low", "URL": "https://learn.microsoft.com/azure/aks/web-app-routing", "FailMessage": "", "Name": "Web App Routing Enabled", "Recommendation": "Web App Routing Enabled is enabled.", "Status": "✅ PASS", "Category": "Networking", "Total": 0, "Items": null }, "WRK006": { "Total": 25, "URL": "https://kubernetes.io/docs/tasks/run-application/configure-pdb/", "Name": "PDB Coverage and Effectiveness", "Description": "Detects missing or weak PDBs for workloads", "Recommendation": "Workloads should have a valid PDB to prevent availability issues during disruptions.", "Weight": 2, "ID": "WRK006", "ResourceKind": "PodDisruptionBudget", "Section": "Workloads", "Category": "PDBs", "Severity": "High", "Items": [ { "Namespace": "app-routing-system", "Name": "nginx", "Kind": "PDB", "Issue": "⚠️ maxUnavailable = 100%" }, { "Namespace": "argo-rollouts", "Name": "simple-deployment", "Kind": "Deployment", "Issue": "❌ No matching PDB" }, { "Namespace": "argo-workflows", "Name": "simple-deployment", "Kind": "Deployment", "Issue": "❌ No matching PDB" }, { "Namespace": "argocd", "Name": "argocd-applicationset-controller", "Kind": "Deployment", "Issue": "❌ No matching PDB" }, { "Namespace": "argocd", "Name": "argocd-dex-server", "Kind": "Deployment", "Issue": "❌ No matching PDB" }, { "Namespace": "argocd", "Name": "argocd-notifications-controller", "Kind": "Deployment", "Issue": "❌ No matching PDB" }, { "Namespace": "argocd", "Name": "argocd-redis-ha-haproxy", "Kind": "Deployment", "Issue": "❌ No matching PDB" }, { "Namespace": "argocd", "Name": "argocd-repo-server", "Kind": "Deployment", "Issue": "❌ No matching PDB" }, { "Namespace": "argocd", "Name": "argocd-server", "Kind": "Deployment", "Issue": "❌ No matching PDB" }, { "Namespace": "cert-manager", "Name": "simple-deployment", "Kind": "Deployment", "Issue": "❌ No matching PDB" }, { "Namespace": "grafana", "Name": "simple-deployment", "Kind": "Deployment", "Issue": "❌ No matching PDB" }, { "Namespace": "kiali-operator", "Name": "kiali", "Kind": "Deployment", "Issue": "❌ No matching PDB" }, { "Namespace": "kiali-operator", "Name": "kiali-operator", "Kind": "Deployment", "Issue": "❌ No matching PDB" }, { "Namespace": "kubeview", "Name": "simple-deployment", "Kind": "Deployment", "Issue": "❌ No matching PDB" }, { "Namespace": "linkerd", "Name": "simple-deployment", "Kind": "Deployment", "Issue": "❌ No matching PDB" }, { "Namespace": "nginx", "Name": "simple-deployment", "Kind": "Deployment", "Issue": "❌ No matching PDB" }, { "Namespace": "pets", "Name": "order-service", "Kind": "Deployment", "Issue": "❌ No matching PDB" }, { "Namespace": "pets", "Name": "product-service", "Kind": "Deployment", "Issue": "❌ No matching PDB" }, { "Namespace": "pets", "Name": "store-front", "Kind": "Deployment", "Issue": "❌ No matching PDB" }, { "Namespace": "prometheus", "Name": "simple-deployment", "Kind": "Deployment", "Issue": "❌ No matching PDB" }, { "Namespace": "sealed-secrets", "Name": "simple-deployment", "Kind": "Deployment", "Issue": "❌ No matching PDB" }, { "Namespace": "test", "Name": "simple-deployment", "Kind": "Deployment", "Issue": "❌ No matching PDB" }, { "Namespace": "argocd", "Name": "argocd-application-controller", "Kind": "StatefulSet", "Issue": "❌ No matching PDB" }, { "Namespace": "argocd", "Name": "argocd-redis-ha-server", "Kind": "StatefulSet", "Issue": "❌ No matching PDB" }, { "Namespace": "pets", "Name": "rabbitmq", "Kind": "StatefulSet", "Issue": "❌ No matching PDB" } ] }, "SEC007": { "Total": 32, "URL": "https://kubernetes.io/docs/concepts/security/pod-security-admission/", "Name": "Missing Pod Security Admission Labels", "Description": "Checks if namespaces are missing the 'pod-security.kubernetes.io/enforce' label required for Pod Security Admission enforcement.\n", "Recommendation": "Add 'pod-security.kubernetes.io/enforce' labels to your namespaces to enforce Pod Security standards. Use values like 'baseline' or 'restricted'.\n", "Weight": 1, "ID": "SEC007", "ResourceKind": "Namespace", "Section": "Security", "Category": "Pod Security", "Severity": "Low", "Items": [ { "Namespace": "1", "Warn": "N/A", "Audit": "N/A", "Issue": "No pod security labels" }, { "Namespace": "10", "Warn": "N/A", "Audit": "N/A", "Issue": "No pod security labels" }, { "Namespace": "2", "Warn": "N/A", "Audit": "N/A", "Issue": "No pod security labels" }, { "Namespace": "3", "Warn": "N/A", "Audit": "N/A", "Issue": "No pod security labels" }, { "Namespace": "4", "Warn": "N/A", "Audit": "N/A", "Issue": "No pod security labels" }, { "Namespace": "5", "Warn": "N/A", "Audit": "N/A", "Issue": "No pod security labels" }, { "Namespace": "6", "Warn": "N/A", "Audit": "N/A", "Issue": "No pod security labels" }, { "Namespace": "7", "Warn": "N/A", "Audit": "N/A", "Issue": "No pod security labels" }, { "Namespace": "8", "Warn": "N/A", "Audit": "N/A", "Issue": "No pod security labels" }, { "Namespace": "9", "Warn": "N/A", "Audit": "N/A", "Issue": "No pod security labels" }, { "Namespace": "aks-istio-egress", "Warn": "N/A", "Audit": "N/A", "Issue": "No pod security labels" }, { "Namespace": "aks-istio-ingress", "Warn": "N/A", "Audit": "N/A", "Issue": "No pod security labels" }, { "Namespace": "aks-istio-system", "Warn": "N/A", "Audit": "N/A", "Issue": "No pod security labels" }, { "Namespace": "app-routing-system", "Warn": "N/A", "Audit": "N/A", "Issue": "No pod security labels" }, { "Namespace": "argo-rollouts", "Warn": "N/A", "Audit": "N/A", "Issue": "No pod security labels" }, { "Namespace": "argo-workflows", "Warn": "N/A", "Audit": "N/A", "Issue": "No pod security labels" }, { "Namespace": "argocd", "Warn": "N/A", "Audit": "N/A", "Issue": "No pod security labels" }, { "Namespace": "cert-manager", "Warn": "N/A", "Audit": "N/A", "Issue": "No pod security labels" }, { "Namespace": "default", "Warn": "N/A", "Audit": "N/A", "Issue": "No pod security labels" }, { "Namespace": "gatekeeper-system", "Warn": "N/A", "Audit": "N/A", "Issue": "No pod security labels" }, { "Namespace": "grafana", "Warn": "N/A", "Audit": "N/A", "Issue": "No pod security labels" }, { "Namespace": "kiali-operator", "Warn": "N/A", "Audit": "N/A", "Issue": "No pod security labels" }, { "Namespace": "kube-node-lease", "Warn": "N/A", "Audit": "N/A", "Issue": "No pod security labels" }, { "Namespace": "kube-public", "Warn": "N/A", "Audit": "N/A", "Issue": "No pod security labels" }, { "Namespace": "kube-system", "Warn": "N/A", "Audit": "N/A", "Issue": "No pod security labels" }, { "Namespace": "kubeview", "Warn": "N/A", "Audit": "N/A", "Issue": "No pod security labels" }, { "Namespace": "linkerd", "Warn": "N/A", "Audit": "N/A", "Issue": "No pod security labels" }, { "Namespace": "nginx", "Warn": "N/A", "Audit": "N/A", "Issue": "No pod security labels" }, { "Namespace": "pets", "Warn": "N/A", "Audit": "N/A", "Issue": "No pod security labels" }, { "Namespace": "prometheus", "Warn": "N/A", "Audit": "N/A", "Issue": "No pod security labels" }, { "Namespace": "sealed-secrets", "Warn": "N/A", "Audit": "N/A", "Issue": "No pod security labels" }, { "Namespace": "test", "Warn": "N/A", "Audit": "N/A", "Issue": "No pod security labels" } ] }, "AKSRES002": { "ID": "AKSRES002", "Severity": "Medium", "URL": "https://learn.microsoft.com/azure/aks/cost-analysis", "FailMessage": "AKS built-in cost tooling (Open Costs) is not enabled, making cost allocation and optimization harder.", "Name": "AKS Built-in Cost Tooling Enabled", "Recommendation": "Enable cost analysis in the AKS metrics profile to gain insights into resource spending and optimize cost management.", "Status": "❌ FAIL", "Category": "Resource Management", "Total": 1, "Items": { "Issue": "Enable cost analysis in the AKS metrics profile to gain insights into resource spending and optimize cost management.", "Resource": "AKS Built-in Cost Tooling Enabled" } }, "SEC011": { "Total": 13, "URL": "https://kubernetes.io/docs/tasks/configure-pod-container/security-context/", "Name": "Containers Running as UID 0", "Description": "Detects containers explicitly set to run as user 0 (root).