This message was deleted.
# neuvector-security
a
This message was deleted.
q
Hey Kareem! This should work… When you say you see the CRD in the UI, you mean you see the rules marked with the red CRD label, or something else? Is it just the rules that arent working?
c
Looks like I sent the wrong CRD. I meant to send a different example. The target on the CRD is
Copy code
target:
    policymode: Monitor
    selector:
      comment: ""
      criteria:
      - key: domain
        op: =
        value: site-primary
      - key: service
        op: =
        value: canton-participant.site-primary
      name: nv.canton-participant.site-primary
      original_name: ""
I can see the CRD in the groups. I also see a group that this should be applying to, but the policy doesn't seem to be there. The policy mode for this policy should be monitor. Not discover
q
can you do a
kubectl get nvsecurityrules -n site-primary
and see if there are any other CRDs in there? I wonder if there is some conflict. what you have here looks to me like it should work
c
$ kubectl get nvsecurityrules -n site-primary NAME AGE canton-domain.site-primary 3h43m canton-ledger-pruner.site-primary 3h43m canton-participant.site-primary 3h43m
q
do those other 2 work OK?
c
yep
q
and can you do
kubectl get <http://nvclustersecurityrule.neuvector.com|nvclustersecurityrule.neuvector.com>
i think the one without the NV might be a non namespaced custom group. you cant set a mode on those, so it shouldn’t matter that it is there
but that is what that upper box probably is coming from
just to confirm
trying to recreate the behavior you are seeing with the modes, but can’t seem to get the mode stuck in discover when specifying Monitor on the CRD.
c
Got distracted. Its not a a cluster rule. I don't have any.
q
i copied your target, and just changed the name to match a NS/pod on my cluster and it matched and changed the mode OK. Those custom groups marked as CRD, I don’t understand where they are coming from if you have no custom group CRDs
I asked the support guys to check this thread and see if I am just missing something obvious, but maybe tomorrow it is worth opening a case. From what you showed here, you are doing it correctly
c
Thanks for looking
q
I was able to test the zero drift with extra policy allows, and it does seem to work for me. I get the not parent process violation, and if I add the process to the list, I stop getting alerts. So I will dig into it a little more.
sorry misfire 🙂