Configuring the Custom File Integrity Operator
Viewing FileIntegrity object attributes
As with any Kubernetes custom resources (CRs), you can run oc explain fileintegrity, and then look at the individual attributes using:
$ oc explain fileintegrity.spec
$ oc explain fileintegrity.spec.config
Important attributes
| Attribute | Description |
|---|---|
|
A map of key-values pairs that must match with node’s labels in order for the
AIDE pods to be schedulable on that node. The typical use is to set only a
single key-value pair where |
|
A boolean attribute. If set to |
|
Specify tolerations to schedule on nodes with custom taints. When not specified, a default toleration is applied, which allows tolerations to run on control plane nodes. |
|
The number of seconds to pause in between AIDE integrity checks. Frequent AIDE
checks on a node can be resource intensive, so it can be useful to specify a
longer interval. Defaults to |
|
The maximum number of AIDE database and log backups leftover from the |
|
Name of a configMap that contains custom AIDE configuration. If omitted, a default configuration is created. |
|
Namespace of a configMap that contains custom AIDE configuration. If unset, the FIO generates a default configuration suitable for RHCOS systems. |
|
Key that contains actual AIDE configuration in a config map specified by |
|
The number of seconds to wait before starting the first AIDE integrity check. Default is set to 0. This attribute is optional. |
Examine the default configuration
The default File Integrity Operator configuration is stored in a config map with
the same name as the FileIntegrity CR.
-
To examine the default config, run:
$ oc describe cm/worker-fileintegrity
Understanding the default File Integrity Operator configuration
Below is an excerpt from the aide.conf key of the config map:
@@define DBDIR /hostroot/etc/kubernetes
@@define LOGDIR /hostroot/etc/kubernetes
database=file:@@{DBDIR}/aide.db.gz
database_out=file:@@{DBDIR}/aide.db.gz
gzip_dbout=yes
verbose=5
report_url=file:@@{LOGDIR}/aide.log
report_url=stdout
PERMS = p+u+g+acl+selinux+xattrs
CONTENT_EX = sha512+ftype+p+u+g+n+acl+selinux+xattrs
/hostroot/boot/ CONTENT_EX
/hostroot/root/\..* PERMS
/hostroot/root/ CONTENT_EX
The default configuration for a FileIntegrity instance provides coverage for
files under the following directories:
-
/root -
/boot -
/usr -
/etc
The following directories are not covered:
-
/var -
/opt -
Some OpenShift Container Platform-specific excludes under
/etc/
Supplying a custom AIDE configuration
Any entries that configure AIDE internal behavior such as DBDIR, LOGDIR,
database, and database_out are overwritten by the Operator. The Operator
would add a prefix to /hostroot/ before all paths to be watched for integrity
changes. This makes reusing existing AIDE configs that might often not be
tailored for a containerized environment and start from the root directory
easier.
Note
/hostroot is the directory where the pods running AIDE mount the host’s
file system. Changing the configuration triggers a reinitializing of the database.
Defining a custom File Integrity Operator configuration
This example focuses on defining a custom configuration for a scanner that runs
on the control plane nodes based on the default configuration provided for the
worker-fileintegrity CR. This workflow might be useful if you are planning
to deploy a custom software running as a daemon set and storing its data under
/opt/mydaemon on the control plane nodes.
-
Make a copy of the default configuration.
-
Edit the default configuration with the files that must be watched or excluded.
-
Store the edited contents in a new config map.
-
Point the
FileIntegrityobject to the new config map through the attributes inspec.config. -
Extract the default configuration:
$ oc extract cm/worker-fileintegrity --keys=aide.confThis creates a file named
aide.confthat you can edit. To illustrate how the Operator post-processes the paths, this example adds an exclude directory without the prefix:$ vim aide.confExample output/hostroot/etc/kubernetes/static-pod-resources !/hostroot/etc/kubernetes/aide.* !/hostroot/etc/kubernetes/manifests !/hostroot/etc/docker/certs.d !/hostroot/etc/selinux/targeted !/hostroot/etc/openvswitch/conf.dbExclude a path specific to control plane nodes:
!/opt/mydaemon/Store the other content in
/etc:/hostroot/etc/ CONTENT_EX -
Create a config map based on this file:
$ oc create cm master-aide-conf --from-file=aide.conf -
Define a
FileIntegrityCR manifest that references the config map:apiVersion: fileintegrity.openshift.io/v1alpha1 kind: FileIntegrity metadata: name: master-fileintegrity namespace: openshift-file-integrity spec: nodeSelector: node-role.kubernetes.io/master: "" config: name: master-aide-conf namespace: openshift-file-integrityThe Operator processes the provided config map file and stores the result in a config map with the same name as the
FileIntegrityobject:$ oc describe cm/master-fileintegrity | grep /opt/mydaemonExample output!/hostroot/opt/mydaemon
Changing the custom File Integrity configuration
To change the File Integrity configuration, never change the generated
config map. Instead, change the config map that is linked to the FileIntegrity
object through the spec.name, namespace, and key attributes.