\n", "Recommendation": "Avoid setting runAsUser to 0. Use non-root UIDs for better isolation.", "Weight": 3, "ID": "SEC011", "ResourceKind": "Pod", "Section": "Security", "Category": "Pod Security", "Severity": "High", "Items": [ { "Namespace": "kube-system", "Pod": "aks-secrets-store-provider-azure-68nhw", "Container": "provider-azure-installer", "UID": 0, "Issue": "Container runs as UID 0" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-provider-azure-7bqmn", "Container": "provider-azure-installer", "UID": 0, "Issue": "Container runs as UID 0" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-provider-azure-7r458", "Container": "provider-azure-installer", "UID": 0, "Issue": "Container runs as UID 0" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-provider-azure-k9tdc", "Container": "provider-azure-installer", "UID": 0, "Issue": "Container runs as UID 0" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-provider-azure-n952g", "Container": "provider-azure-installer", "UID": 0, "Issue": "Container runs as UID 0" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-provider-azure-njpqh", "Container": "provider-azure-installer", "UID": 0, "Issue": "Container runs as UID 0" }, { "Namespace": "kube-system", "Pod": "azure-policy-698f7c86b4-nnff2", "Container": "azure-policy", "UID": 0, "Issue": "Container runs as UID 0" }, { "Namespace": "kube-system", "Pod": "retina-agent-cgv48", "Container": "retina", "UID": 0, "Issue": "Container runs as UID 0" }, { "Namespace": "kube-system", "Pod": "retina-agent-gjxk8", "Container": "retina", "UID": 0, "Issue": "Container runs as UID 0" }, { "Namespace": "kube-system", "Pod": "retina-agent-js76w", "Container": "retina", "UID": 0, "Issue": "Container runs as UID 0" }, { "Namespace": "kube-system", "Pod": "retina-agent-lfn7d", "Container": "retina", "UID": 0, "Issue": "Container runs as UID 0" }, { "Namespace": "kube-system", "Pod": "retina-agent-qc9bs", "Container": "retina", "UID": 0, "Issue": "Container runs as UID 0" }, { "Namespace": "kube-system", "Pod": "retina-agent-wlt7b", "Container": "retina", "UID": 0, "Issue": "Container runs as UID 0" } ] }, "AKSSEC007": { "ID": "AKSSEC007", "Severity": "High", "URL": "https://learn.microsoft.com/azure/aks/kubernetes-dashboard", "FailMessage": "", "Name": "Kubernetes Dashboard Disabled", "Recommendation": "Kubernetes Dashboard Disabled is enabled.", "Status": "✅ PASS", "Category": "Security", "Total": 0, "Items": null }, "SEC009": { "Total": 42, "URL": "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted", "Name": "Missing Capabilities Drop", "Description": "Checks containers that don't drop all Linux capabilities via securityContext.capabilities.drop = ['ALL'].\n", "Recommendation": "Explicitly drop all Linux capabilities unless specific ones are needed.", "Weight": 3, "ID": "SEC009", "ResourceKind": "Pod", "Section": "Security", "Category": "Pod Security", "Severity": "Medium", "Items": [ { "Namespace": "argo-rollouts", "Pod": "simple-deployment-74fd649f8d-996vt", "Container": "webserver-simple", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "argo-workflows", "Pod": "simple-deployment-74fd649f8d-24t56", "Container": "webserver-simple", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "cert-manager", "Pod": "simple-deployment-74fd649f8d-7cht8", "Container": "webserver-simple", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "grafana", "Pod": "simple-deployment-74fd649f8d-l7wrd", "Container": "webserver-simple", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-2l2wl", "Container": "node-driver-registrar", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-2l2wl", "Container": "secrets-store", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-2l2wl", "Container": "liveness-probe", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-6w2vp", "Container": "node-driver-registrar", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-6w2vp", "Container": "secrets-store", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-6w2vp", "Container": "liveness-probe", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-7879c", "Container": "node-driver-registrar", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-7879c", "Container": "secrets-store", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-7879c", "Container": "liveness-probe", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-m8m29", "Container": "node-driver-registrar", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-m8m29", "Container": "secrets-store", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-m8m29", "Container": "liveness-probe", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-vnmcd", "Container": "node-driver-registrar", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-vnmcd", "Container": "secrets-store", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-vnmcd", "Container": "liveness-probe", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-zrfbz", "Container": "node-driver-registrar", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-zrfbz", "Container": "secrets-store", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "kube-system", "Pod": "aks-secrets-store-csi-driver-zrfbz", "Container": "liveness-probe", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "kube-system", "Pod": "extension-agent-66c4486d68-46cqq", "Container": "extension-agent", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "kube-system", "Pod": "extension-agent-66c4486d68-46cqq", "Container": "fluent-bit", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "kube-system", "Pod": "extension-operator-d95fd449b-ssrcx", "Container": "manager", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "kube-system", "Pod": "extension-operator-d95fd449b-ssrcx", "Container": "fluent-bit", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "kube-system", "Pod": "kube-proxy-26xkd", "Container": "kube-proxy", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "kube-system", "Pod": "kube-proxy-6mrql", "Container": "kube-proxy", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "kube-system", "Pod": "kube-proxy-9rbxf", "Container": "kube-proxy", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "kube-system", "Pod": "kube-proxy-njzgk", "Container": "kube-proxy", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "kube-system", "Pod": "kube-proxy-rvmxl", "Container": "kube-proxy", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "kube-system", "Pod": "kube-proxy-vp7xj", "Container": "kube-proxy", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "kubeview", "Pod": "simple-deployment-74fd649f8d-qxp2r", "Container": "webserver-simple", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "linkerd", "Pod": "simple-deployment-74fd649f8d-mkmst", "Container": "webserver-simple", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "nginx", "Pod": "simple-deployment-74fd649f8d-hlcdk", "Container": "webserver-simple", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "pets", "Pod": "order-service-6c5bfb6946-b58xq", "Container": "order-service", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "pets", "Pod": "product-service-5dd87dfb8-ssfxc", "Container": "product-service", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "pets", "Pod": "rabbitmq-0", "Container": "rabbitmq", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "pets", "Pod": "store-front-658994fd95-pk9qn", "Container": "store-front", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "prometheus", "Pod": "simple-deployment-74fd649f8d-2x6w5", "Container": "webserver-simple", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "sealed-secrets", "Pod": "simple-deployment-74fd649f8d-stktp", "Container": "webserver-simple", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" }, { "Namespace": "test", "Pod": "simple-deployment-74fd649f8d-lhlkx", "Container": "webserver-simple", "DroppedCapabilities": "", "Issue": "Does not drop ALL capabilities" } ] }, "WRK007": { "Total": 60, "URL": "https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/", "Name": "Missing Readiness and Liveness Probes", "Description": "Detects containers without health probes (readiness/liveness).", "Recommendation": "Add readiness and liveness probes to all containers to improve availability and fault detection.", "Weight": 4, "ID": "WRK007", "ResourceKind": "Deployment", "Section": "Workloads", "Category": "Probes", "Severity": "Medium", "Items": [ { "Namespace": "aks-istio-ingress", "Workload": "aks-istio-ingressgateway-external-asm-1-23", "Kind": "Deployment", "Container": "istio-proxy", "Missing": "readiness, liveness" }, { "Namespace": "aks-istio-system", "Workload": "istiod-asm-1-23", "Kind": "Deployment", "Container": "discovery", "Missing": "liveness" }, { "Namespace": "argo-rollouts", "Workload": "simple-deployment", "Kind": "Deployment", "Container": "webserver-simple", "Missing": "readiness, liveness" }, { "Namespace": "argo-workflows", "Workload": "simple-deployment", "Kind": "Deployment", "Container": "webserver-simple", "Missing": "readiness, liveness" }, { "Namespace": "argocd", "Workload": "argocd-applicationset-controller", "Kind": "Deployment", "Container": "argocd-applicationset-controller", "Missing": "readiness, liveness" }, { "Namespace": "argocd", "Workload": "argocd-dex-server", "Kind": "Deployment", "Container": "dex", "Missing": "readiness, liveness" }, { "Namespace": "argocd", "Workload": "argocd-notifications-controller", "Kind": "Deployment", "Container": "argocd-notifications-controller", "Missing": "readiness" }, { "Namespace": "cert-manager", "Workload": "simple-deployment", "Kind": "Deployment", "Container": "webserver-simple", "Missing": "readiness, liveness" }, { "Namespace": "grafana", "Workload": "simple-deployment", "Kind": "Deployment", "Container": "webserver-simple", "Missing": "readiness, liveness" }, { "Namespace": "kube-system", "Workload": "ama-logs-rs", "Kind": "Deployment", "Container": "ama-logs", "Missing": "readiness" }, { "Namespace": "kube-system", "Workload": "ama-metrics", "Kind": "Deployment", "Container": "prometheus-collector", "Missing": "readiness" }, { "Namespace": "kube-system", "Workload": "ama-metrics", "Kind": "Deployment", "Container": "addon-token-adapter", "Missing": "readiness" }, { "Namespace": "kube-system", "Workload": "ama-metrics-operator-targets", "Kind": "Deployment", "Container": "targetallocator", "Missing": "readiness" }, { "Namespace": "kube-system", "Workload": "ama-metrics-operator-targets", "Kind": "Deployment", "Container": "config-reader", "Missing": "readiness" }, { "Namespace": "kube-system", "Workload": "coredns-autoscaler", "Kind": "Deployment", "Container": "autoscaler", "Missing": "readiness" }, { "Namespace": "kube-system", "Workload": "extension-agent", "Kind": "Deployment", "Container": "extension-agent", "Missing": "readiness, liveness" }, { "Namespace": "kube-system", "Workload": "extension-agent", "Kind": "Deployment", "Container": "fluent-bit", "Missing": "readiness, liveness" }, { "Namespace": "kube-system", "Workload": "extension-operator", "Kind": "Deployment", "Container": "manager", "Missing": "readiness, liveness" }, { "Namespace": "kube-system", "Workload": "extension-operator", "Kind": "Deployment", "Container": "fluent-bit", "Missing": "readiness, liveness" }, { "Namespace": "kube-system", "Workload": "konnectivity-agent-autoscaler", "Kind": "Deployment", "Container": "autoscaler", "Missing": "readiness" }, { "Namespace": "kube-system", "Workload": "metrics-server", "Kind": "Deployment", "Container": "metrics-server-vpa", "Missing": "readiness, liveness" }, { "Namespace": "kube-system", "Workload": "microsoft-defender-collector-misc", "Kind": "Deployment", "Container": "microsoft-defender-pod-collector", "Missing": "readiness, liveness" }, { "Namespace": "kube-system", "Workload": "vpa-admission-controller", "Kind": "Deployment", "Container": "admission-controller", "Missing": "readiness, liveness" }, { "Namespace": "kube-system", "Workload": "vpa-recommender", "Kind": "Deployment", "Container": "recommender", "Missing": "readiness, liveness" }, { "Namespace": "kube-system", "Workload": "vpa-updater", "Kind": "Deployment", "Container": "updater", "Missing": "readiness, liveness" }, { "Namespace": "kubeview", "Workload": "simple-deployment", "Kind": "Deployment", "Container": "webserver-simple", "Missing": "readiness, liveness" }, { "Namespace": "linkerd", "Workload": "simple-deployment", "Kind": "Deployment", "Container": "webserver-simple", "Missing": "readiness, liveness" }, { "Namespace": "nginx", "Workload": "simple-deployment", "Kind": "Deployment", "Container": "webserver-simple", "Missing": "readiness, liveness" }, { "Namespace": "prometheus", "Workload": "simple-deployment", "Kind": "Deployment", "Container": "webserver-simple", "Missing": "readiness, liveness" }, { "Namespace": "sealed-secrets", "Workload": "simple-deployment", "Kind": "Deployment", "Container": "webserver-simple", "Missing": "readiness, liveness" }, { "Namespace": "test", "Workload": "simple-deployment", "Kind": "Deployment", "Container": "webserver-simple", "Missing": "readiness, liveness" }, { "Namespace": "argocd", "Workload": "argocd-application-controller", "Kind": "StatefulSet", "Container": "argocd-application-controller", "Missing": "liveness" }, { "Namespace": "argocd", "Workload": "argocd-redis-ha-server", "Kind": "StatefulSet", "Container": "split-brain-fix", "Missing": "readiness, liveness" }, { "Namespace": "pets", "Workload": "rabbitmq", "Kind": "StatefulSet", "Container": "rabbitmq", "Missing": "readiness, liveness" }, { "Namespace": "kube-system", "Workload": "aks-secrets-store-csi-driver", "Kind": "DaemonSet", "Container": "node-driver-registrar", "Missing": "readiness" }, { "Namespace": "kube-system", "Workload": "aks-secrets-store-csi-driver", "Kind": "DaemonSet", "Container": "secrets-store", "Missing": "readiness" }, { "Namespace": "kube-system", "Workload": "aks-secrets-store-csi-driver", "Kind": "DaemonSet", "Container": "liveness-probe", "Missing": "readiness, liveness" }, { "Namespace": "kube-system", "Workload": "aks-secrets-store-csi-driver-windows", "Kind": "DaemonSet", "Container": "node-driver-registrar", "Missing": "readiness" }, { "Namespace": "kube-system", "Workload": "aks-secrets-store-csi-driver-windows", "Kind": "DaemonSet", "Container": "secrets-store", "Missing": "readiness" }, { "Namespace": "kube-system", "Workload": "aks-secrets-store-csi-driver-windows", "Kind": "DaemonSet", "Container": "liveness-probe", "Missing": "readiness, liveness" }, { "Namespace": "kube-system", "Workload": "aks-secrets-store-provider-azure", "Kind": "DaemonSet", "Container": "provider-azure-installer", "Missing": "readiness" }, { "Namespace": "kube-system", "Workload": "aks-secrets-store-provider-azure-windows", "Kind": "DaemonSet", "Container": "provider-azure-installer", "Missing": "readiness" }, { "Namespace": "kube-system", "Workload": "ama-logs", "Kind": "DaemonSet", "Container": "ama-logs", "Missing": "readiness" }, { "Namespace": "kube-system", "Workload": "ama-logs", "Kind": "DaemonSet", "Container": "ama-logs-prometheus", "Missing": "readiness" }, { "Namespace": "kube-system", "Workload": "ama-logs-windows", "Kind": "DaemonSet", "Container": "ama-logs-windows", "Missing": "readiness" }, { "Namespace": "kube-system", "Workload": "ama-metrics-node", "Kind": "DaemonSet", "Container": "prometheus-collector", "Missing": "readiness" }, { "Namespace": "kube-system", "Workload": "ama-metrics-node", "Kind": "DaemonSet", "Container": "addon-token-adapter", "Missing": "readiness" }, { "Namespace": "kube-system", "Workload": "ama-metrics-win-node", "Kind": "DaemonSet", "Container": "prometheus-collector", "Missing": "readiness" }, { "Namespace": "kube-system", "Workload": "ama-metrics-win-node", "Kind": "DaemonSet", "Container": "addon-token-adapter-win", "Missing": "readiness" }, { "Namespace": "kube-system", "Workload": "azure-ip-masq-agent", "Kind": "DaemonSet", "Container": "azure-ip-masq-agent", "Missing": "readiness, liveness" }, { "Namespace": "kube-system", "Workload": "azure-npm", "Kind": "DaemonSet", "Container": "azure-npm", "Missing": "readiness, liveness" }, { "Namespace": "kube-system", "Workload": "cloud-node-manager", "Kind": "DaemonSet", "Container": "cloud-node-manager", "Missing": "readiness, liveness" }, { "Namespace": "kube-system", "Workload": "cloud-node-manager-windows", "Kind": "DaemonSet", "Container": "cloud-node-manager", "Missing": "readiness, liveness" }, { "Namespace": "kube-system", "Workload": "kube-proxy", "Kind": "DaemonSet", "Container": "kube-proxy", "Missing": "readiness, liveness" }, { "Namespace": "kube-system", "Workload": "microsoft-defender-collector-ds", "Kind": "DaemonSet", "Container": "microsoft-defender-pod-collector", "Missing": "readiness, liveness" }, { "Namespace": "kube-system", "Workload": "microsoft-defender-collector-ds", "Kind": "DaemonSet", "Container": "microsoft-defender-low-level-collector", "Missing": "readiness, liveness" }, { "Namespace": "kube-system", "Workload": "microsoft-defender-publisher-ds", "Kind": "DaemonSet", "Container": "microsoft-defender-publisher", "Missing": "readiness, liveness" }, { "Namespace": "kube-system", "Workload": "retina-agent", "Kind": "DaemonSet", "Container": "retina", "Missing": "liveness" }, { "Namespace": "kube-system", "Workload": "retina-agent-win", "Kind": "DaemonSet", "Container": "retinawin", "Missing": "readiness, liveness" }, { "Namespace": "kube-system", "Workload": "windows-kube-proxy-initializer", "Kind": "DaemonSet", "Container": "pause", "Missing": "readiness, liveness" } ] }, "AKSSEC006": { "ID": "AKSSEC006", "Severity": "Medium", "URL": "https://learn.microsoft.com/azure/aks/image-cleaner", "FailMessage": "", "Name": "Image Cleaner Enabled", "Recommendation": "Image Cleaner Enabled is enabled.", "Status": "✅ PASS", "Category": "Security", "Total": 0, "Items": null }, "AKSBP012": { "ID": "AKSBP012", "Severity": "Medium", "URL": "https://learn.microsoft.com/azure/aks/upgrade-cluster#check-the-current-kubernetes-version", "FailMessage": "", "Name": "Node Pool Version Matches Control Plane", "Recommendation": "Node Pool Version Matches Control Plane is enabled.", "Status": "✅ PASS", "Category": "Best Practices", "Total": 0, "Items": null }, "AKSDR002": { "ID": "AKSDR002", "Severity": "Medium", "URL": "https://learn.microsoft.com/azure/aks/free-standard-pricing-tiers", "FailMessage": "", "Name": "Control Plane SLA", "Recommendation": "Control Plane SLA is enabled.", "Status": "✅ PASS", "Category": "Disaster Recovery", "Total": 0, "Items": null }, "RBAC003": { "Total": 20, "URL": "https://kubernetes.io/docs/reference/access-authn-authz/service-accounts-admin/", "Name": "Orphaned ServiceAccounts", "Description": "Finds ServiceAccounts not used by any pods or referenced in RoleBindings or