prometheus-operator
Description
DEPRECATED - This chart will be renamed. See https://github.com/prometheus-community/community/issues/28#issuecomment-670406329
- https://github.com/coreos/kube-prometheus
- https://github.com/coreos/prometheus-operator
- https://coreos.com/operators/prometheus
Overview
| Identity | Namespace | Automount | Secrets | Permissions | Workloads | Risk |
|---|---|---|---|---|---|---|
prometheus-operator-grafana | default | ❌ | — | 3 | 2 | Critical |
prometheus-operator-kube-state-metrics | default | ❌ | — | 32 | 1 | Critical |
prometheus-operator-operator | default | ❌ | — | 20 | 2 | Critical |
prometheus-operator-prometheus | default | ❌ | — | 9 | 0 | Critical |
prometheus-operator-admission | default | ❌ | — | 4 | 2 | Low |
prometheus-operator-alertmanager | default | ❌ | — | 1 | 0 | Low |
prometheus-operator-grafana-test | default | ❌ | — | 1 | 1 | Low |
prometheus-operator-prometheus-node-exporter | default | ❌ | — | 1 | 1 | Low |
Numbers in the last two columns indicate how many bindings or workloads involve each ServiceAccount.
Identities
🤖 prometheus-operator-kube-state-metrics
Namespace: default | Automount: ❌
🔑 Permissions (32)
| Role | Resource | Verbs | Risk | Tags |
|---|---|---|---|---|
ClusterRole prometheus-operator-kube-state-metrics | core/secrets | list · watch | Critical | ClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure SecretAccess |
ClusterRole prometheus-operator-kube-state-metrics | core/configmaps | list · watch | High | ConfigMapAccess DataExposure InformationDisclosure |
ClusterRole prometheus-operator-kube-state-metrics | admissionregistration.k8s.io/mutatingwebhookconfigurations | list · watch | Medium | InformationDisclosure Reconnaissance WebhookReconnaissance |
ClusterRole prometheus-operator-kube-state-metrics | core/resourcequotas | list · watch | Medium | InformationDisclosure QuotaTampering Reconnaissance ResourceConfiguration |
ClusterRole prometheus-operator-kube-state-metrics | admissionregistration.k8s.io/validatingwebhookconfigurations | list · watch | Medium | InformationDisclosure Reconnaissance WebhookReconnaissance |
ClusterRole prometheus-operator-kube-state-metrics | certificates.k8s.io/certificatesigningrequests | list · watch | Low | |
ClusterRole prometheus-operator-kube-state-metrics | batch/cronjobs | list · watch | Low | |
ClusterRole prometheus-operator-kube-state-metrics | apps/daemonsets | list · watch | Low | |
ClusterRole prometheus-operator-kube-state-metrics | extensions/daemonsets | list · watch | Low | |
ClusterRole prometheus-operator-kube-state-metrics | apps/deployments | list · watch | Low | |
ClusterRole prometheus-operator-kube-state-metrics | extensions/deployments | list · watch | Low | |
ClusterRole prometheus-operator-kube-state-metrics | core/endpoints | list · watch | Low | |
ClusterRole prometheus-operator-kube-state-metrics | autoscaling/horizontalpodautoscalers | list · watch | Low | |
ClusterRole prometheus-operator-kube-state-metrics | extensions/ingresses | list · watch | Low | |
ClusterRole prometheus-operator-kube-state-metrics | networking.k8s.io/ingresses | list · watch | Low | |
ClusterRole prometheus-operator-kube-state-metrics | batch/jobs | list · watch | Low | |
ClusterRole prometheus-operator-kube-state-metrics | core/limitranges | list · watch | Low | InformationDisclosure Reconnaissance ResourceConfiguration |
ClusterRole prometheus-operator-kube-state-metrics | core/namespaces | list · watch | Low | ClusterStructure InformationDisclosure Reconnaissance |
