Description
Network Observability in Kubernetes based on eBPF.
- https://github.com/netobserv/netobserv-operator
- https://github.com/netobserv/flowlogs-pipeline
- https://github.com/netobserv/netobserv-ebpf-agent
- https://github.com/netobserv/netobserv-web-console
- https://github.com/netobserv/netobserv-cli
Overview
| Identity | Namespace | Automount | Secrets | Permissions | Workloads | Risk |
|---|---|---|---|---|---|---|
netobserv-controller-manager | default | ❌ | — | 48 | 1 | Critical |
netobserv-operator-grafana | default | ✅ | — | 2 | 5 | Critical |
netobserv-operator-kube-pr-operator | default | ✅ | — | 37 | 1 | Critical |
netobserv-operator-kube-state-metrics | default | ✅ | — | 32 | 2 | Critical |
netobserv-operator-prometheus-server | default | ❌ | — | 12 | 2 | Critical |
netobserv-operator-promtail | default | ✅ | — | 5 | 1 | Critical |
netobserv-operator-filebeat | default | ❌ | — | 5 | 1 | Low |
netobserv-operator-fluent-bit-loki | default | ✅ | — | 2 | 1 | Low |
netobserv-operator-grafana-test | default | ❌ | — | 1 | 2 | Low |
netobserv-operator-kube-pr-admission | default | ✅ | — | 3 | 2 | Low |
netobserv-operator-kube-pr-prometheus | default | ✅ | — | 7 | 0 | Low |
netobserv-operator-alertmanager | default | ❌ | — | 0 | 1 | — |
netobserv-operator-kube-pr-alertmanager | default | ✅ | — | 0 | 0 | — |
netobserv-operator-loki | default | ✅ | — | 0 | 1 | — |
netobserv-operator-prometheus-node-exporter | default | ❌ | — | 0 | 1 | — |
netobserv-operator-prometheus-pushgateway | default | ❌ | — | 0 | 1 | — |
netobserv-operator-prometheus-windows-exporter | default | ❌ | — | 0 | 1 | — |
Numbers in the last two columns indicate how many bindings or workloads involve each ServiceAccount.
Identities
🤖 netobserv-controller-manager
Namespace: default | Automount: ❌
🔑 Permissions (48)
| Role | Resource | Verbs | Risk | Tags |
|---|---|---|---|---|
ClusterRole netobserv-manager-role | core/configmaps | create · delete · get · list · patch · update · watch | Critical | ConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation Tampering |
ClusterRole netobserv-manager-role | apps/daemonsets | create · delete · get · list · patch · update · watch | Critical | NodeAccess Persistence PrivilegeEscalation Tampering WorkloadLifecycle |
ClusterRole netobserv-manager-role | apps/deployments | create · delete · get · list · patch · update · watch | Critical | Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering WorkloadLifecycle |
Role netobserv-leader-election-role | coordination.k8s.io/leases | create · delete · get · list · patch · update · watch | Critical | ControlPlaneDisruption CriticalNamespace DenialOfService Tampering |
ClusterRole netobserv-manager-role | networking.k8s.io/networkpolicies | create · delete · get · list · patch · update · watch | Critical | DenialOfService LateralMovement NetworkManipulation NetworkPolicyManagement Tampering |
ClusterRole netobserv-manager-role | core/secrets | create · delete · get · list · patch · update · watch | Critical | ClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure Persistence (+4 more) |
ClusterRole netobserv-manager-role | core/services | create · delete · get · list · patch · update · watch | Critical | DenialOfService NetworkManipulation ServiceExposure Tampering |
Role netobserv-leader-election-role | core/configmaps | create · delete · get · list · patch · update · watch | High | ConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation Tampering |
ClusterRole netobserv-manager-role | core/namespaces | create · delete · get · list · patch · update · watch | High | ClusterStructure DenialOfService InformationDisclosure NamespaceLifecycle Reconnaissance (+1 more) |
