Documentation Index
Fetch the complete documentation index at: https://docs.kguardian.dev/llms.txt
Use this file to discover all available pages before exploring further.
Example output. Each page below shows YAML that is representative of what the kguardian controller observes and emits for a given workload. Profiles are illustrative — verify against your own runtime before applying. Verified against kguardian
X.Y.Z controller on [TBD reference cluster].Why a gallery?
Reading the CLI flag reference tells you what kguardian can do. Reading a generated policy tells you what kguardian actually does — what gets allowed, what gets denied, and how readable the output is. Each page in this gallery walks through one real workload pattern:- A 3-line description of the workload and what it talks to.
- The generated
NetworkPolicyYAML. - The generated
CiliumNetworkPolicyYAML (where Cilium-specific fields add value, e.g., FQDN egress or L7 HTTP rules). - The generated seccomp profile JSON (or a representative excerpt with the full syscall count).
- A short paragraph on what kguardian observed at runtime that produced each rule.
Workloads
nginx
HTTP frontend — ingress from peer pods, DNS egress, no upstream dependencies.
Postgres
Stateful database — accepts connections from app namespace, no egress beyond DNS.
CoreDNS / kube-dns
Cluster DNS resolver — ingress on 53/UDP+TCP, egress to upstream resolvers.
Prometheus
Scraping monitor — outbound HTTP to scrape targets, ingress from Grafana.
Istio sidecar (envoy)
Service-mesh proxy — mTLS to peers and control-plane traffic to istiod.
Go microservice
Typical HTTP API — ingress on a service port, egress to DB and a few SaaS endpoints.
How to read each example
The YAML on each page is whatkubectl kguardian gen networkpolicy <pod> --output-dir ./policies writes after the controller has observed the workload for at least a few minutes. The seccomp JSON is what kubectl kguardian gen seccomp <pod> --output-dir ./seccomp produces.
If a workload’s observed behavior is empty or noisy in your cluster (no traffic captured yet, very short-lived pods, host-network pods), the generator emits a minimal policy and warns. None of the gallery examples reflect that path — see Troubleshooting instead.
The seccomp excerpts in this gallery are abbreviated for readability. Production profiles routinely contain 80–200 syscall names. The full count is noted on each page.