Skip to content

Expose Prometheus Metrics #1902

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
daemon1024 opened this issue Nov 26, 2024 · 6 comments
Open

Expose Prometheus Metrics #1902

daemon1024 opened this issue Nov 26, 2024 · 6 comments
Labels
enhancement New feature or request mentorship

Comments

@daemon1024
Copy link
Member

  • Number of Policies Applied
  • Number of Alerts
  • List of Policies
  • Policy active or not
@daemon1024 daemon1024 added the enhancement New feature or request label Nov 26, 2024
@Ayush9026
Copy link

/assign i will solve this issue.

@navaneeth-dev
Copy link

@daemon1024 I would like to work on this.

This should be added in the KubeArmorController pkg. But when running make deploy in k3s or vagrant dev setup I get the same error but KubeArmor built successfully:

vagrant@kubearmor-dev:~/KubeArmor/pkg/KubeArmorController$ make deploy                                                                                                                             
go mod tidy; /home/vagrant/go/bin/controller-gen "crd:trivialVersions=true,preserveUnknownFields=false" rbac:roleName=manager-role webhook paths="./..." output:crd:artifacts:config=config/crd/bas
es                                                                                                                                                                                                 
Error: unable to parse option "crd:trivialVersions=true,preserveUnknownFields=false": [unknown argument "trivialVersions" (at <input>:1:16) extra arguments provided: "true,preserveUnknownFields=f
alse" (at <input>:1:17)]
run `controller-gen crd:trivialVersions=true,preserveUnknownFields=false rbac:roleName=manager-role webhook paths=./... output:crd:artifacts:config=config/crd/bases -w` to see all available markers, or `controller-gen crd:trivialVersions=true,preserveUnknownFields=false rbac:roleName=manager-role webhook paths=./... output:crd:artifacts:config=config/crd/bases -h` for usage
make: *** [Makefile:52: manifests] Error 1

Any idea what to do?
Thanks in advance.

@akshat-crypto
Copy link

Hey @daemon1024

I’m interested in contributing to the KubeArmor issue related to tracking applied policies, their active status, and alerts. I have hands-on experience with Kubernetes security, policy enforcement, and observability tools like Falco and Prometheus.

Relevant Experience:

  • Worked on Kubernetes security policies, runtime enforcement, and monitoring.
  • Implemented policy-based alerting and tracking mechanisms in past projects.
  • Familiar with logging, metrics, and CNCF security tools.

Contribution Proposal:

  • Implement tracking for the number of applied policies.
  • Add an indicator for active/inactive policies.
  • Enhance alert visibility for policy violations.

@yp969803
Copy link

yp969803 commented Mar 3, 2025

@daemon1024 interested in working in this project. I was busy with my universites chores hence not able to contribute regularly since 4 months, but I'm excited to start up again. I will soon draft a proposal, with required implementations and requirements.

@WoodHolz
Copy link

WoodHolz commented Mar 9, 2025

Hi, I'm new here, willing to help and contribute! lol

@siddiksawani
Copy link

Hi @daemon1024 and @Prateeknandle,

I'm interested in contributing to the Prometheus metrics feature for KubeArmor.

I see some work has already been discussed regarding tracking the number of applied policies, active/inactive status, and alerts.

  • Is this issue still open for contribution?
  • Are there any specific design decisions or approaches recommended before implementing this?
  • Should I start by breaking it down into smaller tasks?

Looking forward to your guidance! Thanks.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request mentorship
Projects
None yet
Development

No branches or pull requests

8 participants