turbot/kubernetes_compliance

Query: cronjob_container_kubelet_certificate_authority_configured

Usage

powerpipe query kubernetes_compliance.query.cronjob_container_kubelet_certificate_authority_configured

Steampipe Tables

SQL

select
coalesce(uid, concat(path, ':', start_line)) as resource,
case
when (c -> 'command') is null then 'ok'
when not (c -> 'command') @> '["kube-apiserver"]' then 'ok'
when (c -> 'command') @> '["kube-apiserver"]'
and (
c ->> 'command' like '%--kubelet-certificate-authority%'
) then 'ok'
else 'alarm'
end as status,
case
when (c -> 'command') is null then ' command not defined.'
when not (c -> 'command') @> '["kube-apiserver"]' then ' kube-apiserver not defined.'
when (c -> 'command') @> '["kube-apiserver"]'
and (
c ->> 'command' like '%--kubelet-certificate-authority%'
) then c ->> 'name' || ' kubelet certificate authority configured.'
else c ->> 'name' || ' kubelet certificate authority not configured.'
end as reason,
name as cronjob_name,
coalesce(context_name, '') as context_name,
namespace,
source_type,
coalesce(path || ':' || start_line || '-' || end_line, '') as path
from
kubernetes_cronjob,
jsonb_array_elements(
job_template -> 'spec' -> 'template' -> 'spec' -> 'containers'
) as c;

Controls

The query is being used by the following controls: