Skip to content

Latest commit

 

History

History
28 lines (19 loc) · 937 Bytes

filter_and_vis.md

File metadata and controls

28 lines (19 loc) · 937 Bytes

Filtering and Visualization of discovered policies

The discovered policies contains the execution posture for your workloads. You can use these policies to:

  1. check what the workloads are doing from application perspective
  2. check deployment interconnectivity
  3. filter policies in the context of given namespace or deployment

Download filter-policy tool:

curl -O https://raw.githubusercontent.com/accuknox/tools/main/filter-policy && chmod +x filter-policy

Network visualization of a given deployment

./filter-policy -f cilium_policies.yaml -l '^app: checkoutservice' -g checkoutservice.png -o checkoutservice.yaml

Alt Text

System visualization of a given deployment

./filter-policy -f kubearmor_policies_default_explorer_mysql_yoebymtp.yaml -g mysql.png

Alt Text