fullstop
fullstop copied to clipboard
UNSECURED_PUBLIC_ENDPOINT violations: Hard to track offending application on K8s
Expected behavior
When I see a UNSECURED_PUBLIC_ENDPOINT violation I want to see the offending applications. In terms of a Kubernetes deployment I only see the ELB with an autogenerated ID, but I would like to see the offending application id.
Step needed
From there you need to know how to resolve the application, e.g. with zkubectl get svc -o wide
or by looking up the security group in the AWS console.
It would be nice if this could be done in fullstop already.
Dependencies
K8s apis?
@alexkops you can see all the calls zkubectl (kubectl) does, if you pass --v=9.
API to query to get the information from the default namespace: https://
Thanks for raising the issue. Currently Fullstop has no dedicated K8S support, but just applies its normal rule set to the AWS accounts where the clusters are hosted. We need to improve here.
PR #520 ignores the Kubernetes ELBs for now. We need to rework a good part of that check anyway, since it does not cover ELBv2 at the moment :-/