ClusterRole netobserv-manager-role | core/serviceaccounts | create · delete · get · list · patch · update · watch | High | IdentityManagement PotentialPrivilegeEscalation Tampering |
ClusterRole netobserv-manager-role | rbac.authorization.k8s.io/clusterrolebindings | create · delete · get · list · update · watch | Medium | InformationDisclosure RBACQuery Reconnaissance |
ClusterRole netobserv-manager-role | rbac.authorization.k8s.io/rolebindings | create · delete · get · list · update · watch | Medium | InformationDisclosure RBACQuery Reconnaissance |
ClusterRole netobserv-manager-role | authorization.k8s.io/subjectaccessreviews | create | Medium | InformationDisclosure RBACQuery |
ClusterRole netobserv-manager-role | authentication.k8s.io/tokenreviews | create | Medium | CredentialAccess InformationDisclosure RBACQuery |
ClusterRole netobserv-manager-role | apiregistration.k8s.io/apiservices | get · list · watch | Low | |
ClusterRole netobserv-manager-role | bpfman.io/clusterbpfapplications | create · delete · get · list · patch · update · watch | Low | |
ClusterRole netobserv-manager-role | bpfman.io/clusterbpfapplications/status | get · patch · update | Low | |
ClusterRole netobserv-manager-role | k8s.ovn.org/clusteruserdefinednetworks | get · list · watch | Low | |
ClusterRole netobserv-manager-role | config.openshift.io/clusterversions | get · list · watch | Low | |
ClusterRole netobserv-manager-role | console.openshift.io/consoleplugins | create · delete · get · list · patch · update · watch | Low | |
ClusterRole netobserv-manager-role | operator.openshift.io/consoles | get · list · update · watch | Low | |
ClusterRole netobserv-manager-role | apiextensions.k8s.io/customresourcedefinitions | get · list · watch | Low | |
ClusterRole netobserv-manager-role | apiextensions.k8s.io/customresourcedefinitions/status | patch · update | Low | |
ClusterRole netobserv-manager-role | core/endpoints | get · list · watch | Low | |
ClusterRole netobserv-manager-role | discovery.k8s.io/endpointslices | get · list · watch | Low | |
Role netobserv-leader-election-role | core/events | create · patch | Low | |
ClusterRole netobserv-manager-role | flows.netobserv.io/flowcollectors | create · delete · get · list · patch · update · watch | Low | |
ClusterRole netobserv-manager-role | flows.netobserv.io/flowcollectors/finalizers | update | Low | |
ClusterRole netobserv-manager-role | flows.netobserv.io/flowcollectors/status | get · patch · update | Low | |
ClusterRole netobserv-manager-role | flows.netobserv.io/flowcollectorslices | create · delete · get · list · patch · update · watch | Low | |
ClusterRole netobserv-manager-role | flows.netobserv.io/flowcollectorslices/status | get · patch · update | Low | |
ClusterRole netobserv-manager-role | flows.netobserv.io/flowmetrics | create · delete · get · list · patch · update · watch | Low | |
ClusterRole netobserv-manager-role | flows.netobserv.io/flowmetrics/status | get · patch · update | Low | |
ClusterRole netobserv-manager-role | autoscaling/horizontalpodautoscalers | create · delete · get · list · patch · update · watch | Low | |
ClusterRole netobserv-manager-role | loki.grafana.com/lokistacks | get · list · watch | Low | |
ClusterRole netobserv-manager-role | config.openshift.io/networks | get · list · watch | Low | |
ClusterRole netobserv-manager-role | operator.openshift.io/networks | get · list · watch | Low | |
ClusterRole netobserv-manager-role | core/nodes | get · list · watch | Low | |
ClusterRole netobserv-manager-role | core/persistentvolumeclaims | create · delete · get · list · patch · update · watch | Low | |
ClusterRole netobserv-manager-role | core/pods | get · list · watch | Low | |
ClusterRole netobserv-manager-role | metrics.k8s.io/pods | create | Low | |
ClusterRole netobserv-manager-role | monitoring.coreos.com/prometheusrules | create · delete · get · list · patch · update · watch | Low | |
ClusterRole netobserv-manager-role | apps/replicasets | get · list · watch | Low | |
ClusterRole netobserv-manager-role | security.openshift.io/securitycontextconstraints | create · list · update · watch | Low | |
ClusterRole netobserv-manager-role | monitoring.coreos.com/servicemonitors | create · delete · get · list · patch · update · watch | Low | |
ClusterRole netobserv-manager-role | k8s.ovn.org/userdefinednetworks | get · list · watch | Low | |
ClusterRole netobserv-manager-role | security.openshift.io/securitycontextconstraints (restricted to: hostnetwork) | use | Low | ResourceNameRestricted |
ClusterRole netobserv-manager-role | loki.grafana.com/network (restricted to: logs) | create | Low | ResourceNameRestricted |
⚠️ Potential Abuse (25)
The following security risks were found based on the above permissions:
- Read secrets cluster-wide
- Read secrets in a namespace
- Modify secrets cluster-wide
- Modify secrets in a namespace
- Read ConfigMaps cluster-wide
- Read ConfigMaps in a namespace
- Modify ConfigMaps cluster-wide
- Modify ConfigMaps in a namespace
- Delete namespaces
- Manage Deployments cluster-wide (potential for privileged pod execution)
- Manage Deployments in a namespace (potential for privileged pod execution)
- Manage DaemonSets cluster-wide (runs on all nodes, high impact)
- Manage DaemonSets in a namespace (runs on nodes, high impact)
- Create TokenReviews (validate arbitrary tokens)
- Create SubjectAccessReviews (check arbitrary permissions)
- Manage ServiceAccounts cluster-wide
- Manage ServiceAccounts in a namespace
- Manage NetworkPolicies cluster-wide
- Manage NetworkPolicies in a namespace
- Manage Services cluster-wide
- Manage Services in a namespace
- Read RBAC configuration cluster-wide
- Manage Leases in kube-system or kube-node-lease namespace
- List Namespaces (Cluster Reconnaissance)
📦 Workloads (1)
| Kind | Name | Container | Image |
|---|---|---|---|
| Deployment | netobserv-controller-manager | manager | quay.io/netobserv/network-observability-operator:1.11.2-community |
🤖 netobserv-operator-kube-pr-operator
Namespace: default | Automount: ✅
🔑 Permissions (37)
| Role | Resource | Verbs | Risk | Tags |
|---|---|---|---|---|
ClusterRole netobserv-operator-kube-pr-operator | core/configmaps | * | Critical | ClusterWideAccess ConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation (+2 more) |
ClusterRole netobserv-operator-kube-pr-operator | core/secrets | * | Critical | ClusterWideAccess ClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure (+6 more) |
ClusterRole netobserv-operator-kube-pr-operator | apps/statefulsets | * | Critical | ClusterWideAccess Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering (+2 more) |
ClusterRole netobserv-operator-kube-pr-operator | monitoring.coreos.com/alertmanagerconfigs | * | High | ClusterWideAccess |
ClusterRole netobserv-operator-kube-pr-operator | monitoring.coreos.com/alertmanagers | * | High | ClusterWideAccess |
ClusterRole netobserv-operator-kube-pr-operator | monitoring.coreos.com/alertmanagers/finalizers | * | High | ClusterWideAccess |
ClusterRole netobserv-operator-kube-pr-operator | monitoring.coreos.com/alertmanagers/status | * | High | ClusterWideAccess |
ClusterRole netobserv-operator-kube-pr-operator | monitoring.coreos.com/podmonitors | * | High | ClusterWideAccess |
ClusterRole netobserv-operator-kube-pr-operator | monitoring.coreos.com/podmonitors/status | * | High | ClusterWideAccess |
ClusterRole netobserv-operator-kube-pr-operator | monitoring.coreos.com/probes | * | High | ClusterWideAccess |
ClusterRole netobserv-operator-kube-pr-operator | monitoring.coreos.com/probes/status | * | High | ClusterWideAccess |
ClusterRole netobserv-operator-kube-pr-operator | monitoring.coreos.com/prometheusagents | * | High | ClusterWideAccess |
ClusterRole netobserv-operator-kube-pr-operator | monitoring.coreos.com/prometheusagents/finalizers | * | High | ClusterWideAccess |
ClusterRole netobserv-operator-kube-pr-operator | monitoring.coreos.com/prometheusagents/status | * | High | ClusterWideAccess |
ClusterRole netobserv-operator-kube-pr-operator | monitoring.coreos.com/prometheuses | * | High | ClusterWideAccess |
ClusterRole netobserv-operator-kube-pr-operator | monitoring.coreos.com/prometheuses/finalizers | * | High | ClusterWideAccess |
ClusterRole netobserv-operator-kube-pr-operator | monitoring.coreos.com/prometheuses/status | * | High | ClusterWideAccess |
ClusterRole netobserv-operator-kube-pr-operator | monitoring.coreos.com/prometheusrules | * | High | ClusterWideAccess |
ClusterRole netobserv-operator-kube-pr-operator | monitoring.coreos.com/prometheusrules/status | * | High | ClusterWideAccess |
ClusterRole netobserv-operator-kube-pr-operator | monitoring.coreos.com/scrapeconfigs | * | High | ClusterWideAccess |
ClusterRole netobserv-operator-kube-pr-operator | monitoring.coreos.com/scrapeconfigs/status | * | High | ClusterWideAccess |
ClusterRole netobserv-operator-kube-pr-operator | monitoring.coreos.com/servicemonitors | * | High | ClusterWideAccess |
ClusterRole netobserv-operator-kube-pr-operator | monitoring.coreos.com/servicemonitors/status | * | High | ClusterWideAccess |
ClusterRole netobserv-operator-kube-pr-operator | monitoring.coreos.com/thanosrulers | * | High | ClusterWideAccess |
ClusterRole netobserv-operator-kube-pr-operator | monitoring.coreos.com/thanosrulers/finalizers | * | High | ClusterWideAccess |
ClusterRole netobserv-operator-kube-pr-operator | monitoring.coreos.com/thanosrulers/status | * | High | ClusterWideAccess |
ClusterRole netobserv-operator-kube-pr-operator | core/endpoints | create · delete · get · update | Low | |
ClusterRole netobserv-operator-kube-pr-operator | discovery.k8s.io/endpointslices | create · delete · get · list · update · watch | Low | |
ClusterRole netobserv-operator-kube-pr-operator | core/events | create · patch | Low | |
ClusterRole netobserv-operator-kube-pr-operator | events.k8s.io/events | create · patch | Low | |
ClusterRole netobserv-operator-kube-pr-operator | networking.k8s.io/ingresses | get · list · watch | Low | |
ClusterRole netobserv-operator-kube-pr-operator | core/namespaces | get · list · watch | Low | ClusterStructure InformationDisclosure Reconnaissance |
ClusterRole netobserv-operator-kube-pr-operator | core/nodes | list · watch | Low | |
ClusterRole netobserv-operator-kube-pr-operator | core/pods | delete · list | Low | |
ClusterRole netobserv-operator-kube-pr-operator | core/services | create · delete · get · update | Low | |
ClusterRole netobserv-operator-kube-pr-operator | core/services/finalizers | create · delete · get · update | Low | |
ClusterRole netobserv-operator-kube-pr-operator | storage.k8s.io/storageclasses | get | Low |
⚠️ Potential Abuse (13)
The following security risks were found based on the above permissions:
- Read secrets cluster-wide
- Read secrets in a namespace
- Modify secrets cluster-wide
- Modify secrets in a namespace
- Read ConfigMaps cluster-wide
- Read ConfigMaps in a namespace
- Modify ConfigMaps cluster-wide
- Modify ConfigMaps in a namespace
- Manage StatefulSets cluster-wide
- Manage StatefulSets in a namespace
- List Namespaces (Cluster Reconnaissance)
📦 Workloads (1)