ClusterRoleBindings.", "Recommendation": "Clean up unused ServiceAccounts to avoid confusion and reduce RBAC clutter.", "Weight": 2, "ID": "RBAC003", "ResourceKind": "ServiceAccount", "Section": "Security", "Category": "RBAC", "Severity": "Medium", "Items": [ { "Namespace": "1", "Resource": "serviceaccount/default", "Value": "default", "Message": "ServiceAccount not used by pods or RBAC bindings" }, { "Namespace": "10", "Resource": "serviceaccount/default", "Value": "default", "Message": "ServiceAccount not used by pods or RBAC bindings" }, { "Namespace": "2", "Resource": "serviceaccount/default", "Value": "default", "Message": "ServiceAccount not used by pods or RBAC bindings" }, { "Namespace": "3", "Resource": "serviceaccount/default", "Value": "default", "Message": "ServiceAccount not used by pods or RBAC bindings" }, { "Namespace": "4", "Resource": "serviceaccount/default", "Value": "default", "Message": "ServiceAccount not used by pods or RBAC bindings" }, { "Namespace": "5", "Resource": "serviceaccount/default", "Value": "default", "Message": "ServiceAccount not used by pods or RBAC bindings" }, { "Namespace": "6", "Resource": "serviceaccount/default", "Value": "default", "Message": "ServiceAccount not used by pods or RBAC bindings" }, { "Namespace": "7", "Resource": "serviceaccount/default", "Value": "default", "Message": "ServiceAccount not used by pods or RBAC bindings" }, { "Namespace": "8", "Resource": "serviceaccount/default", "Value": "default", "Message": "ServiceAccount not used by pods or RBAC bindings" }, { "Namespace": "9", "Resource": "serviceaccount/default", "Value": "default", "Message": "ServiceAccount not used by pods or RBAC bindings" }, { "Namespace": "aks-istio-egress", "Resource": "serviceaccount/default", "Value": "default", "Message": "ServiceAccount not used by pods or RBAC bindings" }, { "Namespace": "aks-istio-ingress", "Resource": "serviceaccount/default", "Value": "default", "Message": "ServiceAccount not used by pods or RBAC bindings" }, { "Namespace": "aks-istio-system", "Resource": "serviceaccount/default", "Value": "default", "Message": "ServiceAccount not used by pods or RBAC bindings" }, { "Namespace": "app-routing-system", "Resource": "serviceaccount/default", "Value": "default", "Message": "ServiceAccount not used by pods or RBAC bindings" }, { "Namespace": "argocd", "Resource": "serviceaccount/default", "Value": "default", "Message": "ServiceAccount not used by pods or RBAC bindings" }, { "Namespace": "default", "Resource": "serviceaccount/default", "Value": "default", "Message": "ServiceAccount not used by pods or RBAC bindings" }, { "Namespace": "gatekeeper-system", "Resource": "serviceaccount/default", "Value": "default", "Message": "ServiceAccount not used by pods or RBAC bindings" }, { "Namespace": "kiali-operator", "Resource": "serviceaccount/default", "Value": "default", "Message": "ServiceAccount not used by pods or RBAC bindings" }, { "Namespace": "kube-node-lease", "Resource": "serviceaccount/default", "Value": "default", "Message": "ServiceAccount not used by pods or RBAC bindings" }, { "Namespace": "kube-public", "Resource": "serviceaccount/default", "Value": "default", "Message": "ServiceAccount not used by pods or RBAC bindings" } ] }, "AKSBP008": { "ID": "AKSBP008", "Severity": "Medium", "URL": "https://learn.microsoft.com/azure/aks/auto-upgrade-cluster?tabs=azure-cli", "FailMessage": "", "Name": "Auto Upgrade Channel Configured", "Recommendation": "Auto Upgrade Channel Configured is enabled.", "Status": "✅ PASS", "Category": "Best Practices", "Total": 0, "Items": null }, "AKSBP007": { "ID": "AKSBP007", "Severity": "High", "URL": "https://learn.microsoft.com/azure/aks/use-system-pools?tabs=azure-cli#system-and-user-node-pools", "FailMessage": "", "Name": "System Node Pool Taint", "Recommendation": "System Node Pool Taint is enabled.", "Status": "✅ PASS", "Category": "Best Practices", "Total": 0, "Items": null }, "AKSBP009": { "ID": "AKSBP009", "Severity": "Medium", "URL": "https://learn.microsoft.com/azure/aks/auto-upgrade-node-os-image?tabs=azure-cli", "FailMessage": "", "Name": "Node OS Upgrade Channel Configured", "Recommendation": "Node OS Upgrade Channel Configured is enabled.", "Status": "✅ PASS", "Category": "Best Practices", "Total": 0, "Items": null }, "SEC004": { "Total": 37, "URL": "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted", "Name": "Privileged Containers", "Description": "Detects containers running with privileged mode enabled.", "Recommendation": "Avoid using privileged containers unless absolutely necessary, as they grant broad access to host resources.", "Weight": 5, "ID": "SEC004", "ResourceKind": "Pod", "Section": "Security", "Category": "Pod Security", "Severity": "High", "Items": [ { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-2l2wl", "Value": "privileged=true", "Message": "Container 'secrets-store' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-6w2vp", "Value": "privileged=true", "Message": "Container 'secrets-store' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-7879c", "Value": "privileged=true", "Message": "Container 'secrets-store' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-m8m29", "Value": "privileged=true", "Message": "Container 'secrets-store' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-vnmcd", "Value": "privileged=true", "Message": "Container 'secrets-store' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-csi-driver-zrfbz", "Value": "privileged=true", "Message": "Container 'secrets-store' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-4v8mz", "Value": "privileged=true", "Message": "Container 'ama-logs' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-4v8mz", "Value": "privileged=true", "Message": "Container 'ama-logs-prometheus' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-5vr2w", "Value": "privileged=true", "Message": "Container 'ama-logs' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-5vr2w", "Value": "privileged=true", "Message": "Container 'ama-logs-prometheus' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-fmd7b", "Value": "privileged=true", "Message": "Container 'ama-logs' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-fmd7b", "Value": "privileged=true", "Message": "Container 'ama-logs-prometheus' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-fpkw6", "Value": "privileged=true", "Message": "Container 'ama-logs' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-fpkw6", "Value": "privileged=true", "Message": "Container 'ama-logs-prometheus' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-gqs28", "Value": "privileged=true", "Message": "Container 'ama-logs' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-gqs28", "Value": "privileged=true", "Message": "Container 'ama-logs-prometheus' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-ndxrw", "Value": "privileged=true", "Message": "Container 'ama-logs' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-ndxrw", "Value": "privileged=true", "Message": "Container 'ama-logs-prometheus' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/ama-logs-rs-64765bd4b9-ldxwl", "Value": "privileged=true", "Message": "Container 'ama-logs' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-26xkd", "Value": "privileged=true", "Message": "Container 'kube-proxy' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-26xkd", "Value": "privileged=true", "Message": "Container 'kube-proxy-bootstrap' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-6mrql", "Value": "privileged=true", "Message": "Container 'kube-proxy' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-6mrql", "Value": "privileged=true", "Message": "Container 'kube-proxy-bootstrap' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-9rbxf", "Value": "privileged=true", "Message": "Container 'kube-proxy' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-9rbxf", "Value": "privileged=true", "Message": "Container 'kube-proxy-bootstrap' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-njzgk", "Value": "privileged=true", "Message": "Container 'kube-proxy' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-njzgk", "Value": "privileged=true", "Message": "Container 'kube-proxy-bootstrap' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-rvmxl", "Value": "privileged=true", "Message": "Container 'kube-proxy' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-rvmxl", "Value": "privileged=true", "Message": "Container 'kube-proxy-bootstrap' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-vp7xj", "Value": "privileged=true", "Message": "Container 'kube-proxy' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-vp7xj", "Value": "privileged=true", "Message": "Container 'kube-proxy-bootstrap' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/retina-agent-cgv48", "Value": "privileged=true", "Message": "Container 'retina-agent-init' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/retina-agent-gjxk8", "Value": "privileged=true", "Message": "Container 