Audit Scanner - Limitations
Supported event types​
Policies can inspect CREATE
, UPDATE
, and DELETE
events.
The audit scanner can't simulate UPDATE
events, as it doesn't know which part
of the resource requires changing.
So, the audit scanner ignores a policy concerned only with UPDATE
events.
The audit-scanner v1.7.0 release supports only CREATE
events.
DELETE
events will be handled in the near future.
Policies relying on user and user group information​
Each Kubernetes admission request object has information about which user (or ServiceAccount) initiated the event, and to which group they belong.
All the events simulated by the audit scanner originate from the same hard coded user and group. Because of that, policies that rely on these values to make their decisions won't produce meaningful results.
For these cases, configure the policy as not auditable.
Policies relying on external data​
Policies can request and use external data when performing an evaluation. You can evaluate these policies with the audit checks but their outcomes can change depending on the external data.
Usage of *
by policies​
Both the AdmissionPolicy
and the ClusterAdmissionPolicy
custom resources
have the following fields:
spec:
rules:
- apiGroups: [""]
apiVersions: ["v1"]
resources: ["pods"]
operations:
- CREATE
- UPDATE
The apiGroups
, apiVersions
and resources
attributes can use the wildcard *
.
This wildcard symbol causes the policy to match all the values used in the field.
The audit scanner ignores policies that use the *
symbol.