| Kind | Name | Container | Image |
|---|---|---|---|
| Deployment | netobserv-operator-kube-pr-operator | kube-prometheus-stack | quay.io/prometheus-operator/prometheus-operator:v0.87.1 |
🤖 netobserv-operator-kube-state-metrics
Namespace: default | Automount: ✅
🔑 Permissions (32)
| Role | Resource | Verbs | Risk | Tags |
|---|---|---|---|---|
ClusterRole netobserv-operator-kube-state-metrics | core/secrets | list · watch | Critical | ClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure SecretAccess |
ClusterRole netobserv-operator-kube-state-metrics | core/configmaps | list · watch | High | ConfigMapAccess DataExposure InformationDisclosure |
ClusterRole netobserv-operator-kube-state-metrics | admissionregistration.k8s.io/mutatingwebhookconfigurations | list · watch | Medium | InformationDisclosure Reconnaissance WebhookReconnaissance |
ClusterRole netobserv-operator-kube-state-metrics | core/resourcequotas | list · watch | Medium | InformationDisclosure QuotaTampering Reconnaissance ResourceConfiguration |
ClusterRole netobserv-operator-kube-state-metrics | admissionregistration.k8s.io/validatingwebhookconfigurations | list · watch | Medium | InformationDisclosure Reconnaissance WebhookReconnaissance |
ClusterRole netobserv-operator-kube-state-metrics | certificates.k8s.io/certificatesigningrequests | list · watch | Low | |
ClusterRole netobserv-operator-kube-state-metrics | batch/cronjobs | list · watch | Low | |
ClusterRole netobserv-operator-kube-state-metrics | apps/daemonsets | list · watch | Low | |
ClusterRole netobserv-operator-kube-state-metrics | extensions/daemonsets | list · watch | Low | |
ClusterRole netobserv-operator-kube-state-metrics | apps/deployments | list · watch | Low | |
ClusterRole netobserv-operator-kube-state-metrics | extensions/deployments | list · watch | Low | |
ClusterRole netobserv-operator-kube-state-metrics | core/endpoints | list · watch | Low | |
ClusterRole netobserv-operator-kube-state-metrics | autoscaling/horizontalpodautoscalers | list · watch | Low | |
ClusterRole netobserv-operator-kube-state-metrics | extensions/ingresses | list · watch | Low | |
ClusterRole netobserv-operator-kube-state-metrics | networking.k8s.io/ingresses | list · watch | Low | |
ClusterRole netobserv-operator-kube-state-metrics | batch/jobs | list · watch | Low | |
ClusterRole netobserv-operator-kube-state-metrics | coordination.k8s.io/leases | list · watch | Low | |
ClusterRole netobserv-operator-kube-state-metrics | core/limitranges | list · watch | Low | InformationDisclosure Reconnaissance ResourceConfiguration |
ClusterRole netobserv-operator-kube-state-metrics | core/namespaces | list · watch | Low | ClusterStructure InformationDisclosure Reconnaissance |
ClusterRole netobserv-operator-kube-state-metrics | networking.k8s.io/networkpolicies | list · watch | Low | |
ClusterRole netobserv-operator-kube-state-metrics | core/nodes | list · watch | Low | |
ClusterRole netobserv-operator-kube-state-metrics | core/persistentvolumeclaims | list · watch | Low | |
ClusterRole netobserv-operator-kube-state-metrics | core/persistentvolumes | list · watch | Low | |
ClusterRole netobserv-operator-kube-state-metrics | policy/poddisruptionbudgets | list · watch | Low | |
ClusterRole netobserv-operator-kube-state-metrics | core/pods | list · watch | Low | |
ClusterRole netobserv-operator-kube-state-metrics | apps/replicasets | list · watch | Low | |
ClusterRole netobserv-operator-kube-state-metrics | extensions/replicasets | list · watch | Low | |
ClusterRole netobserv-operator-kube-state-metrics | core/replicationcontrollers | list · watch | Low | |
ClusterRole netobserv-operator-kube-state-metrics | core/services | list · watch | Low | |
ClusterRole netobserv-operator-kube-state-metrics | apps/statefulsets | list · watch | Low | |
ClusterRole netobserv-operator-kube-state-metrics | storage.k8s.io/storageclasses | list · watch | Low | |
ClusterRole netobserv-operator-kube-state-metrics | storage.k8s.io/volumeattachments | list · watch | Low |
⚠️ Potential Abuse (11)
The following security risks were found based on the above permissions:
- Read secrets cluster-wide
- Read secrets in a namespace
- Read ConfigMaps cluster-wide
- Read ConfigMaps in a namespace
- List Namespaces (Cluster Reconnaissance)
- List ValidatingWebhookConfigurations (Reconnaissance)
- List MutatingWebhookConfigurations (Reconnaissance)
- Read LimitRanges (Namespace Information Disclosure)
- Read ResourceQuotas (Namespace Information Disclosure)
- Read All ResourceQuotas (Cluster-wide Information Disclosure)
📦 Workloads (2)
| Kind | Name | Container | Image |
|---|---|---|---|
| Deployment | netobserv-operator-kube-state-metrics | kube-state-metrics | registry.k8s.io/kube-state-metrics/kube-state-metrics:v2.17.0 |
| Deployment | netobserv-operator-kube-state-metrics | kube-state-metrics | registry.k8s.io/kube-state-metrics/kube-state-metrics:v2.8.0 |
🤖 netobserv-operator-prometheus-server
Namespace: default | Automount: ❌
🔑 Permissions (12)
| Role | Resource | Verbs | Risk | Tags |
|---|---|---|---|---|
ClusterRole netobserv-operator-prometheus-server | core/nodes/proxy | get · list · watch | Critical | ClusterAdminAccess CodeExecution ElevationOfPrivilege LateralMovement (+1 more) |
ClusterRole netobserv-operator-prometheus-server | core/configmaps | get · list · watch | High | ConfigMapAccess DataExposure InformationDisclosure |
ClusterRole netobserv-operator-prometheus-server | core/endpoints | get · list · watch | Low | |
ClusterRole netobserv-operator-prometheus-server | core/ingresses | get · list · watch | Low | |
ClusterRole netobserv-operator-prometheus-server | extensions/ingresses | get · list · watch | Low | |
ClusterRole netobserv-operator-prometheus-server | networking.k8s.io/ingresses | get · list · watch | Low | |
ClusterRole netobserv-operator-prometheus-server | extensions/ingresses/status | get · list · watch | Low | |
ClusterRole netobserv-operator-prometheus-server | networking.k8s.io/ingresses/status | get · list · watch | Low | |
ClusterRole netobserv-operator-prometheus-server | core/nodes | get · list · watch | Low | |
ClusterRole netobserv-operator-prometheus-server | core/nodes/metrics | get · list · watch | Low | |
ClusterRole netobserv-operator-prometheus-server | core/pods | get · list · watch | Low | |
ClusterRole netobserv-operator-prometheus-server | core/services | get · list · watch | Low |
⚠️ Potential Abuse (4)
The following security risks were found based on the above permissions:
📦 Workloads (2)
| Kind | Name | Container | Image |
|---|---|---|---|
| Deployment | netobserv-operator-prometheus-server | prometheus-server | quay.io/prometheus/prometheus:v2.41.0 |
| Deployment | netobserv-operator-prometheus-server | prometheus-server-configmap-reload | jimmidyson/configmap-reload:v0.8.0 |
🤖 netobserv-operator-promtail
Namespace: default | Automount: ✅
🔑 Permissions (5)
| Role | Resource | Verbs | Risk | Tags |
|---|---|---|---|---|
ClusterRole netobserv-operator-promtail | core/nodes/proxy | get · list · watch | Critical | ClusterAdminAccess CodeExecution ElevationOfPrivilege LateralMovement (+1 more) |
ClusterRole netobserv-operator-promtail | core/endpoints | get · list · watch | Low | |
ClusterRole netobserv-operator-promtail | core/nodes | get · list · watch | Low | |
ClusterRole netobserv-operator-promtail | core/pods | get · list · watch | Low | |
