turbot/kubernetes_compliance

Query: pod_container_argument_anonymous_auth_disabled

Usage

powerpipe query kubernetes_compliance.query.pod_container_argument_anonymous_auth_disabled

Steampipe Tables

SQL

select
coalesce(uid, concat(path, ':', start_line)) as resource,
case
when (c -> 'command') is null
or not ((c -> 'command') @> '["kubelet"]') then 'ok'
when (c -> 'command') @> '["kubelet"]'
and (c -> 'command') @> '["--anonymous-auth=true"]' then 'alarm'
else 'ok'
end as status,
case
when (c -> 'command') is null then c ->> 'name' || ' command not defined.'
when not ((c -> 'command') @> '["kubelet"]') then c ->> 'name' || ' kubelet not defined.'
when (c -> 'command') @> '["kubelet"]'
and (c -> 'command') @> '["--anonymous-auth=true"]' then c ->> 'name' || ' anonymous auth enabled.'
else c ->> 'name' || ' anonymous auth disabled.'
end as reason,
name as pod_name,
coalesce(context_name, '') as context_name,
namespace,
source_type,
coalesce(path || ':' || start_line || '-' || end_line, '') as path
from
kubernetes_pod,
jsonb_array_elements(containers) as c;

Controls

The query is being used by the following controls: