You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-**Description:** This project focuses on improving KubeArmor's observability by integrating key Prometheus metrics. The goal is to offer simple explanations for security policy enforcement and alerting within Kubernetes clusters.
406
+
-**Key Metrics to Focus On:**
407
+
- Number of Policies Applied
408
+
- Number of Alerts Triggered
409
+
- List of Active Policies
410
+
- Policy Status (Active/Inactive)
411
+
-**Expected Outcome:** Successful integration of these Prometheus metrics, making them accessible via a Prometheus endpoint and adhering to best practices for metric exposition.
-**Description:** This project aims to systematically analyze and substantially improve KubeArmor's unit test coverage. It involves identifying untested code paths, designing and implementing new unit tests for crucial modules, and establishing a robust testing framework to boost code quality.
425
+
-**Goals:**
426
+
- Measure Coverage: Accurately measure and report current unit test coverage for all Go packages.
427
+
- Prioritized Test Implementation: Write new unit tests, prioritizing core modules like core, monitor, enforcer, log, and feeder, and addressing other packages with no test files.
428
+
- Identify Untested Components: Pinpoint major untested functionalities and propose specific test scenarios.
429
+
- Achieve Measurable Improvement: Submit pull requests that significantly increase overall unit test coverage.
430
+
-**Expected Outcome:** A detailed coverage report, a suite of new, effective unit tests, and a measurable improvement in test coverage, leading to enhanced code quality and reliability.
0 commit comments