KubeLinter

KubeLinter

Community Analyzer
Missing NetworkPolicy for deployment-like objects KUBELIN-W1033
Anti-pattern
Major

Alert on deployment-like objects that are not selected by any NetworkPolicy.

Missing dnsConfig options in deployments KUBELIN-W1011
Anti-pattern
Major

Alert on deployments that have no specified dnsConfig options

PodDisruptionBudget with maxUnavailable value preventing disruptions KUBELIN-W1034
Anti-pattern
Major

Indicates when a PodDisruptionBudget has a maxUnavailable value that will always prevent disruptions of pods created by related deployment-like objects.

docker.sock volume mounted in containers KUBELIN-W1012
Anti-pattern
Major

Alert on deployments with docker.sock mounted in containers.

Container with NET_RAW capability KUBELIN-W1013
Anti-pattern
Major

Indicates when containers do not drop NET_RAW capability

Duplicate env vars dedicated KUBELIN-W1014
Anti-pattern
Major

Check that duplicate named env vars aren't passed to a deployment like.

Insecure use of secrets in environment variables KUBELIN-W1015
Anti-pattern
Major

Indicates when objects use a secret in an environment variable.

Forbidden service types for exposed services KUBELIN-W1016
Anti-pattern
Major

Alert on services for forbidden types

Pods sharing host's network namespace KUBELIN-W1018
Anti-pattern
Major

Alert on pods/deployment-likes with sharing host's network namespace

Missing readiness probe KUBELIN-W1030
Anti-pattern
Major

Indicates when containers fail to specify a readiness probe.

Missing rolling update strategy KUBELIN-W1031
Anti-pattern
Major

Indicates when a deployment doesn't use a rolling update strategy

Invalid service account reference KUBELIN-W1032
Anti-pattern
Major

Indicates when pods reference a service account that is not found.

Unrestricted access to create pods KUBELIN-W1001
Anti-pattern
Major

Indicates when a subject (Group/User/ServiceAccount) has create access to Pods. CIS Benchmark 5.1.4: The ability to create pods in a cluster opens up possibilities for privilege escalation and should be restricted, where possible.

Unrestricted access to Secrets KUBELIN-W1002
Anti-pattern
Major

Indicates when a subject (Group/User/ServiceAccount) has access to Secrets. CIS Benchmark 5.1.2: Access to secrets should be restricted to the smallest possible group of users to reduce the risk of privilege escalation.

cluster admin role should be used only where required KUBELIN-W1003
Anti-pattern
Major

CIS Benchmark 5.1.1 Ensure that the cluster-admin role is only used where required

Missing scaleTargetRef in HorizontalPodAutoscaler KUBELIN-W1004
Anti-pattern
Major

Indicates when HorizontalPodAutoscalers target a missing resource.

Ingress without associated services KUBELIN-W1005
Anti-pattern
Major

Indicates when ingress do not have any associated services.

NetworkPolicy without associated deployments KUBELIN-W1006
Anti-pattern
Major

Indicates when networkpolicies do not have any associated deployments.

Misconfigured NetworkPolicyPeer podSelectors KUBELIN-W1007
Anti-pattern
Major

Indicates when NetworkPolicyPeer in Egress/Ingress rules -in the Spec of NetworkPolicy- do not have any associated deployments. Applied on peer specified with podSelectors only.

Missing deployment for service KUBELIN-W1008
Anti-pattern
Major

Indicates when services do not have any associated deployments.