ClusterRole netobserv-operator-promtail | core/services | get · list · watch | Low |
⚠️ Potential Abuse (2)
The following security risks were found based on the above permissions:
📦 Workloads (1)
| Kind | Name | Container | Image |
|---|---|---|---|
| DaemonSet | netobserv-operator-promtail | promtail | docker.io/grafana/promtail:3.5.1 |
🤖 netobserv-operator-grafana
Namespace: default | Automount: ✅
🔑 Permissions (2)
| Role | Resource | Verbs | Risk | Tags |
|---|---|---|---|---|
ClusterRole netobserv-operator-grafana-clusterrole | core/secrets | get · list · watch | Critical | ClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure SecretAccess |
ClusterRole netobserv-operator-grafana-clusterrole | core/configmaps | get · list · watch | High | ConfigMapAccess DataExposure InformationDisclosure |
⚠️ Potential Abuse (5)
The following security risks were found based on the above permissions:
- Read secrets cluster-wide
- Read secrets in a namespace
- Read ConfigMaps cluster-wide
- Read ConfigMaps in a namespace
📦 Workloads (5)
| Kind | Name | Container | Image |
|---|---|---|---|
| Deployment | netobserv-operator-grafana | grafana | /grafana/grafana:10.3.3 |
| Deployment | netobserv-operator-grafana | grafana | docker.io/grafana/grafana:12.3.0 |
| Deployment | netobserv-operator-grafana | grafana-sc-dashboard | quay.io/kiwigrid/k8s-sidecar:2.1.2 |
| Deployment | netobserv-operator-grafana | grafana-sc-datasources | /quay.io/kiwigrid/k8s-sidecar:1.19.2 |
| Deployment | netobserv-operator-grafana | grafana-sc-datasources | quay.io/kiwigrid/k8s-sidecar:2.1.2 |
🤖 netobserv-operator-kube-pr-prometheus
Namespace: default | Automount: ✅
🔑 Permissions (7)
| Role | Resource | Verbs | Risk | Tags |
|---|---|---|---|---|
ClusterRole netobserv-operator-kube-pr-prometheus | core/endpoints | get · list · watch | Low | |
ClusterRole netobserv-operator-kube-pr-prometheus | discovery.k8s.io/endpointslices | get · list · watch | Low | |
ClusterRole netobserv-operator-kube-pr-prometheus | networking.k8s.io/ingresses | get · list · watch | Low | |
ClusterRole netobserv-operator-kube-pr-prometheus | core/nodes | get · list · watch | Low | |
ClusterRole netobserv-operator-kube-pr-prometheus | core/nodes/metrics | get · list · watch | Low | |
ClusterRole netobserv-operator-kube-pr-prometheus | core/pods | get · list · watch | Low | |
ClusterRole netobserv-operator-kube-pr-prometheus | core/services | get · list · watch | Low |
⚠️ Potential Abuse (1)
The following security risks were found based on the above permissions:
📦 Workloads (0)
No workloads use this ServiceAccount.
🤖 netobserv-operator-filebeat
Namespace: default | Automount: ❌
🔑 Permissions (5)
| Role | Resource | Verbs | Risk | Tags |
|---|---|---|---|---|
Role netobserv-operator-filebeat-role | coordination.k8s.io/leases | create · get · update | Low | |
ClusterRole netobserv-operator-filebeat-cluster-role | core/namespaces | get · list · watch | Low | ClusterStructure InformationDisclosure Reconnaissance |
ClusterRole netobserv-operator-filebeat-cluster-role | core/nodes | get · list · watch | Low | |
ClusterRole netobserv-operator-filebeat-cluster-role | core/pods | get · list · watch | Low | |
ClusterRole netobserv-operator-filebeat-cluster-role | apps/replicasets | get · list · watch | Low |
⚠️ Potential Abuse (2)
The following security risks were found based on the above permissions:
📦 Workloads (1)
| Kind | Name | Container | Image |
|---|---|---|---|
| DaemonSet | netobserv-operator-filebeat | filebeat | docker.elastic.co/beats/filebeat:7.17.3 |
🤖 netobserv-operator-kube-pr-admission
Namespace: default | Automount: ✅
🔑 Permissions (3)
| Role | Resource | Verbs | Risk | Tags |
|---|---|---|---|---|