'retina-agent-init' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/retina-agent-js76w", "Value": "privileged=true", "Message": "Container 'retina-agent-init' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/retina-agent-lfn7d", "Value": "privileged=true", "Message": "Container 'retina-agent-init' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/retina-agent-qc9bs", "Value": "privileged=true", "Message": "Container 'retina-agent-init' is running in privileged mode" }, { "Namespace": "kube-system", "Resource": "pod/retina-agent-wlt7b", "Value": "privileged=true", "Message": "Container 'retina-agent-init' is running in privileged mode" } ] }, "NS003": { "Total": 32, "URL": "https://kubernetes.io/docs/concepts/policy/limit-range/", "Name": "Missing LimitRanges", "Description": "Detects namespaces without a defined LimitRange.", "Recommendation": "Define default CPU and memory limits to avoid unbounded pod usage.", "Weight": 2, "ID": "NS003", "ResourceKind": "limitranges", "Section": "Namespaces", "Category": "Namespaces", "Severity": "medium", "Items": [ { "Namespace": "1", "Issue": "❌ No LimitRange" }, { "Namespace": "10", "Issue": "❌ No LimitRange" }, { "Namespace": "2", "Issue": "❌ No LimitRange" }, { "Namespace": "3", "Issue": "❌ No LimitRange" }, { "Namespace": "4", "Issue": "❌ No LimitRange" }, { "Namespace": "5", "Issue": "❌ No LimitRange" }, { "Namespace": "6", "Issue": "❌ No LimitRange" }, { "Namespace": "7", "Issue": "❌ No LimitRange" }, { "Namespace": "8", "Issue": "❌ No LimitRange" }, { "Namespace": "9", "Issue": "❌ No LimitRange" }, { "Namespace": "aks-istio-egress", "Issue": "❌ No LimitRange" }, { "Namespace": "aks-istio-ingress", "Issue": "❌ No LimitRange" }, { "Namespace": "aks-istio-system", "Issue": "❌ No LimitRange" }, { "Namespace": "app-routing-system", "Issue": "❌ No LimitRange" }, { "Namespace": "argo-rollouts", "Issue": "❌ No LimitRange" }, { "Namespace": "argo-workflows", "Issue": "❌ No LimitRange" }, { "Namespace": "argocd", "Issue": "❌ No LimitRange" }, { "Namespace": "cert-manager", "Issue": "❌ No LimitRange" }, { "Namespace": "default", "Issue": "❌ No LimitRange" }, { "Namespace": "gatekeeper-system", "Issue": "❌ No LimitRange" }, { "Namespace": "grafana", "Issue": "❌ No LimitRange" }, { "Namespace": "kiali-operator", "Issue": "❌ No LimitRange" }, { "Namespace": "kube-node-lease", "Issue": "❌ No LimitRange" }, { "Namespace": "kube-public", "Issue": "❌ No LimitRange" }, { "Namespace": "kube-system", "Issue": "❌ No LimitRange" }, { "Namespace": "kubeview", "Issue": "❌ No LimitRange" }, { "Namespace": "linkerd", "Issue": "❌ No LimitRange" }, { "Namespace": "nginx", "Issue": "❌ No LimitRange" }, { "Namespace": "pets", "Issue": "❌ No LimitRange" }, { "Namespace": "prometheus", "Issue": "❌ No LimitRange" }, { "Namespace": "sealed-secrets", "Issue": "❌ No LimitRange" }, { "Namespace": "test", "Issue": "❌ No LimitRange" } ] }, "AKSSEC002": { "ID": "AKSSEC002", "Severity": "Medium", "URL": "https://learn.microsoft.com/azure/aks/policy-reference", "FailMessage": "", "Name": "Azure Policy Add-on", "Recommendation": "Azure Policy Add-on is enabled.", "Status": "✅ PASS", "Category": "Security", "Total": 0, "Items": null }, "SEC001": { "Total": 10, "URL": "https://kubernetes.io/docs/concepts/configuration/secret/", "Name": "Orphaned Secrets", "Description": "Detects Secrets not used by any workloads, ingresses, service accounts, or known custom resources.", "Recommendation": "Review and remove unused Secrets to reduce surface area and limit stale credentials.", "Weight": 2, "ID": "SEC001", "ResourceKind": "Secret", "Section": "Security", "Category": "Security", "Severity": "Medium", "Items": [ { "Namespace": "aks-istio-system", "Resource": "secret/istio-ca-secret", "Value": "istio-ca-secret", "Message": "Secret appears unused across workloads, ingresses, service accounts, or CRs" }, { "Namespace": "argocd", "Resource": "secret/argocd-initial-admin-secret", "Value": "argocd-initial-admin-secret", "Message": "Secret appears unused across workloads, ingresses, service accounts, or CRs" }, { "Namespace": "argocd", "Resource": "secret/argocd-notifications-secret", "Value": "argocd-notifications-secret", "Message": "Secret appears unused across workloads, ingresses, service accounts, or CRs" }, { "Namespace": "argocd", "Resource": "secret/argocd-secret", "Value": "argocd-secret", "Message": "Secret appears unused across workloads, ingresses, service accounts, or CRs" }, { "Namespace": "argocd", "Resource": "secret/repo-1114886772", "Value": "repo-1114886772", "Message": "Secret appears unused across workloads, ingresses, service accounts, or CRs" }, { "Namespace": "argocd", "Resource": "secret/repo-1952242182", "Value": "repo-1952242182", "Message": "Secret appears unused across workloads, ingresses, service accounts, or CRs" }, { "Namespace": "kube-system", "Resource": "secret/aad-msi-auth-token", "Value": "aad-msi-auth-token", "Message": "Secret appears unused across workloads, ingresses, service accounts, or CRs" }, { "Namespace": "kube-system", "Resource": "secret/azure-policy-webhook-cert", "Value": "azure-policy-webhook-cert", "Message": "Secret appears unused across workloads, ingresses, service accounts, or CRs" }, { "Namespace": "kube-system", "Resource": "secret/extensions-aad-msi-token", "Value": "extensions-aad-msi-token", "Message": "Secret appears unused across workloads, ingresses, service accounts, or CRs" }, { "Namespace": "kube-system", "Resource": "secret/omsagent-aad-msi-token", "Value": "omsagent-aad-msi-token", "Message": "Secret appears unused across workloads, ingresses, service accounts, or CRs" } ] }, "NET003": { "Total": 0, "URL": "https://kubernetes.io/docs/concepts/services-networking/ingress/", "Name": "Ingress Health Validation", "Description": "Validates ingress definitions for missing classes, invalid backends, missing TLS secrets, duplicate host/path entries, and incorrect path types.", "Recommendation": "Fix invalid ingress definitions including missing TLS secrets, backend services, and path issues.", "Weight": 3, "ID": "NET003", "Message": "No issues detected for Ingress Health Validation.", "ResourceKind": "Ingress", "Section": "Networking", "Category": "Networking", "Severity": "High", "Items": [] }, "AKSMON002": { "ID": "AKSMON002", "Severity": "High", "URL": "https://learn.microsoft.com/azure/azure-monitor/essentials/prometheus-metrics-overview", "FailMessage": "", "Name": "Managed Prometheus Enabled", "Recommendation": "Managed Prometheus Enabled is enabled.", "Status": "✅ PASS", "Category": "Monitoring & Logging", "Total": 0, "Items": null }, "AKSSEC004": { "ID": "AKSSEC004", "Severity": "Medium", "URL": "https://learn.microsoft.com/azure/aks/workload-identity-deploy-cluster", "FailMessage": "", "Name": "OIDC Issuer Enabled", "Recommendation": "OIDC Issuer Enabled is enabled.", "Status": "✅ PASS", "Category": "Security", "Total": 0, "Items": null }, "AKSBP006": { "ID": "AKSBP006", "Severity": "Medium", "URL": "https://learn.microsoft.com/azure/aks/concepts-storage#managed-os-disks", "FailMessage": "", "Name": "Non-Ephemeral Disks with Adequate Size", "Recommendation": "Non-Ephemeral Disks with Adequate Size is enabled.", "Status": "✅ PASS", "Category": "Best Practices", "Total": 0, "Items": null }, "SEC015": { "Total": 20, "URL": "https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/", "Name": "Pods Using Default ServiceAccount", "Description": "Flags pods using the default service account, which may have broad permissions.", "Recommendation": "Assign a dedicated ServiceAccount to each workload with least-privilege permissions.", "Weight": 3, "ID": "SEC015", "ResourceKind": "Pod", "Section": "Security", "Category": "Pod Security", "Severity": "Medium", "Items": [ { "Namespace": "argo-rollouts", "Pod": "simple-deployment-74fd649f8d-996vt", "ServiceAccount": "default", "Issue": "Using default ServiceAccount" }, { "Namespace": "argo-workflows", "Pod": "simple-deployment-74fd649f8d-24t56", "ServiceAccount": "default", "Issue": "Using default ServiceAccount" }, { "Namespace": "cert-manager", "Pod": "simple-deployment-74fd649f8d-7cht8", "ServiceAccount": "default", "Issue": "Using default ServiceAccount" }, { "Namespace": "grafana", "Pod": "simple-deployment-74fd649f8d-l7wrd", "ServiceAccount": "default", "Issue": "Using default ServiceAccount" }, { "Namespace": "kube-system", "Pod": "azure-ip-masq-agent-4522j", "ServiceAccount": "default", "Issue": "Using default ServiceAccount" }, { "Namespace": "kube-system", "Pod": "azure-ip-masq-agent-4c7cr", "ServiceAccount": "default", "Issue": "Using default ServiceAccount" }, { "Namespace": "kube-system", "Pod": "azure-ip-masq-agent-78rnw", "ServiceAccount": "default", "Issue": "Using default ServiceAccount" }, { "Namespace": "kube-system", "Pod": "azure-ip-masq-agent-84ltn", "ServiceAccount": "default", "Issue": "Using default