Uploaded image for project: 'OpenShift Request For Enhancement'
  1. OpenShift Request For Enhancement
  2. RFE-6697

Report on all processes that are listening on ports on the secured cluster

XMLWordPrintable

    • Icon: Feature Request Feature Request
    • Resolution: Done
    • Icon: Major Major
    • None
    • None
    • None
    • False
    • None
    • False
    • 25% To Do, 0% In Progress, 75% Done

      1. Proposed title of this feature request

      Report on all processes that are listening on ports on the secured cluster

      1. What is the nature and description of the request?

      Customer needs a list of all processes that are listening on ports on the secured cluster. Information needs to be associated with namespaces and deployments.

      Control plane components deployed in kubernetes and/or openshift namespaces should be grouped separately to distinguish from other applications/services. 

      This request also applies to all RHCOS processes, which should also be grouped separately to distinguish from other applications/services. 

      1. Why does the customer need this? (List the business requirements here)

      Telco partners require this in order to accurately assess the security posture of a running cluster. 

      Palo Alto Prisma Cloud provides related functionality. See https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-compute/runtime_defense/incident_explorer

      The specific customer requirements are: 

      "Product SHALL support functionality to list all processes that are listening on ports within control plane- and workload containers by invoking a command."

      "Product SHALL support functionality to list all processes in OS that are listening on ports within control plane- and worker nodes by invoking a command."

      1. List any affected packages or components.

      All. 

              rh-ee-masimonm Maria Simon Marcos
              knewcome@redhat.com Kirsten Newcomer
              ACS Collector
              Votes:
              0 Vote for this issue
              Watchers:
              5 Start watching this issue

                Created:
                Updated:
                Resolved: