The latest News and Information on Containers, Kubernetes, Docker and related technologies.
In this post we want to give a simple introduction for using network policies in a sample project and explaining how it works in K3s to help improving the security of your deployments. There is a common misunderstanding about K3s support for network policies, as K3s is using flannel CNI by default, and the Flannel CNI doesn’t support network polices.
Rancher is a Kubernetes management platform that creates a consistent environment for multicloud container operation. It solves several of the challenges around multicloud Kubernetes deployments, such as poor visibility into where workloads are running and the lack of centralized authentication and access control. Multicloud improves resiliency by letting you distribute applications across providers.
Google Cloud provides its own set of metrics for monitoring applications, services, and instances. There are a huge number of metrics – more than 1,500 different ones just for GCP monitoring! While this is great, dealing with such a number can also be overwhelming. Filtering, pulling, exploring, and storing the metrics that you really need can be an enormously time-consuming task, and a big challenge.
What is the difference with similar tools? Detect graftcp with Falco Conclusion A new network open source tool called graftcp (GitHub page) has been discovered in everyday attacks by the Sysdig Threat Research Team (TRT). Nowadays, threat actors try to improve their techniques by using new tools (as we mentioned in the PRoot article) to enhance the compatibility of their code to hit as many targets as possible and hide their traces properly.
Security in the cloud has become an increasingly important topic over the years, with the move to more managed services, additional trust is being handed over to cloud providers. With this being said, we must begin to pay closer attention to the security surrounding cloud computing, especially when it comes to Kubernetes. Join me as I explore the concept of confidential computing and a new use case we at Civo have been working on related to the Kubernetes control plane in managed clusters.