ClusterRole prometheus-operator-kube-state-metrics | networking.k8s.io/networkpolicies | list · watch | Low | |
ClusterRole prometheus-operator-kube-state-metrics | core/nodes | list · watch | Low | |
ClusterRole prometheus-operator-kube-state-metrics | core/persistentvolumeclaims | list · watch | Low | |
ClusterRole prometheus-operator-kube-state-metrics | core/persistentvolumes | list · watch | Low | |
ClusterRole prometheus-operator-kube-state-metrics | policy/poddisruptionbudgets | list · watch | Low | |
ClusterRole prometheus-operator-kube-state-metrics | core/pods | list · watch | Low | |
ClusterRole prometheus-operator-kube-state-metrics | apps/replicasets | list · watch | Low | |
ClusterRole prometheus-operator-kube-state-metrics | extensions/replicasets | list · watch | Low | |
ClusterRole prometheus-operator-kube-state-metrics | core/replicationcontrollers | list · watch | Low | |
ClusterRole prometheus-operator-kube-state-metrics | core/services | list · watch | Low | |
ClusterRole prometheus-operator-kube-state-metrics | apps/statefulsets | list · watch | Low | |
ClusterRole prometheus-operator-kube-state-metrics | storage.k8s.io/storageclasses | list · watch | Low | |
ClusterRole prometheus-operator-kube-state-metrics | storage.k8s.io/volumeattachments | list · watch | Low | |
ClusterRole psp-prometheus-operator-kube-state-metrics | policy/podsecuritypolicies (restricted to: prometheus-operator-kube-state-metrics) | use | Low | DeprecatedFeature NodeAccess PodSecurityPolicy PrivilegeEscalation ResourceNameRestricted |
⚠️ Potential Abuse (12)
The following security risks were found based on the above permissions:
- Read secrets cluster-wide
- Read secrets in a namespace
- Read ConfigMaps cluster-wide
- Read ConfigMaps in a namespace
- Use privileged PodSecurityPolicy (deprecated)
- List Namespaces (Cluster Reconnaissance)
- List ValidatingWebhookConfigurations (Reconnaissance)
- List MutatingWebhookConfigurations (Reconnaissance)
- Read LimitRanges (Namespace Information Disclosure)
- Read ResourceQuotas (Namespace Information Disclosure)
- Read All ResourceQuotas (Cluster-wide Information Disclosure)
📦 Workloads (1)
| Kind | Name | Container | Image |
|---|---|---|---|
| Deployment | prometheus-operator-kube-state-metrics | kube-state-metrics | quay.io/coreos/kube-state-metrics:v1.9.7 |
🤖 prometheus-operator-operator
Namespace: default | Automount: ❌
🔑 Permissions (20)
| Role | Resource | Verbs | Risk | Tags |
|---|---|---|---|---|
ClusterRole prometheus-operator-operator | core/configmaps | * | Critical | ClusterWideAccess ConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation (+2 more) |
ClusterRole prometheus-operator-operator | apiextensions.k8s.io/customresourcedefinitions | * | Critical | CRDManipulation ClusterWideAccess PotentialPrivilegeEscalation Tampering |
ClusterRole prometheus-operator-operator | core/secrets | * | Critical | ClusterWideAccess ClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure (+6 more) |
ClusterRole prometheus-operator-operator | apps/statefulsets | * | Critical | ClusterWideAccess Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering (+2 more) |
ClusterRole prometheus-operator-operator | monitoring.coreos.com/alertmanagers | * | High | ClusterWideAccess |
ClusterRole prometheus-operator-operator | monitoring.coreos.com/alertmanagers/finalizers | * | High | ClusterWideAccess |
ClusterRole prometheus-operator-operator | monitoring.coreos.com/podmonitors | * | High | ClusterWideAccess |
ClusterRole prometheus-operator-operator | monitoring.coreos.com/prometheuses | * | High | ClusterWideAccess |
