KubeLinter is a static analysis tool that checks Kubernetes YAML files and Helm charts to ensure that applications adhere to best practices.
More: https://ku.bz/5V9YXG-Br
More: https://ku.bz/5V9YXG-Br
Over 300,000 Prometheus servers and exporters are exposed to the internet without authentication, posing significant security risks, including information disclosure, DoS attacks, and remote code execution through "RepoJacking" vulnerabilities
More: https://ku.bz/kfm9gDp_x
More: https://ku.bz/kfm9gDp_x
Sealed Secrets provides declarative Kubernetes Secret Management in a secure way.
Since the Sealed Secrets are encrypted, they can be safely stored in a code repository.
More: https://ku.bz/Gpl8p7ZQB
Since the Sealed Secrets are encrypted, they can be safely stored in a code repository.
More: https://ku.bz/Gpl8p7ZQB
In this tutorial, you'll explore an approach to setting up a Keycloak token exchange in a local Kubernetes environment with Istio ingress.
More: https://ku.bz/bqrqDBxNw
More: https://ku.bz/bqrqDBxNw
Forwarded from KubeFM
Media is too big
VIEW IN TELEGRAM
Andrew Charlton, Staff Software Engineer at Timescale, explains how they replaced Kubernetes StatefulSets with a custom operator called Popper for their PostgreSQL Cloud Platform.
You will learn:
- Why StatefulSets fall short for managing high-availability PostgreSQL clusters, particularly around pod ordering and volume management
- How Timescale's instance matching approach solves complex reconciliation challenges when managing heterogeneous database workloads
- The benefits of implementing discrete, idempotent actions rather than workflows in Kubernetes operators
Watch (or listen to) it here: https://ku.bz/fhZ_pNXM3
🌟 This episode is brought to you by [MetalBear] mirrord — run local code like in your Kubernetes cluster without deploying first https://ku.bz/lHtPqsdjq
With @Birthmarkb "Yo quiero Taco Bell" Farrell
You will learn:
- Why StatefulSets fall short for managing high-availability PostgreSQL clusters, particularly around pod ordering and volume management
- How Timescale's instance matching approach solves complex reconciliation challenges when managing heterogeneous database workloads
- The benefits of implementing discrete, idempotent actions rather than workflows in Kubernetes operators
Watch (or listen to) it here: https://ku.bz/fhZ_pNXM3
🌟 This episode is brought to you by [MetalBear] mirrord — run local code like in your Kubernetes cluster without deploying first https://ku.bz/lHtPqsdjq
With @Birthmarkb "Yo quiero Taco Bell" Farrell
Kubeconform is a Kubernetes manifests validation tool.
Similar to Kubeval, but with the following improvements:
1. High performance.
2. Remote or local schema locations
3. Up-to-date schemas for all recent versions of Kubernetes.
More: https://ku.bz/4MJn8zKDH
Similar to Kubeval, but with the following improvements:
1. High performance.
2. Remote or local schema locations
3. Up-to-date schemas for all recent versions of Kubernetes.
More: https://ku.bz/4MJn8zKDH
Forwarded from LearnKube news
This week on Learn Kubernetes Weekly 128:
🤔 Why Pull Base Images When You Can Build Your Own?
☁️ Scaling in the Clouds: Istio Ambient vs Cilium
🧹 Kubernetes configuration linting tools
♻️ Git happens: how Argo CD took over our deployments
🤗 I Stopped Using Kubernetes: Our DevOps Team Is Happier Than Ever
Read it now: https://learnk8s.io/issues/128
⭐️ This issue is brought to you by Akamai Cloud — build and deliver low-latency, edge native applications on the world's most distributed cloud computing platform https://ku.bz/93rJKSr_V
🤔 Why Pull Base Images When You Can Build Your Own?
☁️ Scaling in the Clouds: Istio Ambient vs Cilium
🧹 Kubernetes configuration linting tools
♻️ Git happens: how Argo CD took over our deployments
🤗 I Stopped Using Kubernetes: Our DevOps Team Is Happier Than Ever
Read it now: https://learnk8s.io/issues/128
⭐️ This issue is brought to you by Akamai Cloud — build and deliver low-latency, edge native applications on the world's most distributed cloud computing platform https://ku.bz/93rJKSr_V
Integrate Azure Policy with AKS to automatically enforce Kubernetes security standards.
Learn how to use built-in policies, prevent privileged containers, and implement compliance checks across your cluster infrastructure.
More: https://ku.bz/PkGQptrMt
Learn how to use built-in policies, prevent privileged containers, and implement compliance checks across your cluster infrastructure.
More: https://ku.bz/PkGQptrMt
Trousseau is an open-source project that leverages the Kubernetes Key Management Service (KMS) provider framework to secure Secrets within the Kubernetes etcd instance using a Transit Key stored within a remote KMS.