ClusterRole netobserv-operator-kube-pr-admission | admissionregistration.k8s.io/mutatingwebhookconfigurations | get · patch · update | Low | |
Role netobserv-operator-kube-pr-admission | core/secrets | create · get | Low | |
ClusterRole netobserv-operator-kube-pr-admission | admissionregistration.k8s.io/validatingwebhookconfigurations | get · patch · update | Low |
⚠️ Potential Abuse (1)
The following security risks were found based on the above permissions:
📦 Workloads (2)
| Kind | Name | Container | Image |
|---|---|---|---|
| Job | netobserv-operator-kube-pr-admission-create | create | ghcr.io/jkroepke/kube-webhook-certgen:1.7.3 |
| Job | netobserv-operator-kube-pr-admission-patch | patch | ghcr.io/jkroepke/kube-webhook-certgen:1.7.3 |
🤖 netobserv-operator-fluent-bit-loki
Namespace: default | Automount: ✅
🔑 Permissions (2)
| Role | Resource | Verbs | Risk | Tags |
|---|---|---|---|---|
ClusterRole netobserv-operator-fluent-bit-loki-clusterrole | core/namespaces | get · list · watch | Low | ClusterStructure InformationDisclosure Reconnaissance |
ClusterRole netobserv-operator-fluent-bit-loki-clusterrole | core/pods | get · list · watch | Low |
⚠️ Potential Abuse (2)
The following security risks were found based on the above permissions:
📦 Workloads (1)
| Kind | Name | Container | Image |
|---|---|---|---|
| DaemonSet | netobserv-operator-fluent-bit-loki | fluent-bit-loki | grafana/fluent-bit-plugin-loki:2.1.0-amd64 |
🤖 netobserv-operator-grafana-test
Namespace: default | Automount: ❌
🔑 Permissions (1)
| Role | Resource | Verbs | Risk | Tags |
|---|---|---|---|---|
Role netobserv-operator-grafana-test | policy/podsecuritypolicies (restricted to: netobserv-operator-grafana-test) | use | Low | ResourceNameRestricted |
⚠️ Potential Abuse (1)
The following security risks were found based on the above permissions:
📦 Workloads (2)
| Kind | Name | Container | Image |
|---|---|---|---|
| Pod | netobserv-operator-grafana-test | netobserv-operator-test | bats/bats:v1.4.1 |
| Pod | netobserv-operator-grafana-test | netobserv-operator-test | docker.io/bats/bats:v1.4.1 |
🤖 netobserv-operator-alertmanager
Namespace: default | Automount: ❌
🔑 Permissions (0)
No explicit RBAC bindings.
📦 Workloads (1)
| Kind | Name | Container | Image |
|---|---|---|---|
| StatefulSet | netobserv-operator-alertmanager | alertmanager | quay.io/prometheus/alertmanager:v0.25.0 |
🤖 netobserv-operator-kube-pr-alertmanager
Namespace: default | Automount: ✅
🔑 Permissions (0)
No explicit RBAC bindings.
📦 Workloads (0)
No workloads use this ServiceAccount.
🤖 netobserv-operator-loki
Namespace: default | Automount: ✅
🔑 Permissions (0)
No explicit RBAC bindings.
📦 Workloads (1)
| Kind | Name | Container | Image |
|---|---|---|---|
| StatefulSet | netobserv-operator-loki | loki | grafana/loki:2.6.1 |
🤖 netobserv-operator-prometheus-node-exporter
Namespace: default | Automount: ❌
🔑 Permissions (0)
No explicit RBAC bindings.
📦 Workloads (1)
| Kind | Name | Container | Image |
|---|---|---|---|
| DaemonSet | netobserv-operator-prometheus-node-exporter | node-exporter | quay.io/prometheus/node-exporter:v1.10.2 |
🤖 netobserv-operator-prometheus-pushgateway
Namespace: default | Automount: ❌
🔑 Permissions (0)
No explicit RBAC bindings.
📦 Workloads (1)
| Kind | Name | Container | Image |
|---|---|---|---|
| Deployment | netobserv-operator-prometheus-pushgateway | pushgateway | prom/pushgateway:v1.5.1 |
🤖 netobserv-operator-prometheus-windows-exporter
Namespace: default | Automount: ❌
🔑 Permissions (0)
No explicit RBAC bindings.
📦 Workloads (1)
| Kind | Name | Container | Image |
|---|---|---|---|
| DaemonSet | netobserv-operator-prometheus-windows-exporter | windows-exporter | ghcr.io/prometheus-community/windows-exporter:0.31.3 |