Kubelogin is a Kubernetes credential (exec) plugin implementing the Azure authentication methods such as:
- Device code login.
- Non-interactive service principal login.
- Non-interactive workload identity login.
- OIDC provider for Azure AD.
And more.
More: https://github.com/Azure/kubelogin
- Device code login.
- Non-interactive service principal login.
- Non-interactive workload identity login.
- OIDC provider for Azure AD.
And more.
More: https://github.com/Azure/kubelogin
GitHub
GitHub - Azure/kubelogin: A Kubernetes credential (exec) plugin implementing azure authentication
A Kubernetes credential (exec) plugin implementing azure authentication - Azure/kubelogin
In this article, you will learn why PodSecurityPolicies never made it as a GA feature, why they had to be replaced and what you should consider going forward.
More: https://macchaffee.com/blog/2022/psp-deprecation
More: https://macchaffee.com/blog/2022/psp-deprecation
Macchaffee
The Fumbled Deprecation of PodSecurityPolicies
Mac's Tech Blog
In this post, you'll learn how to achieve continuous Runtime-Security monitoring for container-based workloads running on Kubernetes through custom integration between Falco, Falco-SideKick, WebUI, and AWS CloudWatch/PagerDuty.
More: https://aymen-abdelwahed.medium.com/falco-security-at-runtime-for-kubernetes-d9176cc76020
More: https://aymen-abdelwahed.medium.com/falco-security-at-runtime-for-kubernetes-d9176cc76020
This article will cover Istio and:
- What is the sidecar pattern and what advantages does it have?
- How are the sidecar injections done in Istio?
- How does the sidecar proxy do transparent traffic hijacking?
- How is the traffic routed upstream?
More: https://jimmysong.io/en/blog/sidecar-injection-iptables-and-traffic-routing
- What is the sidecar pattern and what advantages does it have?
- How are the sidecar injections done in Istio?
- How does the sidecar proxy do transparent traffic hijacking?
- How is the traffic routed upstream?
More: https://jimmysong.io/en/blog/sidecar-injection-iptables-and-traffic-routing
Kubernetes is neither secure by default, nor by itself.
You absolutely can, and must, harden its configuration.
This article summarises the NSA/CISA guidelines on security hardening Kubernetes.
More: https://elastisys.com/nsa-cisa-kubernetes-security-hardening-guide-and-beyond-for-2022
You absolutely can, and must, harden its configuration.
This article summarises the NSA/CISA guidelines on security hardening Kubernetes.
More: https://elastisys.com/nsa-cisa-kubernetes-security-hardening-guide-and-beyond-for-2022
elastisys
Free Guide: How to Security Harden Kubernetes in 2022
How to security harden Kubernetes in 2022. The NSA/CISA guidelines summarized, with Elastisys hands-on advice and real-world recommendations.
Forwarded from LearnKube news
Learnk8s and Linode are launching a three-part, free educational program on Kubernetes scaling.
Each session comes with a webinar, code samples and a step-by-step article:
- Unit 1: "Request-based autoscaling in Kubernetes: scaling to zero and back" (21st of Sept)
- Unit 2: "Proactive cluster autoscaling in Kubernetes" (28th of Sept)
- Unit 3: "Scaling Kubernetes to multiple clusters and regions" (5th of Oct)
What you can expect:
- A live webinar (Chris, Salman & Daniele will present them). The event is recorded, and you can watch it later too.
- A step-by-step tutorial on Linode's blog where you can try everything we demo live.
- A collection of noscripts and resources helpful to understand and (if you want) extend our code.
You can sign up here: bit.ly/k8s-scale
Each session comes with a webinar, code samples and a step-by-step article:
- Unit 1: "Request-based autoscaling in Kubernetes: scaling to zero and back" (21st of Sept)
- Unit 2: "Proactive cluster autoscaling in Kubernetes" (28th of Sept)
- Unit 3: "Scaling Kubernetes to multiple clusters and regions" (5th of Oct)
What you can expect:
- A live webinar (Chris, Salman & Daniele will present them). The event is recorded, and you can watch it later too.
- A step-by-step tutorial on Linode's blog where you can try everything we demo live.
- A collection of noscripts and resources helpful to understand and (if you want) extend our code.
You can sign up here: bit.ly/k8s-scale
Permission Manager is an application that enables a super-easy and user-friendly RBAC management for Kubernetes.
With Permission Manager, you can create users, assign namespaces/permissions, and distribute Kubeconfig YAML files via a nice & easy web UI.
More: https://github.com/sighupio/permission-manager
With Permission Manager, you can create users, assign namespaces/permissions, and distribute Kubeconfig YAML files via a nice & easy web UI.
More: https://github.com/sighupio/permission-manager
Forwarded from LearnKube news
Master Kubernetes with this a 4-day Advanced Kubernetes workshop on the 22nd of September (in 3 weeks)!
_What should you expect?_
- Learn how to architect and design clusters from the ground up (in the cloud or on-prem).
- Explore the Kubernetes internal component and how the system is designed with resiliency in mind.
- **Deep-dive into the networking components and observe the packets flowing into the cluster.
- Hands-on labs to test the theory with real-world scenarios!
You can sign up here: https://learnk8s.io/online-advanced-september-2022
_What should you expect?_
- Learn how to architect and design clusters from the ground up (in the cloud or on-prem).
- Explore the Kubernetes internal component and how the system is designed with resiliency in mind.
- **Deep-dive into the networking components and observe the packets flowing into the cluster.
- Hands-on labs to test the theory with real-world scenarios!
You can sign up here: https://learnk8s.io/online-advanced-september-2022
In this article, you will learn how to combine LDAP, Dex and Gangway to log in users in a Kubernetes cluster.
More: https://medium.com/upstream-engineering/kubernetes-authentication-using-ldap-and-oauth2-83c3457becf8
More: https://medium.com/upstream-engineering/kubernetes-authentication-using-ldap-and-oauth2-83c3457becf8
In this series of articles, you will explore:
1. How to secure image signing with cosign and AWS KMS.
2. How to use the sigstore Policy-controller to validate images in Kubernetes via admission controller.
More: https://medium.com/@slimm609/image-signing-validation-on-k8s-4b3202dbcd6c
1. How to secure image signing with cosign and AWS KMS.
2. How to use the sigstore Policy-controller to validate images in Kubernetes via admission controller.
More: https://medium.com/@slimm609/image-signing-validation-on-k8s-4b3202dbcd6c
Medium
Image signing validation on K8s
In the previous post, we talked about using AWS KMS with Cosign to sign images before pushing them to an untrusted container registry and…
Forwarded from Kube Events
🗓 Kubernetes events starting in the next 24 hours:
05 Sep 8:00 am GMT - 🔥 ContainerDays 2022 | ContainerDays - 📍 Online & in-person conference
05 Sep 1:00 pm GMT - Microsoft Azure virtual training day: cloud-native apps | Microsoft - 📍 Online webinar
→ See all Kubernetes events
05 Sep 8:00 am GMT - 🔥 ContainerDays 2022 | ContainerDays - 📍 Online & in-person conference
05 Sep 1:00 pm GMT - Microsoft Azure virtual training day: cloud-native apps | Microsoft - 📍 Online webinar
→ See all Kubernetes events
Forwarded from Kube Events
Hello,
We wanted to share some discounts we received from the Conference organisers. We hope you will find these helpful.
We share more in our newsletter. You can subscribe to our Newsletter here: https://kube.events
1. SKILup Festival: London (50% off)
Date: September 13, 2022
Discount code: https://www.skilupfestival.io/london-22?promo=KubeEvents
2. SREday 2022, London (30% off)
Date: September 15-16, 2022 https://checkout.eventcreate.com/sreday/select-buy Coupon code: SREDAY-KUBE-EVENTS
3. DevOpsDays Washington DC 2022 (20% off)
Date: September 15-16, 2022 https://www.eventbrite.com/e/345684861727/?discount=K8SEVENTSFRIENDS
The Strange Loop conference ($75 off) Date: September 22-24, 2022
Tickets page: https://ti.to/strange-loop/2022
Coupon code: KUBE
We wanted to share some discounts we received from the Conference organisers. We hope you will find these helpful.
We share more in our newsletter. You can subscribe to our Newsletter here: https://kube.events
1. SKILup Festival: London (50% off)
Date: September 13, 2022
Discount code: https://www.skilupfestival.io/london-22?promo=KubeEvents
2. SREday 2022, London (30% off)
Date: September 15-16, 2022 https://checkout.eventcreate.com/sreday/select-buy Coupon code: SREDAY-KUBE-EVENTS
3. DevOpsDays Washington DC 2022 (20% off)
Date: September 15-16, 2022 https://www.eventbrite.com/e/345684861727/?discount=K8SEVENTSFRIENDS
The Strange Loop conference ($75 off) Date: September 22-24, 2022
Tickets page: https://ti.to/strange-loop/2022
Coupon code: KUBE
Kube Events
Kubernetes events | Kube Events
Curated meetups, conferences, training and webinars on Kubernetes
Forwarded from LearnKube news
Master Kubernetes with this a 4-day Advanced Kubernetes workshop on the 22nd of September (in 2 weeks)!
_What should you expect?_
- Learn how to architect and design clusters from the ground up (in the cloud or on-prem).
- Explore the Kubernetes internal component and how the system is designed with resiliency in mind.
- **Deep-dive into the networking components and observe the packets flowing into the cluster.
- Hands-on labs to test the theory with real-world scenarios!
You can sign up here: https://learnk8s.io/online-advanced-september-2022
_What should you expect?_
- Learn how to architect and design clusters from the ground up (in the cloud or on-prem).
- Explore the Kubernetes internal component and how the system is designed with resiliency in mind.
- **Deep-dive into the networking components and observe the packets flowing into the cluster.
- Hands-on labs to test the theory with real-world scenarios!
You can sign up here: https://learnk8s.io/online-advanced-september-2022
What happens if an attacker accesses your Prometheus server?
How much information can they get for fingerprinting the cluster?
In this article, you will learn how attackers use this information and how to secure your cluster.
More: https://sysdig.com/blog/exposed-prometheus-exploit-kubernetes-kubeconeu
How much information can they get for fingerprinting the cluster?
In this article, you will learn how attackers use this information and how to secure your cluster.
More: https://sysdig.com/blog/exposed-prometheus-exploit-kubernetes-kubeconeu
This article will look into how you can secure Ingress resources via adding TLS to Ingress and then procuring TLS/SSL certificates.
More: https://armosec.io/blog/kubernetes-ingress-security
More: https://armosec.io/blog/kubernetes-ingress-security
ARMO
How to secure Kubernetes ingress? | ARMO
This article will look into how we can secure Ingress resources via adding TLS to Ingress and then procuring TLS/SSL certificates
In this article you will explore how users and workloads are authenticated with the Kubernes API server.
More: https://learnk8s.io/authentication-kubernetes
More: https://learnk8s.io/authentication-kubernetes
Forwarded from LearnKube news
Reducing infrastructure costs boils down to turning apps off when you don't use them.
However, the challenge is figuring out how to turn them on automatically when needed.
Take the example of a Kubernetes dev cluster: you might want not to run any service during the weekend.
In this webinar, Salman will demo live how you can use KEDA and the HTTP scaler to intercept and monitor the requests to your services and scale your pods accordingly.
In the process, you will discover how you can scale to zero and create pods only when you need them.
You can register here (it's free): https://kube.events/t/8d60478c-573e-4e07-bd3d-972706ea8307
However, the challenge is figuring out how to turn them on automatically when needed.
Take the example of a Kubernetes dev cluster: you might want not to run any service during the weekend.
In this webinar, Salman will demo live how you can use KEDA and the HTTP scaler to intercept and monitor the requests to your services and scale your pods accordingly.
In the process, you will discover how you can scale to zero and create pods only when you need them.
You can register here (it's free): https://kube.events/t/8d60478c-573e-4e07-bd3d-972706ea8307
In this article, you will learn about Kubernetes security and architecture by reviewing reports from Chekov — a tool designed to find misconfigurations before they’re deployed.
More: https://blog.frankel.ch/learning-auditing-kubernetes-manifests
More: https://blog.frankel.ch/learning-auditing-kubernetes-manifests
A Java geek
Learning by auditing Kubernetes manifests
Last year, I spoke at the National DevOps Conference that took place at the British Museum. I had already visited the museum before, but speaking there was a fantastic experience. Besides, we had the museum all for ourselves for a couple of hours. If you’ve…
Over 900k Kubernetes exposures were observed across the internet during a routine threat-hunting exercise.
While this does not imply that all exposed instances are vulnerable to attacks, it still makes them a target.
You can learn more in this report.
More: https://blog.cyble.com/2022/06/27/exposed-kubernetes-clusters
While this does not imply that all exposed instances are vulnerable to attacks, it still makes them a target.
You can learn more in this report.
More: https://blog.cyble.com/2022/06/27/exposed-kubernetes-clusters
All unpatched versions of Argo CD starting with v1.3.0 are vulnerable to a symlink following bug allowing a malicious user with repository write access to leak sensitive YAML files from Argo CD's repo-server.
More: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31036
More: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31036
cve.mitre.org
CVE -
CVE-2022-31036
CVE-2022-31036
The mission of the CVE® Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities.
Secrets in Kubernetes are used to store sensitive information.
This blog post will show how to secure Kubernetes secrets using the Hashicorp vault.
More: https://infracloud.io/blogs/kubernetes-secrets-hashicorp-vault
This blog post will show how to secure Kubernetes secrets using the Hashicorp vault.
More: https://infracloud.io/blogs/kubernetes-secrets-hashicorp-vault