More: https://ku.bz/lM2hC3Hkz
More: https://ku.bz/lM2hC3Hkz
Forwarded from Kube Events
🚀 KubeCrash is Coming! Mark Your Calendars for May 8th!
KubeCrash brings together open source maintainers and industry experts to share cloud native best practices specifically for platform engineers.
At this event, you'll learn about:
- Platform engineering approaches that work in the real world
- Observability implementation strategies
- Kubernetes management techniques
- Practical solutions used by companies like Intuit, Bloomberg, and Capital One
Join to hear from an exceptional lineup of speakers including @Birthmarkb (KubeFM), Ramiro Berrelleza (Okteto), Guy Menahem (The Platformers Community), and many more.
Plus, it's completely FREE and supports the "Deaf Kids Code" charity.
📆 May 8, 2025
🕓 4 pm CET | 10 am ET | 7 am PT
📍 Online
More info: https://ku.bz/KD73z_cTY
KubeCrash brings together open source maintainers and industry experts to share cloud native best practices specifically for platform engineers.
At this event, you'll learn about:
- Platform engineering approaches that work in the real world
- Observability implementation strategies
- Kubernetes management techniques
- Practical solutions used by companies like Intuit, Bloomberg, and Capital One
Join to hear from an exceptional lineup of speakers including @Birthmarkb (KubeFM), Ramiro Berrelleza (Okteto), Guy Menahem (The Platformers Community), and many more.
Plus, it's completely FREE and supports the "Deaf Kids Code" charity.
📆 May 8, 2025
🕓 4 pm CET | 10 am ET | 7 am PT
📍 Online
More info: https://ku.bz/KD73z_cTY
Learn how to secure applications by deploying Keycloak on Kubernetes using Helm, automating user management, implementing strong security policies, and creating a scalable identity infrastructure with minimal manual configuration.
More: https://ku.bz/g3BC2BCw_
More: https://ku.bz/g3BC2BCw_
Cerbos is an authorization layer that enables you to define context-aware access control rules for your application resources in simple, intuitive YAML policies managed and deployed via your Git-ops infrastructure.
More: https://ku.bz/_l3Jd0L1b
More: https://ku.bz/_l3Jd0L1b
Forwarded from KubeFM
Media is too big
VIEW IN TELEGRAM
Grzegorz, Kubernetes Engineer at Cloud Kitchens, shares his team's journey developing a comprehensive self-healing framework for Kubernetes.
You will learn:
- How managed Kubernetes services like AKS provide benefits but require customization for specific use cases
- The architecture of an effective self-healing framework using DaemonSets and deployments with Kubernetes-native components
- Practical solutions for common challenges like StatefulSet pods stuck on unreachable nodes and cleaning up orphaned pods
- Techniques for workload-level automation, including throttling CPU-hungry pods and automating diagnostic data collection
Watch (or listen to) it here: https://ku.bz/yg_fkP0LN
🌟 This episode is brought to you by Learnk8s — get started on your Kubernetes journey through comprehensive online, in-person or remote training https://learnk8s.io/training
With @Birthmarkb "Making you smile" Farrell
You will learn:
- How managed Kubernetes services like AKS provide benefits but require customization for specific use cases
- The architecture of an effective self-healing framework using DaemonSets and deployments with Kubernetes-native components
- Practical solutions for common challenges like StatefulSet pods stuck on unreachable nodes and cleaning up orphaned pods
- Techniques for workload-level automation, including throttling CPU-hungry pods and automating diagnostic data collection
Watch (or listen to) it here: https://ku.bz/yg_fkP0LN
🌟 This episode is brought to you by Learnk8s — get started on your Kubernetes journey through comprehensive online, in-person or remote training https://learnk8s.io/training
With @Birthmarkb "Making you smile" Farrell
helm-secrets is a Helm plugin for decrypting encrypted Helm value files on the fly.
- Use SOPS to encrypt value files and store them in git.
- Store your secrets in a cloud native secret manager and inject them into value files or templates.
More: https://ku.bz/jhX4NWYKs
- Use SOPS to encrypt value files and store them in git.
- Store your secrets in a cloud native secret manager and inject them into value files or templates.
More: https://ku.bz/jhX4NWYKs
Forwarded from LearnKube news
This week on Learn Kubernetes Weekly 129:
🤔 How CoreDNS and NodeLocalDNS Work in a Kubernetes Cluster
👋 Building a container filesytem by hand
🏃♀️ Migrating GitLab CI from Docker+Machine to Kubernetes
📈 Scaling a development environment on a budget
💪 Karpenter: The Future of Worker Management and Autoscaling on Kubernetes
Read it now: https://learnk8s.io/issues/129
⭐️ This issue is brought to you by Akamai Cloud — Akamai is offering up to $5,000 in cloud credits to our subscribers (see details inside). Build and deliver low-latency, edge native applications on the world's most distributed cloud computing platform.
🤔 How CoreDNS and NodeLocalDNS Work in a Kubernetes Cluster
👋 Building a container filesytem by hand
🏃♀️ Migrating GitLab CI from Docker+Machine to Kubernetes
📈 Scaling a development environment on a budget
💪 Karpenter: The Future of Worker Management and Autoscaling on Kubernetes
Read it now: https://learnk8s.io/issues/129
⭐️ This issue is brought to you by Akamai Cloud — Akamai is offering up to $5,000 in cloud credits to our subscribers (see details inside). Build and deliver low-latency, edge native applications on the world's most distributed cloud computing platform.
Forwarded from KubeFM
This media is not supported in your browser
VIEW IN TELEGRAM
Jim Bugwadia, Co-Founder & CEO @ Nirmata, explains how policy as code addresses the tension between platform standardization and team autonomy in Kubernetes environments.
He highlights how Kyverno, a policy engine for Kubernetes, enables teams to write declarative policies using CEL and other languages. This approach creates a collaborative framework where developers and security operations teams can work together on policies, striking the right balance between necessary guardrails and self-service capabilities.
Watch the full interview: https://ku.bz/hYZXTmPV9
This interview is a reaction to Calin Florescu's episode https://ku.bz/mcPtH5395
He highlights how Kyverno, a policy engine for Kubernetes, enables teams to write declarative policies using CEL and other languages. This approach creates a collaborative framework where developers and security operations teams can work together on policies, striking the right balance between necessary guardrails and self-service capabilities.
Watch the full interview: https://ku.bz/hYZXTmPV9
This interview is a reaction to Calin Florescu's episode https://ku.bz/mcPtH5395
This media is not supported in your browser
VIEW IN TELEGRAM
helmper is a Go program that reads Helm Charts from remote OCI registries and pushes the charts container images to your registries with optional OS-level vulnerability patching.
More: https://ku.bz/sjn0NBtXQ
More: https://ku.bz/sjn0NBtXQ
Forwarded from KubeFM
Media is too big
VIEW IN TELEGRAM
Hillai Ben-Sasson and Ronen Shustin, Security Researchers at Wiz, discuss crucial strategies for implementing multi-tenancy in Kubernetes. They emphasize two primary areas:
1. Network Security: Kubernetes does not inherently prevent network access between nodes, making robust network isolation essential.
2. Namespace Separation.
They also highlight the importance of advanced container security technologies, such as GVisor and Kata Containers, to prevent container escapes.
Watch the full episode: https://ku.bz/yr16qNTFx
1. Network Security: Kubernetes does not inherently prevent network access between nodes, making robust network isolation essential.
2. Namespace Separation.
They also highlight the importance of advanced container security technologies, such as GVisor and Kata Containers, to prevent container escapes.
Watch the full episode: https://ku.bz/yr16qNTFx
This post is a deep dive into comparing different solutions for authenticating into a Kubernetes cluster.
It will give you an idea of what the various solutions provide for a typical cluster deployment using production-capable configurations.
More: https://tremolosecurity.com/post/kubernetes-authentication-comparing-solutions
It will give you an idea of what the various solutions provide for a typical cluster deployment using production-capable configurations.
More: https://tremolosecurity.com/post/kubernetes-authentication-comparing-solutions
Tetragon enables powerful real-time, eBPF-based security observability and runtime enforcement.
It is Kubernetes-aware and understands identities so that security event detection can be configured in relation to individual workloads.
More: https://github.com/cilium/tetragon
It is Kubernetes-aware and understands identities so that security event detection can be configured in relation to individual workloads.
More: https://github.com/cilium/tetragon
Forwarded from KubeFM
This media is not supported in your browser
VIEW IN TELEGRAM
Tim Miller CEO and Co-founder at Kusari discusses why implementing robust processes is more critical than relying on scanning tools for secret management.
While multiple scanning approaches (regex and entropy-based) can detect secrets, the priority should be on preventing leaks through SLSA attestations, proper access controls, and using short-lived credentials. This proactive approach addresses the root cause rather than detecting secrets after they've entered repositories.
Watch the full interview: https://ku.bz/-2Sqn9Jb9
This interview is a reaction to Assaf Morag and Yakir Kadkoda's episode https://ku.bz/5RKVBGlQR
While multiple scanning approaches (regex and entropy-based) can detect secrets, the priority should be on preventing leaks through SLSA attestations, proper access controls, and using short-lived credentials. This proactive approach addresses the root cause rather than detecting secrets after they've entered repositories.
Watch the full interview: https://ku.bz/-2Sqn9Jb9
This interview is a reaction to Assaf Morag and Yakir Kadkoda's episode https://ku.bz/5RKVBGlQR