ClusterRole prometheus-operator-operator | monitoring.coreos.com/prometheuses/finalizers | * | High | ClusterWideAccess |
ClusterRole prometheus-operator-operator | monitoring.coreos.com/prometheusrules | * | High | ClusterWideAccess |
ClusterRole prometheus-operator-operator | monitoring.coreos.com/servicemonitors | * | High | ClusterWideAccess |
ClusterRole prometheus-operator-operator | monitoring.coreos.com/thanosrulers | * | High | ClusterWideAccess |
ClusterRole prometheus-operator-operator | monitoring.coreos.com/thanosrulers/finalizers | * | High | ClusterWideAccess |
ClusterRole prometheus-operator-operator | core/endpoints | create · delete · get · update | Low | |
ClusterRole prometheus-operator-operator | core/namespaces | get · list · watch | Low | ClusterStructure InformationDisclosure Reconnaissance |
ClusterRole prometheus-operator-operator | core/nodes | list · watch | Low | |
ClusterRole prometheus-operator-operator | core/pods | delete · list | Low | |
ClusterRole prometheus-operator-operator | core/services | create · delete · get · update | Low | |
ClusterRole prometheus-operator-operator | core/services/finalizers | create · delete · get · update | Low | |
ClusterRole prometheus-operator-operator-psp | policy/podsecuritypolicies (restricted to: prometheus-operator-operator) | use | Low | DeprecatedFeature NodeAccess PodSecurityPolicy PrivilegeEscalation ResourceNameRestricted |
⚠️ Potential Abuse (15)
The following security risks were found based on the above permissions:
- Read secrets cluster-wide
- Read secrets in a namespace
- Modify secrets cluster-wide
- Modify secrets in a namespace
- Read ConfigMaps cluster-wide
- Read ConfigMaps in a namespace
- Modify ConfigMaps cluster-wide
- Modify ConfigMaps in a namespace
- Manage StatefulSets cluster-wide
- Manage StatefulSets in a namespace
- Manage CustomResourceDefinitions
- Use privileged PodSecurityPolicy (deprecated)
- List Namespaces (Cluster Reconnaissance)
📦 Workloads (2)
| Kind | Name | Container | Image |
|---|---|---|---|
| Deployment | prometheus-operator-operator | prometheus-operator | quay.io/coreos/prometheus-operator:v0.38.1 |
| Deployment | prometheus-operator-operator | tls-proxy | squareup/ghostunnel:v1.5.2 |
🤖 prometheus-operator-prometheus
Namespace: default | Automount: ❌
🔑 Permissions (9)
| Role | Resource | Verbs | Risk | Tags |
|---|---|---|---|---|
ClusterRole prometheus-operator-prometheus | core/nodes/proxy | get · list · watch | Critical | ClusterAdminAccess CodeExecution ElevationOfPrivilege LateralMovement (+1 more) |
ClusterRole prometheus-operator-prometheus | core/endpoints | get · list · watch | Low | |
ClusterRole prometheus-operator-prometheus | extensions/ingresses | get · list · watch | Low | |
ClusterRole prometheus-operator-prometheus | networking.k8s.io/ingresses | get · list · watch | Low | |
ClusterRole prometheus-operator-prometheus | core/nodes | get · list · watch | Low | |
ClusterRole prometheus-operator-prometheus | core/nodes/metrics | get · list · watch | Low | |
ClusterRole prometheus-operator-prometheus | core/pods | get · list · watch | Low | |
ClusterRole prometheus-operator-prometheus | core/services | get · list · watch | Low | |
ClusterRole prometheus-operator-prometheus-psp | policy/podsecuritypolicies (restricted to: prometheus-operator-prometheus) | use | Low | DeprecatedFeature NodeAccess PodSecurityPolicy PrivilegeEscalation ResourceNameRestricted |
⚠️ Potential Abuse (3)
The following security risks were found based on the above permissions:
📦 Workloads (0)
No workloads use this ServiceAccount.
