# kubeeye **Repository Path**: zilla/kubeeye ## Basic Information - **Project Name**: kubeeye - **Description**: KubeEye 是一款开源的 Kubernetes 集群自动巡检工具,旨在自动检测发现 Kubernetes 上的各种问题,比如应用配置错误、集群组件不健康和节点问题,帮助集群管理员更好地管理集群降低风险。 - **Primary Language**: Go - **License**: Apache-2.0 - **Default Branch**: main - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 18 - **Created**: 2025-11-19 - **Last Updated**: 2025-11-19 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README

> English | [中文](README_zh.md) KubeEye 是为 Kubernetes 设计的巡检工具,用于发现 Kubernetes 资源(使用 [OPA](https://github.com/open-policy-agent/opa) )、集群组件、集群节点(使用[Node-Problem-Detector](https://github.com/kubernetes/node-problem-detector))等配置是否符合最佳实践,对于不符合最佳实践的,将给出修改建议。 KubeEye 支持自定义巡检规则、插件安装,通过 [KubeEye Operator](#kubeeye-operator) 能够使用 web 页面查看巡检结果和修改建议。 ## 架构图 KubeEye 通过 Kubernetes API 获取资源详情,通过巡检规则和插件检查获取到的资源配置,并生成诊断结果,详见架构图。 ![kubeeye-architecture](./docs/images/kubeeye-architecture.svg?raw=true) ## 怎么使用 - 机器上安装 KubeEye - 从 [Releases](https://github.com/kubesphere/kubeeye/releases) 中下载预构建的可执行文件。 - 或者你也可以从源代码构建 > 提示:构建完成后将会在 /usr/local/bin/ 目录下生成 kubeeye 文件。 ``` git clone https://github.com/kubesphere/kubeeye.git cd kubeeye make installke ``` - [可选] 安装 [Node-problem-Detector](https://github.com/kubernetes/node-problem-detector) 注意:这将在你的集群上安装 npd,只有当你想要详细的节点报告时才需要。 ```shell kubeeye install npd ``` - KubeEye 执行 ```shell kubeeye audit KIND NAMESPACE NAME REASON LEVEL MESSAGE Node docker-desktop kubelet has no sufficient memory available waring KubeletHasNoSufficientMemory Node docker-desktop kubelet has no sufficient PID available waring KubeletHasNoSufficientPID Node docker-desktop kubelet has disk pressure waring KubeletHasDiskPressure Deployment default testkubeeye NoCPULimits Deployment default testkubeeye NoReadinessProbe Deployment default testkubeeye NotRunAsNonRoot Deployment kube-system coredns NoCPULimits Deployment kube-system coredns ImagePullPolicyNotAlways Deployment kube-system coredns NotRunAsNonRoot Deployment kubeeye-system kubeeye-controller-manager ImagePullPolicyNotAlways Deployment kubeeye-system kubeeye-controller-manager NotRunAsNonRoot DaemonSet kube-system kube-proxy NoCPULimits DaemonSet kube-system kube-proxy NotRunAsNonRoot Event kube-system coredns-558bd4d5db-c26j8.16d5fa3ddf56675f Unhealthy warning Readiness probe failed: Get "http://10.1.0.87:8181/ready": dial tcp 10.1.0.87:8181: connect: connection refused Event kube-system coredns-558bd4d5db-c26j8.16d5fa3fbdc834c9 Unhealthy warning Readiness probe failed: HTTP probe failed with statuscode: 503 Event kube-system vpnkit-controller.16d5ac2b2b4fa1eb BackOff warning Back-off restarting failed container Event kube-system vpnkit-controller.16d5fa44d0502641 BackOff warning Back-off restarting failed container Event kubeeye-system kubeeye-controller-manager-7f79c4ccc8-f2njw.16d5fa3f5fc3229c Failed warning Failed to pull image "controller:latest": rpc error: code = Unknown desc = Error response from daemon: pull access denied for controller, repository does not exist or may require 'docker login': denied: requested access to the resource is denied Event kubeeye-system kubeeye-controller-manager-7f79c4ccc8-f2njw.16d5fa3f61b28527 Failed warning Error: ImagePullBackOff Role kubeeye-system kubeeye-leader-election-role CanDeleteResources ClusterRole kubeeye-manager-role CanDeleteResources ClusterRole kubeeye-manager-role CanModifyWorkloads ClusterRole vpnkit-controller CanImpersonateUser ClusterRole vpnkit-controller CanDeleteResources ``` ## KubeEye 能做什么 - KubeEye 根据 Kubernetes 最佳实践检查集群资源,从而提升集群稳定。 - KubeEye 可以发现你的集群控制平面的问题,包括 kube-apiserver/kube-controller-manager/etcd 等。 - KubeEye 可以帮助你检测各种节点问题,包括内存/CPU/磁盘压力,意外的内核错误日志等。 ## 检查项 |是/否|检查项 |描述|级别| |---|---|---|---| | :white_check_mark: | PrivilegeEscalationAllowed | 允许特权升级 | 紧急 | | :white_check_mark: | CanImpersonateUser | role/clusterrole 有伪装成其他用户权限 | 警告 | | :white_check_mark: | CanDeleteResources | role/clusterrole 有删除 kubernetes 资源权限 | 警告 | | :white_check_mark: | CanModifyWorkloads | role/clusterrole 有修改 kubernetes 资源权限 | 警告 | | :white_check_mark: | NoCPULimits | 资源没有设置 CPU 使用限制 | 紧急 | | :white_check_mark: | NoCPURequests | 资源没有设置预留 CPU | 紧急 | | :white_check_mark: | HighRiskCapabilities | 开启了高危功能,例如 ALL/SYS_ADMIN/NET_ADMIN | 紧急 | | :white_check_mark: | HostIPCAllowed | 开启了主机 IPC | 紧急 | | :white_check_mark: | HostNetworkAllowed | 开启了主机网络 | 紧急 | | :white_check_mark: | HostPIDAllowed | 开启了主机PID | 紧急 | | :white_check_mark: | HostPortAllowed | 开启了主机端口 | 紧急 | | :white_check_mark: | ImagePullPolicyNotAlways | 镜像拉取策略不是 always | 警告 | | :white_check_mark: | ImageTagIsLatest | 镜像标签是 latest | 警告 | | :white_check_mark: | ImageTagMiss | 镜像没有标签 | 紧急 | | :white_check_mark: | InsecureCapabilities | 开启了不安全的功能,例如 KILL/SYS_CHROOT/CHOWN | 警告 | | :white_check_mark: | NoLivenessProbe | 没有设置存活状态检查 | 警告 | | :white_check_mark: | NoMemoryLimits | 资源没有设置内存使用限制 | 紧急 | | :white_check_mark: | NoMemoryRequests | 资源没有设置预留内存 | 紧急 | | :white_check_mark: | NoPriorityClassName | 没有设置资源调度优先级 | 通知 | | :white_check_mark: | PrivilegedAllowed | 以特权模式运行资源 | 紧急 | | :white_check_mark: | NoReadinessProbe | 没有设置就绪状态检查 | 警告 | | :white_check_mark: | NotReadOnlyRootFilesystem | 没有设置根文件系统为只读 | 警告 | | :white_check_mark: | NotRunAsNonRoot | 没有设置禁止以 root 用户启动进程 | 警告 | | :white_check_mark: | CertificateExpiredPeriod | 将检查 ApiServer 证书的到期日期少于30天 | 紧急 | | :white_check_mark: | EventAudit | 事件检查 | 警告 | | :white_check_mark: | NodeStatus | 节点状态检查 | 警告 | | :white_check_mark: | DockerStatus | docker 状态检查 | 警告 | | :white_check_mark: | KubeletStatus | kubelet 状态检查 | 警告 | ## 添加自定义检查规则 ### 添加自定义 OPA 检查规则 - 创建 OPA 规则存放目录 ```shell mkdir opa ``` - 添加自定义 OPA 规则文件 > 注意:为检查工作负载设置的 OPA 规则, package 名称必须是 *kubeeye_workloads_rego* > 为检查 RBAC 设置的 OPA 规则, package 名称必须是 *kubeeye_RBAC_rego* > 为检查节点设置的 OPA 规则, package 名称必须是 *kubeeye_nodes_rego* - 以下为检查镜像仓库地址规则,保存以下规则到规则文件 *imageRegistryRule.rego* ```rego package kubeeye_workloads_rego deny[msg] { resource := input type := resource.Object.kind resourcename := resource.Object.metadata.name resourcenamespace := resource.Object.metadata.namespace workloadsType := {"Deployment","ReplicaSet","DaemonSet","StatefulSet","Job"} workloadsType[type] not workloadsImageRegistryRule(resource) msg := { "Name": sprintf("%v", [resourcename]), "Namespace": sprintf("%v", [resourcenamespace]), "Type": sprintf("%v", [type]), "Message": "ImageRegistryNotmyregistry" } } workloadsImageRegistryRule(resource) { regex.match("^myregistry.public.kubesphere/basic/.+", resource.Object.spec.template.spec.containers[_].image) } ``` - 使用额外的规则运行 kubeeye > 提示:kubeeye 将读取指定目录下所有 *.rego* 结尾的文件 ```shell kubeeye audit -p ./opa -f ~/.kube/config NAMESPACE NAME KIND MESSAGE default nginx1 Deployment [ImageRegistryNotmyregistry NotReadOnlyRootFilesystem NotRunAsNonRoot] default nginx11 Deployment [ImageRegistryNotmyregistry PrivilegeEscalationAllowed HighRiskCapabilities HostIPCAllowed HostPortAllowed ImagePullPolicyNotAlways ImageTagIsLatest InsecureCapabilities NoPriorityClassName PrivilegedAllowed NotReadOnlyRootFilesystem NotRunAsNonRoot] default nginx111 Deployment [ImageRegistryNotmyregistry NoCPULimits NoCPURequests ImageTagMiss NoLivenessProbe NoMemoryLimits NoMemoryRequests NoPriorityClassName NotReadOnlyRootFilesystem NoReadinessProbe NotRunAsNonRoot] ``` ### 添加自定义 NPD 检查规则 - 修改 configmap ```shell kubectl edit ConfigMap node-problem-detector-config -n kube-system ``` - 重启 NPD ```shell kubectl rollout restart DaemonSet node-problem-detector -n kube-system ``` ## KubeEye Operator ### 什么是 KubeEye Operator KubeEye Operator 是为 Kubernetes 设计的巡检平台。通过 Operator 管理 KubeEye,能够在 Kubernetes 集群中定期执行 KubeEye 巡检,并生成巡检报告。 ## KubeEye Operator 能做什么 - KubeEye Operator 提供 web 管理页面 - KubeEye Operator 通过 CR 记录 KubeEye 巡检结果,能够通过 web 管理页面查看、对比集群巡检变化 - KubeEye Operator 支持安装更多插件 - KubeEye Operator 通过 web 管理页面提供更加详细的修改建议 ### 部署 KubeEye Operator ```shell kubectl apply -f https://raw.githubusercontent.com/kubesphere/kubeeye/main/deploy/kubeeye.yaml kubectl apply -f https://raw.githubusercontent.com/kubesphere/kubeeye/main/deploy/kubeeye_insights.yaml ``` ### 查看 KubeEye Operator 巡检结果 ```shell kubectl get clusterinsight -o yaml ``` ```shell apiVersion: v1 items: - apiVersion: kubeeye.kubesphere.io/v1alpha1 kind: ClusterInsight metadata: name: clusterinsight-sample namespace: default spec: auditPeriod: 24h status: auditResults: auditResults: - resourcesType: Node resultInfos: - namespace: "" resourceInfos: - items: - level: waring message: KubeletHasNoSufficientMemory reason: kubelet has no sufficient memory available - level: waring message: KubeletHasNoSufficientPID reason: kubelet has no sufficient PID available - level: waring message: KubeletHasDiskPressure reason: kubelet has disk pressure name: kubeeyeNode ``` ## 文档 * [RoadMap](docs/roadmap.md) * [FAQ](docs/FAQ.md)