Kubesploit – Telegram
Kubesploit
1.95K subscribers
824 photos
128 videos
1.61K links
News and links on Kubernetes security curated by the @Learnk8s team
Website: https://kubesploit.io/
Download Telegram
Sealed Secrets provides declarative Kubernetes Secret Management in a secure way.

Since the Sealed Secrets are encrypted, they can be safely stored in a code repository.

More: https://ku.bz/Gpl8p7ZQB
In this tutorial, you'll explore an approach to setting up a Keycloak token exchange in a local Kubernetes environment with Istio ingress.

More: https://ku.bz/bqrqDBxNw
Forwarded from KubeFM
Media is too big
VIEW IN TELEGRAM
Andrew Charlton, Staff Software Engineer at Timescale, explains how they replaced Kubernetes StatefulSets with a custom operator called Popper for their PostgreSQL Cloud Platform.

You will learn:

- Why StatefulSets fall short for managing high-availability PostgreSQL clusters, particularly around pod ordering and volume management
- How Timescale's instance matching approach solves complex reconciliation challenges when managing heterogeneous database workloads
- The benefits of implementing discrete, idempotent actions rather than workflows in Kubernetes operators

Watch (or listen to) it here: https://ku.bz/fhZ_pNXM3

🌟 This episode is brought to you by [MetalBear] mirrord — run local code like in your Kubernetes cluster without deploying first https://ku.bz/lHtPqsdjq

With @Birthmarkb "Yo quiero Taco Bell" Farrell
Kubeconform is a Kubernetes manifests validation tool.

Similar to Kubeval, but with the following improvements:

1. High performance.
2. Remote or local schema locations
3. Up-to-date schemas for all recent versions of Kubernetes.

More: https://ku.bz/4MJn8zKDH
Forwarded from LearnKube news
This week on Learn Kubernetes Weekly 128:

🤔 Why Pull Base Images When You Can Build Your Own?
☁️ Scaling in the Clouds: Istio Ambient vs Cilium
🧹 Kubernetes configuration linting tools
♻️ Git happens: how Argo CD took over our deployments
🤗 I Stopped Using Kubernetes: Our DevOps Team Is Happier Than Ever

Read it now: https://learnk8s.io/issues/128

⭐️ This issue is brought to you by Akamai Cloud — build and deliver low-latency, edge native applications on the world's most distributed cloud computing platform https://ku.bz/93rJKSr_V
Integrate Azure Policy with AKS to automatically enforce Kubernetes security standards.

Learn how to use built-in policies, prevent privileged containers, and implement compliance checks across your cluster infrastructure.

More: https://ku.bz/PkGQptrMt
Trousseau is an open-source project that leverages the Kubernetes Key Management Service (KMS) provider framework to secure Secrets within the Kubernetes etcd instance using a Transit Key stored within a remote KMS.

More: https://ku.bz/lM2hC3Hkz
Forwarded from Kube Events
🚀 KubeCrash is Coming! Mark Your Calendars for May 8th!

KubeCrash brings together open source maintainers and industry experts to share cloud native best practices specifically for platform engineers.

At this event, you'll learn about:

- Platform engineering approaches that work in the real world
- Observability implementation strategies
- Kubernetes management techniques
- Practical solutions used by companies like Intuit, Bloomberg, and Capital One

Join to hear from an exceptional lineup of speakers including @Birthmarkb (KubeFM), Ramiro Berrelleza (Okteto), Guy Menahem (The Platformers Community), and many more.

Plus, it's completely FREE and supports the "Deaf Kids Code" charity.

📆 May 8, 2025
🕓 4 pm CET | 10 am ET | 7 am PT
📍 Online

More info: https://ku.bz/KD73z_cTY
Learn how to secure applications by deploying Keycloak on Kubernetes using Helm, automating user management, implementing strong security policies, and creating a scalable identity infrastructure with minimal manual configuration.

More: https://ku.bz/g3BC2BCw_
Cerbos is an authorization layer that enables you to define context-aware access control rules for your application resources in simple, intuitive YAML policies managed and deployed via your Git-ops infrastructure.

More: https://ku.bz/_l3Jd0L1b
Forwarded from KubeFM
Media is too big
VIEW IN TELEGRAM
Grzegorz, Kubernetes Engineer at Cloud Kitchens, shares his team's journey developing a comprehensive self-healing framework for Kubernetes.

You will learn:

- How managed Kubernetes services like AKS provide benefits but require customization for specific use cases
- The architecture of an effective self-healing framework using DaemonSets and deployments with Kubernetes-native components
- Practical solutions for common challenges like StatefulSet pods stuck on unreachable nodes and cleaning up orphaned pods
- Techniques for workload-level automation, including throttling CPU-hungry pods and automating diagnostic data collection

Watch (or listen to) it here: https://ku.bz/yg_fkP0LN

🌟 This episode is brought to you by Learnk8s — get started on your Kubernetes journey through comprehensive online, in-person or remote training https://learnk8s.io/training

With @Birthmarkb "Making you smile" Farrell
helm-secrets is a Helm plugin for decrypting encrypted Helm value files on the fly.

