Cluster Type (Local/Downstream): Local/Downstream RKE/RKE2/K3s
User Information
What is the role of the user logged in? (Admin/Cluster Owner/Cluster Member/Project Owner/Project Member/Custom)
If custom, define the set of permissions: Admin
Describe the bug
When creating a new CIS scan in the Rancher UI, the default profile chosen from the drop-down menu is always "CIS 1.7 Permissive" and does not align with the K8s version running in the cluster.
Steps to Recreate:
Create a Rancher server v2.7-head.
Create a downstream cluster with K8s version v1.24.15.
Install the "rancher-cis-benchmark" on the downstream cluster (Chart version "4.2.0-rc3")
Navigate to: CIS Benchmark > Scans > Click on "Create"
Issue/Actual Result:
The default CIS scan profile is always "CIS 1.7 Permissive," irrespective of the Kubernetes version of the cluster leading to confusion.
Expected Result:
The default CIS scan profile should align with the Kubernetes version of the cluster.
For example:
If the K8s version of the cluster is v1.23, the default CIS scan profile should be CIS 1.23 profile.
If the K8s version of the cluster is v1.24, the default CIS scan profile should be CIS 1.24 profile.
If the K8s version of the cluster is v1.25, the default CIS scan profile should be CIS 1.7 profile.
Screenshots
Here's a screenshot from a K3s cluster running K8s v1.24.15:
Rancher Server Setup
Information about the Cluster
User Information
Describe the bug When creating a new CIS scan in the Rancher UI, the default profile chosen from the drop-down menu is always "CIS 1.7 Permissive" and does not align with the K8s version running in the cluster.
Steps to Recreate:
Issue/Actual Result: The default CIS scan profile is always "CIS 1.7 Permissive," irrespective of the Kubernetes version of the cluster leading to confusion.
Expected Result: The default CIS scan profile should align with the Kubernetes version of the cluster. For example:
Screenshots Here's a screenshot from a K3s cluster running K8s v1.24.15: