You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
msg := "Ensure that the --kubeconfig kubelet.conf file permissions are set to 600 or more restrictive"
151
+
res := result.new(msg, output)
152
+
}
153
+
```
154
+
155
+
### Compliance Command ID
156
+
157
+
***Note:*** This field is not mandatory, it is relevant to k8s compliance report when node-collector is in use
158
+
159
+
Specify the command ID (#ref) that needs to be executed to collect the information required to evaluate the control.
160
+
161
+
Example of how to define command data under [commands folder](https://github.com/aquasecurity/trivy-checks/tree/main/commands)
162
+
163
+
```yaml
164
+
---
165
+
- id: CMD-0001
166
+
key: kubeletConfFilePermissions
167
+
title: kubelet.conf file permissions
168
+
nodeType: worker
169
+
audit: stat -c %a $kubelet.kubeconfig
170
+
platfroms:
171
+
- k8s
172
+
- aks
173
+
```
174
+
175
+
#### Command ID
176
+
177
+
Find the next command ID by running the command on [trivy-checks project](https://github.com/aquasecurity/trivy-checks).
178
+
179
+
```sh
180
+
make command-id
181
+
```
182
+
183
+
#### Command Key
184
+
185
+
- Re-use an existing key or specifiy a new one (make sure key name has no spaces)
186
+
187
+
Note: The key value should match the key name evaluated by the Rego check.
188
+
189
+
### Command Title
190
+
191
+
Represent the purpose of the command
192
+
193
+
### Command NodeType
194
+
195
+
Specify the node type on which the command is supposed to run.
196
+
197
+
- worker
198
+
- master
199
+
200
+
### Command Audit
201
+
202
+
Specify here the shell command to be used please make sure to add error supression (2>/dev/null)
203
+
204
+
### Command Platforms
205
+
206
+
The list of platforms that support this command. Name should be taken from this list [Platforms](#compliance-platform)
207
+
208
+
### Command Config Files
209
+
210
+
The commands use a configuration file that helps obtain the paths to binaries and configuration files based on different platforms (e.g., Rancher, native Kubernetes, etc.).
211
+
212
+
For example:
213
+
214
+
```yaml
215
+
kubelet:
216
+
bins:
217
+
- kubelet
218
+
- hyperkube kubelet
219
+
confs:
220
+
- /etc/kubernetes/kubelet-config.yaml
221
+
- /var/lib/kubelet/config.yaml
222
+
```
223
+
224
+
### Commands Files Location
225
+
226
+
Currently checks files location are :`https://github.com/aquasecurity/trivy-checks/tree/main/checks`
--list-all-pkgs output all packages in the JSON report regardless of vulnerability
72
72
--misconfig-scanners strings comma-separated list of misconfig scanners to use for misconfiguration scanning (default [azure-arm,cloudformation,dockerfile,helm,kubernetes,terraform,terraformplan-json,terraformplan-snapshot])
73
73
--no-progress suppress progress bar
74
-
--node-collector-imageref string indicate the image reference for the node-collector scan job (default "ghcr.io/aquasecurity/node-collector:0.2.1")
74
+
--node-collector-imageref string indicate the image reference for the node-collector scan job (default "ghcr.io/aquasecurity/node-collector:0.3.1")
75
75
--node-collector-namespace string specify the namespace in which the node-collector job should be deployed (default "trivy-temp")
76
76
--offline-scan do not issue API requests to identify dependencies
0 commit comments