Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Issue number:
Fixes #1151
Description of changes:
Revise access rules for inotify, dnotify, and fanotify, as the policy previously blocked pods from collecting journal logs.
Adjust initial SIDs for network entities, as a preliminary step toward blocking network access from containers to the host.
Fix logic error in sets of subject types, which I uncovered while adding audit rules to log access to host sockets.
Testing done:
Ran the sonobuoy tests for the aws-k8s-1.18 variant (x86_64, aarch64). Test suite passed. Tested Cilium, Falco, EBS CSI driver, and the local storage provisioner on x86_64. Confirmed that the Cloudwatch Container Insights agent can collect journal logs. Ran a task for the aws-ecs-1 variant using the ECS CLI.
Verified in all cases that no new AVC denials were logged in
dmesg
or in the journal.Terms of contribution:
By submitting this pull request, I agree that this contribution is dual-licensed under the terms of both the Apache License, version 2.0, and the MIT license.