diff --git a/getting-started/FAQ.md b/getting-started/FAQ.md index 220673ee04..504f6486d8 100644 --- a/getting-started/FAQ.md +++ b/getting-started/FAQ.md @@ -256,3 +256,35 @@ One can enable the host policy by patching the daemonset (`kubectl edit daemonse This will enable the `KubeArmorHostPolicy` and host based visibility for the k8s worker nodes. + +

Unable to get KubeArmor policy enforcement with Kind clusters

+ +KubeArmor works out of the box with Kind clusters supporting BPF-LSM. You can check if BPF-LSM is supported/enabled on your host (on which the kind cluster is to be deployed) by using following: +``` +cat /sys/kernel/security/lsm +``` +* If it has `bpf` in the list, then everything should work out of the box +* If it has `apparmor` in the list, then follow the steps mentioned in this FAQ. + +## 1. Create Kind cluster +```sh +cat < + diff --git a/getting-started/deployment_guide.md b/getting-started/deployment_guide.md index 468dead826..931b634d57 100644 --- a/getting-started/deployment_guide.md +++ b/getting-started/deployment_guide.md @@ -69,7 +69,7 @@ EOF Now execute the `apt` command to download the `masscan` tool. ``` -kubectl exec -it $POD -- sh -c "apt update && apt install masscan" +kubectl exec -it $POD -- bash -c "apt update && apt install masscan" ``` It will be denied permission to execute.