Certified Kubernetes Security Specialist Challenge Series

Anyone tried the challenge and had issues with the loading the apparmor profile?

I get the following error:
Cache read/write disabled: interface file missing. (Kernel needs AppArmor 2.4 compatibility patch.)
Warning: unable to find a suitable fs in /proc/mounts, is it mounted?
Use --subdomainfs to override.

Hi @theevilhammie
Thanks for your feedback. Definitely, we will check it and will update you.

Regards,
KodeKloud Support

Hi @theevilhammie
Please try now. We updated it.

Regards,
KodeKloud Support

Do you share somewhere the winners each month?
Or at least if a contest was already won?

Hi
the website seems down since 10 mins, could you check it please?

image

Sorry for this inconvenience caused, @alessandro.affinito Our engineers are investigating. I will update you.

Regards,
KodeKloud Support

1 Like

@Tej_Singh_Rana
do you have any info regarding the previous question instead?

Hi @alessandro.affinito

Yes, every month we will announce the winners on the KodeKloud tutorials page as a blog and also will announce the winners on social media such as LinkedIn, Twitter, Facebook, and YouTube.
If you are already a member of our KodeKloud student slack workspace then we will announce it on the general slack channel too.
Also, we will email the winners with exam coupons.

Regards,
KodeKloud Support

2 Likes

Thanks for your patience, @alessandro.affinito Site is up and running. Please give it a try.

Regards,
KodeKloud Support

Hi @Tej_Singh_Rana ,
For the second challenge what do you mean exactly with:

The deployment has a secret hardcoded. Instead, create a secret called ‘prod-db’ for all the hardcoded values and consume the secret values as environment variables within the deployment.

I’ve created the secret and I read the prod env variables from there (env.valueFrom.secretKeyRef) but I still don’t get the last point of the challenge :upside_down_face:

1 Like

DMed you the similar example, Please try it.

Has anyone had any luck with Challenge4? All tasks completed successfully except for the policy. I’ve got:

apiVersion: audit.k8s.io/v1 
kind: Policy
omitStages:
  - "RequestReceived"
rules:
  - level: Metadata
    resources:
    - group: "" 
      resources: ["configmaps","pods"]
    namespaces: ["omega", "citadel", "eden-prime"]

This gives me the info needed to complete the other tasks however, it gets marked as incorrect. Any pointers?

Hello @philipsmit ,
It should work, please give it another try. Let me know if you are still facing an issue.

Regards,
KodeKloud Support

1 Like

Yes, it works, I’ve just cleared it. @Tej-Singh-Rana could you please check the issue in challenge 2?

Hi @Javier3 ,
Could you please let me know, what issue are you facing with challenge 2?

Sure thing

CKS Challenege 2 - startupProbe to remove shells - Kubernetes - KodeKloud - DevOps Learning Community

Challenge 2 - The following network policy is being marked incorrect; although multiple solution guides provide the same solution. Can you provide insight into why this is marked incorrect?

kind: NetworkPolicy
metadata:
  name: prod-netpol
  namespace: prod
spec:
  podSelector: {}
  policyTypes:
    - Ingress
  ingress:
    - from:
        - namespaceSelector:
            matchLabels:
              kubernetes.io/metadata.name: prod

Hi @philipsmit

Seems you missed the first line of the yaml…

apiVersion: networking.k8s.io/v1

Without that you should have received this and the policy not created

error: error validating "netpol.yaml": error validating data: apiVersion not set; if you choose to ignore these errors, turn validation off with --validate=false

Upon adding the api version and applying, the answer is marked correct

Thanks. This might have just been a copy and paste error. the network policy object was created successfully, however marked incorrect…
I’ll try it again, and report back. Thanks again