File tree Expand file tree Collapse file tree 1 file changed +5
-3
lines changed Expand file tree Collapse file tree 1 file changed +5
-3
lines changed Original file line number Diff line number Diff line change 69
69
https://installer.calicocloud.io/feeds/v1/ips
70
70
` ` `
71
71
72
- Generate ` Suspicious IPs/Domains` alerts by curl those list above. Use ` markettrendingcenter.com ` and ` 188.34.185.85 ` as example:
72
+ Generate ` Suspicious IPs/Domains` alerts by curl those list above. Use first entry in each threatfeed as example:
73
73
74
74
` ` ` bash
75
75
# generate suspicious DNS alerts
76
- kubectl -n dev exec -t netshoot -- sh -c " ping -c1 markettrendingcenter.com"
76
+ DOMAIN=$( curl https://installer.calicocloud.io/feeds/v1/domains | awk ' NR==1' )
77
+ kubectl -n dev exec -t netshoot -- sh -c " ping -c1 $DOMAIN "
77
78
78
79
# generate suspicious IP alerts
79
- kubectl -n dev exec -t netshoot -- sh -c " ping -c3 188.34.185.85"
80
+ IP=$( kubectl get globalnetworksets.crd.projectcalico.org threatfeed.alienvault.ipthreatfeeds -o jsonpath=' {.spec.nets[0]}' | sed ' s/...$//' )
81
+ kubectl -n dev exec -t netshoot -- sh -c " ping -c3 $IP "
80
82
` ` `
81
83
82
84
Open ` Alerts` view to see all triggered alerts in the cluster. Review the generated alerts.
You can’t perform that action at this time.
0 commit comments