ServiceAccount" }, { "Namespace": "kube-system", "Pod": "azure-ip-masq-agent-t4c2w", "ServiceAccount": "default", "Issue": "Using default ServiceAccount" }, { "Namespace": "kube-system", "Pod": "azure-ip-masq-agent-vbdd8", "ServiceAccount": "default", "Issue": "Using default ServiceAccount" }, { "Namespace": "kubeview", "Pod": "simple-deployment-74fd649f8d-qxp2r", "ServiceAccount": "default", "Issue": "Using default ServiceAccount" }, { "Namespace": "linkerd", "Pod": "simple-deployment-74fd649f8d-mkmst", "ServiceAccount": "default", "Issue": "Using default ServiceAccount" }, { "Namespace": "nginx", "Pod": "simple-deployment-74fd649f8d-hlcdk", "ServiceAccount": "default", "Issue": "Using default ServiceAccount" }, { "Namespace": "pets", "Pod": "order-service-6c5bfb6946-b58xq", "ServiceAccount": "default", "Issue": "Using default ServiceAccount" }, { "Namespace": "pets", "Pod": "product-service-5dd87dfb8-ssfxc", "ServiceAccount": "default", "Issue": "Using default ServiceAccount" }, { "Namespace": "pets", "Pod": "rabbitmq-0", "ServiceAccount": "default", "Issue": "Using default ServiceAccount" }, { "Namespace": "pets", "Pod": "store-front-658994fd95-pk9qn", "ServiceAccount": "default", "Issue": "Using default ServiceAccount" }, { "Namespace": "prometheus", "Pod": "simple-deployment-74fd649f8d-2x6w5", "ServiceAccount": "default", "Issue": "Using default ServiceAccount" }, { "Namespace": "sealed-secrets", "Pod": "simple-deployment-74fd649f8d-stktp", "ServiceAccount": "default", "Issue": "Using default ServiceAccount" }, { "Namespace": "test", "Pod": "simple-deployment-74fd649f8d-lhlkx", "ServiceAccount": "default", "Issue": "Using default ServiceAccount" } ] }, "AKSIAM002": { "ID": "AKSIAM002", "Severity": "High", "URL": "https://learn.microsoft.com/azure/aks/use-managed-identity", "FailMessage": "", "Name": "Managed Identity", "Recommendation": "Managed Identity is enabled.", "Status": "✅ PASS", "Category": "Identity & Access", "Total": 0, "Items": null }, "CFG003": { "Total": 0, "URL": "https://kubernetes.io/docs/concepts/configuration/configmap/", "Name": "Large ConfigMaps", "Description": "Finds ConfigMaps larger than 1 MiB, which may impact performance or exceed platform limits.", "Recommendation": "Avoid storing large data in ConfigMaps. Consider using PersistentVolumes or Secrets instead.", "Weight": 2, "ID": "CFG003", "Message": "No issues detected for Large ConfigMaps.", "ResourceKind": "ConfigMap", "Section": "Configuration Hygiene", "Category": "Best Practices", "Severity": "Medium", "Items": [] }, "NET001": { "Total": 3, "URL": "https://kubernetes.io/docs/concepts/services-networking/service/", "Name": "Services Without Endpoints", "Description": "Identifies services that have no backing endpoints, which means no pods are matched.", "Recommendation": "Check if the service selector matches any pods. Ensure the backing pods are running and ready.", "Weight": 2, "ID": "NET001", "ResourceKind": "Service", "Section": "Networking", "Category": "Networking", "Severity": "High", "Items": [ { "Namespace": "kube-system", "Resource": "service/extension-agent-metrics-service", "Value": "extension-agent-metrics-service", "Message": "No endpoints available" }, { "Namespace": "kube-system", "Resource": "service/extension-operator-metrics-service", "Value": "extension-operator-metrics-service", "Message": "No endpoints available" }, { "Namespace": "kube-system", "Resource": "service/network-observability", "Value": "network-observability", "Message": "No endpoints available" } ] }, "AKSNET002": { "ID": "AKSNET002", "Severity": "Medium", "URL": "https://learn.microsoft.com/azure/aks/operator-best-practices-network#control-traffic-flow-with-network-policies", "FailMessage": "", "Name": "Network Policy Check", "Recommendation": "Network Policy Check is enabled.", "Status": "✅ PASS", "Category": "Networking", "Total": 0, "Items": null }, "WRK001": { "Total": 0, "URL": "https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/", "Name": "DaemonSets Not Fully Running", "Description": "Detects DaemonSets that have fewer running pods than desired.", "Recommendation": "Investigate DaemonSets not fully running. Common causes include taints, node issues, or resource constraints.", "Weight": 2, "ID": "WRK001", "Message": "No issues detected for DaemonSets Not Fully Running.", "ResourceKind": "DaemonSet", "Section": "Workloads", "Category": "Workloads", "Severity": "Warning", "Items": [] }, "AKSSEC08": { "ID": "AKSSEC08", "Severity": "High", "URL": "https://learn.microsoft.com/en-us/azure/aks/use-psa", "FailMessage": "Pod Security Admission is not enabled on this cluster. This may reduce baseline pod security.", "Name": "Pod Security Admission Enabled", "Recommendation": "Enable Pod Security Admission by setting 'podSecurityAdmissionConfiguration' during cluster creation or via supported upgrade path.", "Status": "❌ FAIL", "Category": "Security", "Total": 1, "Items": { "Issue": "Enable Pod Security Admission by setting 'podSecurityAdmissionConfiguration' during cluster creation or via supported upgrade path.", "Resource": "Pod Security Admission Enabled" } }, "EVENT002": { "Total": 0, "URL": "https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.28/#event-v1-core", "Name": "Full Warning Event Log", "Description": "Lists all recent Warning events in the cluster.", "Recommendation": "Review recent warnings. Correlate events with impacted resources.", "Weight": 1, "ID": "EVENT002", "Message": "No issues detected for Full Warning Event Log.", "ResourceKind": "events", "Section": "Kubernetes Events", "Category": "Events", "Severity": "medium", "Items": [] }, "AKSIAM004": { "ID": "AKSIAM004", "Severity": "High", "URL": "https://learn.microsoft.com/azure/aks/use-managed-identity", "FailMessage": "", "Name": "Managed Identity Used", "Recommendation": "Managed Identity Used is enabled.", "Status": "✅ PASS", "Category": "Identity & Access", "Total": 0, "Items": null }, "CFG002": { "Total": 2, "URL": "https://kubernetes.io/docs/concepts/configuration/configmap/", "Name": "Duplicate ConfigMap Names", "Description": "Detects ConfigMaps with identical names across different namespaces.", "Recommendation": "Avoid using the same ConfigMap name across namespaces to reduce confusion and misconfiguration risk.", "Weight": 1, "ID": "CFG002", "ResourceKind": "ConfigMap", "Section": "Configuration Hygiene", "Category": "Best Practices", "Severity": "Medium", "Items": [ { "Namespace": "-", "Resource": "istio-ca-root-cert", "Value": "-", "Message": "Found in namespaces: 1, 10, 2, 3, 4, 5, 6, 7, 8, 9, aks-istio-egress, aks-istio-ingress, aks-istio-system, app-routing-system, argo-rollouts, argo-workflows, argocd, cert-manager, default, gatekeeper-system, grafana, kiali-operator, kube-system, kubeview, linkerd, nginx, pets, prometheus, sealed-secrets, test" }, { "Namespace": "-", "Resource": "kube-root-ca.crt", "Value": "-", "Message": "Found in namespaces: 1, 10, 2, 3, 4, 5, 6, 7, 8, 9, aks-istio-egress, aks-istio-ingress, aks-istio-system, app-routing-system, argo-rollouts, argo-workflows, argocd, cert-manager, default, gatekeeper-system, grafana, kiali-operator, kube-node-lease, kube-public, kube-system, kubeview, linkerd, nginx, pets, prometheus, sealed-secrets, test" } ] }, "SEC013": { "Total": 98, "URL": "https://kubernetes.io/docs/concepts/storage/volumes/#emptydir", "Name": "EmptyDir Volume Usage", "Description": "EmptyDir volumes are ephemeral and cleared on pod restart. Use only if data persistence is not needed.\n", "Recommendation": "Use persistent volumes or configMaps instead of EmptyDir when persistence is required.", "Weight": 1, "ID": "SEC013", "ResourceKind": "Pod", "Section": "Security", "Category": "Pod Security", "Severity": "Low", "Items": [ { "Namespace": "aks-istio-ingress", "Pod": "aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-hdfn4", "Volume": "workload-socket", "Issue": "EmptyDir volume used" }, { "Namespace": "aks-istio-ingress", "Pod": "aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-hdfn4", "Volume": "credential-socket", "Issue": "EmptyDir volume used" }, { "Namespace": "aks-istio-ingress", "Pod": "aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-hdfn4", "Volume": "workload-certs", "Issue": "EmptyDir volume used" }, { "Namespace": "aks-istio-ingress", "Pod": "aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-hdfn4", "Volume": "istio-envoy", "Issue": "EmptyDir volume used" }, { "Namespace": "aks-istio-ingress", "Pod": "aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-hdfn4", "Volume": "istio-data", "Issue": "EmptyDir volume used" }, { "Namespace": "aks-istio-ingress", "Pod": "aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-zqwtb", "Volume": "workload-socket", "Issue": "EmptyDir volume used" }, { "Namespace": "aks-istio-ingress", "Pod": "aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-zqwtb", "Volume": "credential-socket", "Issue": "EmptyDir volume