- Use SOPS to encrypt value files and store them in git.
- Store your secrets in a cloud native secret manager and inject them into value files or templates.

More: https://ku.bz/jhX4NWYKs
Forwarded from LearnKube news
This week on Learn Kubernetes Weekly 129:

🤔 How CoreDNS and NodeLocalDNS Work in a Kubernetes Cluster
👋 Building a container filesytem by hand
🏃‍♀️ Migrating GitLab CI from Docker+Machine to Kubernetes
📈 Scaling a development environment on a budget
💪 Karpenter: The Future of Worker Management and Autoscaling on Kubernetes

Read it now: https://learnk8s.io/issues/129

⭐️ This issue is brought to you by Akamai Cloud — Akamai is offering up to $5,000 in cloud credits to our subscribers (see details inside). Build and deliver low-latency, edge native applications on the world's most distributed cloud computing platform.
Forwarded from KubeFM
This media is not supported in your browser
VIEW IN TELEGRAM
Jim Bugwadia, Co-Founder & CEO @ Nirmata, explains how policy as code addresses the tension between platform standardization and team autonomy in Kubernetes environments.

He highlights how Kyverno, a policy engine for Kubernetes, enables teams to write declarative policies using CEL and other languages. This approach creates a collaborative framework where developers and security operations teams can work together on policies, striking the right balance between necessary guardrails and self-service capabilities.

Watch the full interview: https://ku.bz/hYZXTmPV9

This interview is a reaction to Calin Florescu's episode https://ku.bz/mcPtH5395
This media is not supported in your browser
VIEW IN TELEGRAM
helmper is a Go program that reads Helm Charts from remote OCI registries and pushes the charts container images to your registries with optional OS-level vulnerability patching.

More: https://ku.bz/sjn0NBtXQ
Forwarded from KubeFM
Media is too big
VIEW IN TELEGRAM
Hillai Ben-Sasson and Ronen Shustin, Security Researchers at Wiz, discuss crucial strategies for implementing multi-tenancy in Kubernetes. They emphasize two primary areas:

1. Network Security: Kubernetes does not inherently prevent network access between nodes, making robust network isolation essential.
2. Namespace Separation.

They also highlight the importance of advanced container security technologies, such as GVisor and Kata Containers, to prevent container escapes.

Watch the full episode: https://ku.bz/yr16qNTFx
This post is a deep dive into comparing different solutions for authenticating into a Kubernetes cluster.

It will give you an idea of what the various solutions provide for a typical cluster deployment using production-capable configurations.

More: https://tremolosecurity.com/post/kubernetes-authentication-comparing-solutions
Tetragon enables powerful real-time, eBPF-based security observability and runtime enforcement.

It is Kubernetes-aware and understands identities so that security event detection can be configured in relation to individual workloads.

More: https://github.com/cilium/tetragon
Forwarded from KubeFM
This media is not supported in your browser
VIEW IN TELEGRAM
Tim Miller CEO and Co-founder at Kusari discusses why implementing robust processes is more critical than relying on scanning tools for secret management.

While multiple scanning approaches (regex and entropy-based) can detect secrets, the priority should be on preventing leaks through SLSA attestations, proper access controls, and using short-lived credentials. This proactive approach addresses the root cause rather than detecting secrets after they've entered repositories.

Watch the full interview: https://ku.bz/-2Sqn9Jb9

This interview is a reaction to Assaf Morag and Yakir Kadkoda's episode https://ku.bz/5RKVBGlQR
In this article, you will learn how Apko can build container images via YAML configuration using the APK package format from Alpine.

It creates small, fast booting images with less memory and disk footprint, thereby reducing security risks.

More: https://gsantoro.dev/apko-from-chainguard
Forwarded from KubeFM
Media is too big
VIEW IN TELEGRAM
Discover how Adevinta manages Kubernetes upgrades at scale in this conversation with Tanat.

You will learn:

- How to transition from blue-green to in-place Kubernetes upgrades while maintaining service reliability
- Techniques for tracking and addressing API deprecations using tools like Pluto and Kube-no-trouble
- Strategies for minimizing SLO impact during node rebuilds through serialized approaches and proper PDB configuration
- Why a phased upgrade approach with "cluster waves" provides safer production deployments even with thorough testing

Watch (or listen to) it here: https://ku.bz/VVHFfXGl_

🌟 This episode is brought to you by Learnk8s — get started on your Kubernetes journey through comprehensive online, in-person or remote training https://learnk8s.io/training

With @Birthmarkb "Secret explorer" Farrell