🤖 prometheus-operator-grafana
Namespace: default | Automount: ❌
🔑 Permissions (3)
| Role | Resource | Verbs | Risk | Tags |
|---|---|---|---|---|
ClusterRole prometheus-operator-grafana-clusterrole | core/secrets | get · list · watch | Critical | ClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure SecretAccess |
ClusterRole prometheus-operator-grafana-clusterrole | core/configmaps | get · list · watch | High | ConfigMapAccess DataExposure InformationDisclosure |
Role prometheus-operator-grafana | extensions/podsecuritypolicies (restricted to: prometheus-operator-grafana) | use | Low | ResourceNameRestricted |
⚠️ Potential Abuse (5)
The following security risks were found based on the above permissions:
- Read secrets cluster-wide
- Read secrets in a namespace
- Read ConfigMaps cluster-wide
- Read ConfigMaps in a namespace
📦 Workloads (2)
| Kind | Name | Container | Image |
|---|---|---|---|
| Deployment | prometheus-operator-grafana | grafana | grafana/grafana:7.0.5 |
| Deployment | prometheus-operator-grafana | grafana-sc-dashboard | kiwigrid/k8s-sidecar:0.1.151 |
🤖 prometheus-operator-admission
Namespace: default | Automount: ❌
🔑 Permissions (4)
| Role | Resource | Verbs | Risk | Tags |
|---|---|---|---|---|
ClusterRole prometheus-operator-admission | admissionregistration.k8s.io/mutatingwebhookconfigurations | get · update | Low | |
Role prometheus-operator-admission | core/secrets | create · get | Low | |
ClusterRole prometheus-operator-admission | admissionregistration.k8s.io/validatingwebhookconfigurations | get · update | Low | |
ClusterRole prometheus-operator-admission | policy/podsecuritypolicies (restricted to: prometheus-operator-admission) | use | Low | DeprecatedFeature NodeAccess PodSecurityPolicy PrivilegeEscalation ResourceNameRestricted |
⚠️ Potential Abuse (2)
The following security risks were found based on the above permissions:
📦 Workloads (2)
| Kind | Name | Container | Image |
|---|---|---|---|
| Job | prometheus-operator-admission-create | create | jettech/kube-webhook-certgen:v1.2.1 |
| Job | prometheus-operator-admission-patch | patch | jettech/kube-webhook-certgen:v1.2.1 |
🤖 prometheus-operator-alertmanager
Namespace: default | Automount: ❌
🔑 Permissions (1)
| Role | Resource | Verbs | Risk | Tags |
|---|---|---|---|---|
Role prometheus-operator-alertmanager | policy/podsecuritypolicies (restricted to: prometheus-operator-alertmanager) | use | Low | ResourceNameRestricted |
⚠️ Potential Abuse (1)
The following security risks were found based on the above permissions:
📦 Workloads (0)
No workloads use this ServiceAccount.
🤖 prometheus-operator-grafana-test
Namespace: default | Automount: ❌
🔑 Permissions (1)
| Role | Resource | Verbs | Risk | Tags |
|---|---|---|---|---|
Role prometheus-operator-grafana-test | policy/podsecuritypolicies (restricted to: prometheus-operator-grafana-test) | use | Low | ResourceNameRestricted |
⚠️ Potential Abuse (1)
The following security risks were found based on the above permissions:
📦 Workloads (1)
| Kind | Name | Container | Image |
|---|---|---|---|
| Pod | prometheus-operator-grafana-test | prometheus-operator-test | bats/bats:v1.1.0 |
🤖 prometheus-operator-prometheus-node-exporter
Namespace: default | Automount: ❌
🔑 Permissions (1)
| Role | Resource | Verbs | Risk | Tags |
|---|---|---|---|---|
ClusterRole psp-prometheus-operator-prometheus-node-exporter | extensions/podsecuritypolicies (restricted to: prometheus-operator-prometheus-node-exporter) | use | Low | DeprecatedFeature NodeAccess PodSecurityPolicy PrivilegeEscalation ResourceNameRestricted |
⚠️ Potential Abuse (2)
The following security risks were found based on the above permissions:
📦 Workloads (1)
| Kind | Name | Container | Image |
|---|---|---|---|
| DaemonSet | prometheus-operator-prometheus-node-exporter | node-exporter | quay.io/prometheus/node-exporter:v1.0.0 |