used" }, { "Namespace": "aks-istio-ingress", "Pod": "aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-zqwtb", "Volume": "workload-certs", "Issue": "EmptyDir volume used" }, { "Namespace": "aks-istio-ingress", "Pod": "aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-zqwtb", "Volume": "istio-envoy", "Issue": "EmptyDir volume used" }, { "Namespace": "aks-istio-ingress", "Pod": "aks-istio-ingressgateway-external-asm-1-23-59bd5fbf44-zqwtb", "Volume": "istio-data", "Issue": "EmptyDir volume used" }, { "Namespace": "aks-istio-system", "Pod": "istiod-asm-1-23-7744d5fbf4-9572m", "Volume": "local-certs", "Issue": "EmptyDir volume used" }, { "Namespace": "aks-istio-system", "Pod": "istiod-asm-1-23-7744d5fbf4-rqzvt", "Volume": "local-certs", "Issue": "EmptyDir volume used" }, { "Namespace": "argocd", "Pod": "argocd-application-controller-0", "Volume": "argocd-home", "Issue": "EmptyDir volume used" }, { "Namespace": "argocd", "Pod": "argocd-application-controller-0", "Volume": "argocd-application-controller-tmp", "Issue": "EmptyDir volume used" }, { "Namespace": "argocd", "Pod": "argocd-applicationset-controller-6fdf84dbb6-msffz", "Volume": "gpg-keyring", "Issue": "EmptyDir volume used" }, { "Namespace": "argocd", "Pod": "argocd-applicationset-controller-6fdf84dbb6-msffz", "Volume": "tmp", "Issue": "EmptyDir volume used" }, { "Namespace": "argocd", "Pod": "argocd-dex-server-556c76889-h4kxj", "Volume": "static-files", "Issue": "EmptyDir volume used" }, { "Namespace": "argocd", "Pod": "argocd-dex-server-556c76889-h4kxj", "Volume": "dexconfig", "Issue": "EmptyDir volume used" }, { "Namespace": "argocd", "Pod": "argocd-redis-ha-haproxy-fb657456c-kjbkq", "Volume": "shared-socket", "Issue": "EmptyDir volume used" }, { "Namespace": "argocd", "Pod": "argocd-redis-ha-haproxy-fb657456c-kjbkq", "Volume": "data", "Issue": "EmptyDir volume used" }, { "Namespace": "argocd", "Pod": "argocd-redis-ha-haproxy-fb657456c-kjlpf", "Volume": "shared-socket", "Issue": "EmptyDir volume used" }, { "Namespace": "argocd", "Pod": "argocd-redis-ha-haproxy-fb657456c-kjlpf", "Volume": "data", "Issue": "EmptyDir volume used" }, { "Namespace": "argocd", "Pod": "argocd-redis-ha-haproxy-fb657456c-tnjmb", "Volume": "shared-socket", "Issue": "EmptyDir volume used" }, { "Namespace": "argocd", "Pod": "argocd-redis-ha-haproxy-fb657456c-tnjmb", "Volume": "data", "Issue": "EmptyDir volume used" }, { "Namespace": "argocd", "Pod": "argocd-redis-ha-server-0", "Volume": "data", "Issue": "EmptyDir volume used" }, { "Namespace": "argocd", "Pod": "argocd-redis-ha-server-1", "Volume": "data", "Issue": "EmptyDir volume used" }, { "Namespace": "argocd", "Pod": "argocd-redis-ha-server-2", "Volume": "data", "Issue": "EmptyDir volume used" }, { "Namespace": "argocd", "Pod": "argocd-repo-server-8568fc89b5-sx6ks", "Volume": "gpg-keyring", "Issue": "EmptyDir volume used" }, { "Namespace": "argocd", "Pod": "argocd-repo-server-8568fc89b5-sx6ks", "Volume": "tmp", "Issue": "EmptyDir volume used" }, { "Namespace": "argocd", "Pod": "argocd-repo-server-8568fc89b5-sx6ks", "Volume": "helm-working-dir", "Issue": "EmptyDir volume used" }, { "Namespace": "argocd", "Pod": "argocd-repo-server-8568fc89b5-sx6ks", "Volume": "var-files", "Issue": "EmptyDir volume used" }, { "Namespace": "argocd", "Pod": "argocd-repo-server-8568fc89b5-sx6ks", "Volume": "plugins", "Issue": "EmptyDir volume used" }, { "Namespace": "argocd", "Pod": "argocd-repo-server-8568fc89b5-xrzzn", "Volume": "gpg-keyring", "Issue": "EmptyDir volume used" }, { "Namespace": "argocd", "Pod": "argocd-repo-server-8568fc89b5-xrzzn", "Volume": "tmp", "Issue": "EmptyDir volume used" }, { "Namespace": "argocd", "Pod": "argocd-repo-server-8568fc89b5-xrzzn", "Volume": "helm-working-dir", "Issue": "EmptyDir volume used" }, { "Namespace": "argocd", "Pod": "argocd-repo-server-8568fc89b5-xrzzn", "Volume": "var-files", "Issue": "EmptyDir volume used" }, { "Namespace": "argocd", "Pod": "argocd-repo-server-8568fc89b5-xrzzn", "Volume": "plugins", "Issue": "EmptyDir volume used" }, { "Namespace": "argocd", "Pod": "argocd-server-54f9645b87-k4rz8", "Volume": "plugins-home", "Issue": "EmptyDir volume used" }, { "Namespace": "argocd", "Pod": "argocd-server-54f9645b87-k4rz8", "Volume": "tmp", "Issue": "EmptyDir volume used" }, { "Namespace": "argocd", "Pod": "argocd-server-54f9645b87-wwzgz", "Volume": "plugins-home", "Issue": "EmptyDir volume used" }, { "Namespace": "argocd", "Pod": "argocd-server-54f9645b87-wwzgz", "Volume": "tmp", "Issue": "EmptyDir volume used" }, { "Namespace": "gatekeeper-system", "Pod": "gatekeeper-audit-77858c8f69-7k782", "Volume": "tmp-volume", "Issue": "EmptyDir volume used" }, { "Namespace": "kiali-operator", "Pod": "kiali-operator-696bd54db-mr8md", "Volume": "tmp", "Issue": "EmptyDir volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-4v8mz", "Volume": "mdsd-prometheus-sock", "Issue": "EmptyDir volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-5vr2w", "Volume": "mdsd-prometheus-sock", "Issue": "EmptyDir volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-fmd7b", "Volume": "mdsd-prometheus-sock", "Issue": "EmptyDir volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-fpkw6", "Volume": "mdsd-prometheus-sock", "Issue": "EmptyDir volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-gqs28", "Volume": "mdsd-prometheus-sock", "Issue": "EmptyDir volume used" }, { "Namespace": "kube-system", "Pod": "ama-logs-ndxrw", "Volume": "mdsd-prometheus-sock", "Issue": "EmptyDir volume used" }, { "Namespace": "kube-system", "Pod": "ama-metrics-operator-targets-66fb46c8d6-vskdg", "Volume": "ta-config-shared", "Issue": "EmptyDir volume used" }, { "Namespace": "kube-system", "Pod": "azure-npm-jsbbh", "Volume": "tmp", "Issue": "EmptyDir volume used" }, { "Namespace": "kube-system", "Pod": "azure-npm-lp6sf", "Volume": "tmp", "Issue": "EmptyDir volume used" }, { "Namespace": "kube-system", "Pod": "azure-npm-nv6xx", "Volume": "tmp", "Issue": "EmptyDir volume used" }, { "Namespace": "kube-system", "Pod": "azure-npm-p6fpw", "Volume": "tmp", "Issue": "EmptyDir volume used" }, { "Namespace": "kube-system", "Pod": "azure-npm-vsrfp", "Volume": "tmp", "Issue": "EmptyDir volume used" }, { "Namespace": "kube-system", "Pod": "azure-npm-z8mcz", "Volume": "tmp", "Issue": "EmptyDir volume used" }, { "Namespace": "kube-system", "Pod": "coredns-658d6d767d-757xp", "Volume": "tmp", "Issue": "EmptyDir volume used" }, { "Namespace": "kube-system", "Pod": "coredns-658d6d767d-pt6l6", "Volume": "tmp", "Issue": "EmptyDir volume used" }, { "Namespace": "kube-system", "Pod": "metrics-server-5f9ccffcc4-jsrjl", "Volume": "tmp-dir", "Issue": "EmptyDir volume used" }, { "Namespace": "kube-system", "Pod": "metrics-server-5f9ccffcc4-v88pw", "Volume": "tmp-dir", "Issue": "EmptyDir volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-6xdfq", "Volume": "ebpf", "Issue": "EmptyDir volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-89l74", "Volume": "ebpf", "Issue": "EmptyDir volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-d7gwk", "Volume": "ebpf", "Issue": "EmptyDir volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-mdcs8", "Volume": "ebpf", "Issue": "EmptyDir volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-q6d6c", "Volume": "ebpf", "Issue": "EmptyDir volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-collector-ds-wb5dm", "Volume": "ebpf", "Issue": "EmptyDir volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-2ql5b", "Volume": "fluent-bit-conf", "Issue": "EmptyDir volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-2rsrw", "Volume": "fluent-bit-conf", "Issue": "EmptyDir volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-jj6dh", "Volume": "fluent-bit-conf", "Issue": "EmptyDir volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-l5crs", "Volume": "fluent-bit-conf", "Issue": "EmptyDir volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-lfk8h", "Volume": "fluent-bit-conf", "Issue": "EmptyDir volume used" }, { "Namespace": "kube-system", "Pod": "microsoft-defender-publisher-ds-vz2c6", "Volume": "fluent-bit-conf", "Issue": "EmptyDir volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-cgv48", "Volume": "tmp", "Issue": "EmptyDir volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-gjxk8", "Volume": "tmp", "Issue": "EmptyDir volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-js76w", "Volume": "tmp", "Issue": "EmptyDir volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-lfn7d", "Volume": "tmp", "Issue": "EmptyDir volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-qc9bs", "Volume": "tmp", "Issue": "EmptyDir volume used" }, { "Namespace": "kube-system", "Pod": "retina-agent-wlt7b", "Volume": "tmp", "Issue": "EmptyDir volume used" }, { "Namespace": "pets", "Pod": "order-service-6c5bfb6946-b58xq", "Volume": "workload-socket", "Issue": "EmptyDir volume used" }, { "Namespace": "pets", "Pod": "order-service-6c5bfb6946-b58xq", "Volume": "credential-socket", "Issue": "EmptyDir volume used" }, { "Namespace": "pets", "Pod": "order-service-6c5bfb6946-b58xq", "Volume": "workload-certs", "Issue": "EmptyDir volume used" }, { "Namespace": "pets", "Pod": "order-service-6c5bfb6946-b58xq", "Volume": "istio-envoy", "Issue": "EmptyDir volume used" }, { "Namespace": "pets", "Pod": "order-service-6c5bfb6946-b58xq", "Volume": "istio-data", "Issue": "EmptyDir volume used" }, { "Namespace": "pets", "Pod": "product-service-5dd87dfb8-ssfxc", "Volume": "workload-socket", "Issue": "EmptyDir volume used" }, { "Namespace": "pets", "Pod": "product-service-5dd87dfb8-ssfxc", "Volume": "credential-socket", "Issue": "EmptyDir volume used" }, { "Namespace": "pets", "Pod": "product-service-5dd87dfb8-ssfxc", "Volume": "workload-certs", "Issue": "EmptyDir volume used" }, { "Namespace": "pets", "Pod": "product-service-5dd87dfb8-ssfxc", "Volume": "istio-envoy", "Issue": "EmptyDir volume used" }, { "Namespace": "pets", "Pod": "product-service-5dd87dfb8-ssfxc", "Volume": "istio-data", "Issue": "EmptyDir volume used" }, { "Namespace": "pets", "Pod": "rabbitmq-0", "Volume": "workload-socket", "Issue": "EmptyDir volume used" }, { "Namespace": "pets", "Pod": "rabbitmq-0", "Volume": "credential-socket", "Issue": "EmptyDir volume used" }, { "Namespace": "pets", "Pod": "rabbitmq-0", "Volume": "workload-certs", "Issue": "EmptyDir volume used" }, { "Namespace": "pets", "Pod": "rabbitmq-0", "Volume": "istio-envoy", "Issue": "EmptyDir volume used" }, { "Namespace": "pets", "Pod": "rabbitmq-0", "Volume": "istio-data", "Issue": "EmptyDir volume used" }, { "Namespace": "pets", "Pod": "store-front-658994fd95-pk9qn", "Volume": "workload-socket", "Issue": "EmptyDir volume used" }, { "Namespace": "pets", "Pod": "store-front-658994fd95-pk9qn", "Volume": "credential-socket", "Issue": "EmptyDir volume used" }, { "Namespace": "pets", "Pod": "store-front-658994fd95-pk9qn", "Volume": "workload-certs", "Issue": "EmptyDir volume used" }, { "Namespace": "pets", "Pod": "store-front-658994fd95-pk9qn", "Volume": "istio-envoy", "Issue": "EmptyDir volume used" }, { "Namespace": "pets", "Pod": "store-front-658994fd95-pk9qn", "Volume": "istio-data", "Issue": "EmptyDir volume used" } ] }, "SEC002": { "Total": 36, "URL": "https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline", "Name": "Pods using hostPID or hostNetwork", "Description": "Flags pods that share the host's PID or network namespace, which can compromise isolation and node security.", "Recommendation": "Avoid using hostPID or hostNetwork unless strictly required. These settings reduce isolation and can expose the host.", "Weight": 4, "ID": "SEC002", "ResourceKind": "Pod", "Section": "Security", "Category": "Pods", "Severity": "High", "Items": [ { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-provider-azure-68nhw", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-provider-azure-7bqmn", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-provider-azure-7r458", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-provider-azure-k9tdc", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-provider-azure-n952g", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" }, { "Namespace": "kube-system", "Resource": "pod/aks-secrets-store-provider-azure-njpqh", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" }, { "Namespace": "kube-system", "Resource": "pod/azure-ip-masq-agent-4522j", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" }, { "Namespace": "kube-system", "Resource": "pod/azure-ip-masq-agent-4c7cr", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" }, { "Namespace": "kube-system", "Resource": "pod/azure-ip-masq-agent-78rnw", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" }, { "Namespace": "kube-system", "Resource": "pod/azure-ip-masq-agent-84ltn", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" }, { "Namespace": "kube-system", "Resource": "pod/azure-ip-masq-agent-t4c2w", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" }, { "Namespace": "kube-system", "Resource": "pod/azure-ip-masq-agent-vbdd8", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" }, { "Namespace": "kube-system", "Resource": "pod/azure-npm-jsbbh", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" }, { "Namespace": "kube-system", "Resource": "pod/azure-npm-lp6sf", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" }, { "Namespace": "kube-system", "Resource": "pod/azure-npm-nv6xx", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" }, { "Namespace": "kube-system", "Resource": "pod/azure-npm-p6fpw", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" }, { "Namespace": "kube-system", "Resource": "pod/azure-npm-vsrfp", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" }, { "Namespace": "kube-system", "Resource": "pod/azure-npm-z8mcz", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" }, { "Namespace": "kube-system", "Resource": "pod/cloud-node-manager-57rk2", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" }, { "Namespace": "kube-system", "Resource": "pod/cloud-node-manager-gl5xl", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" }, { "Namespace": "kube-system", "Resource": "pod/cloud-node-manager-l7v5j", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" }, { "Namespace": "kube-system", "Resource": "pod/cloud-node-manager-lr49d", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" }, { "Namespace": "kube-system", "Resource": "pod/cloud-node-manager-n5qdr", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" }, { "Namespace": "kube-system", "Resource": "pod/cloud-node-manager-xwrrd", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-26xkd", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-6mrql", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-9rbxf", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-njzgk", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-rvmxl", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" }, { "Namespace": "kube-system", "Resource": "pod/kube-proxy-vp7xj", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" }, { "Namespace": "kube-system", "Resource": "pod/retina-agent-cgv48", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" }, { "Namespace": "kube-system", "Resource": "pod/retina-agent-gjxk8", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" }, { "Namespace": "kube-system", "Resource": "pod/retina-agent-js76w", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" }, { "Namespace": "kube-system", "Resource": "pod/retina-agent-lfn7d", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" }, { "Namespace": "kube-system", "Resource": "pod/retina-agent-qc9bs", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" }, { "Namespace": "kube-system", "Resource": "pod/retina-agent-wlt7b", "Value": "hostPID=False, hostNetwork=True", "Message": "Pod uses hostNetwork" } ] }, "POD005": { "Total": 0, "URL": "https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#restart-policy", "Name": "CrashLoopBackOff Pods", "Description": "Identifies pods stuck in a CrashLoopBackOff state due to repeated container crashes.", "Recommendation": "Check logs, investigate container errors, and fix misconfigurations.", "Weight": 4, "ID": "POD005", "Message": "No issues detected for CrashLoopBackOff Pods.", "ResourceKind": "Pod", "Section": "Pods", "Category": "Workloads", "Severity": "Error", "Items": [] }, "JOB002": { "Total": 0, "URL": "https://kubernetes.io/docs/concepts/workloads/controllers/job/#handling-pod-and-container-failures", "Name": "Failed Kubernetes Jobs", "Description": "Detects jobs with failures and no successful completions.", "Recommendation": "Review job logs and resource constraints to identify cause of failure.", "Weight": 3, "ID": "JOB002", "Message": "No issues detected for Failed Kubernetes Jobs.", "ResourceKind": "jobs", "Section": "Jobs", "Category": "Jobs", "Severity": "high", "Items": [] }, "NET002": { "Total": 4, "URL": "https://kubernetes.io/docs/concepts/services-networking/service/#publishing-services", "Name": "Publicly Accessible Services", "Description": "Detects services of type LoadBalancer or NodePort that are potentially exposed to the internet.", "Recommendation": "Audit services of type LoadBalancer or NodePort. Limit exposure with firewalls or internal IP ranges.", "Weight": 4, "ID": "NET002", "ResourceKind": "Service", "Section": "Networking", "Category": "Networking", "Severity": "High", "Items": [ { "Namespace": "aks-istio-ingress", "Resource": "service/aks-istio-ingressgateway-external", "Value": "LoadBalancer", "Message": "Exposed via external IP: 131.145.32.126" }, { "Namespace": "app-routing-system", "Resource": "service/nginx", "Value": "LoadBalancer", "Message": "Exposed via external IP: 4.250.59.60" }, { "Namespace": "pets", "Resource": "service/store-front", "Value": "LoadBalancer", "Message": "Exposed via external IP: 85.210.102.171" }, { "Namespace": "test", "Resource": "service/simple-service", "Value": "NodePort", "Message": "Exposed via NodePort" } ] } } } |