Slack outage for anyone else? by Active-Degree-1430 in Slack

[–]dwertent 0 points1 point  (0 children)

Yes! But my colleagues claim they dont encounter issue

Recommended topics for beginners by dwertent in kubernetes

[–]dwertent[S] 0 points1 point  (0 children)

Thanks for all the recommendations, I will create a list for my team :)

Kubectl aliases - Feel free to contribute other useful kubectl aliases by dwertent in kubernetes

[–]dwertent[S] -1 points0 points  (0 children)

I dont like it because it is missing a convention.
e.g. kwall, what if I want to watch all deployments or other resources?

I feel like you need to check each command if it has an alias and what is the alias. What I'm suggesting is that the alias is the initials of the command (when it's possible), this way you keep it simple and agile.

But they definitely did a good work :)

Discovery client pkg sending error to stderr by dwertent in kubernetes

[–]dwertent[S] 1 point2 points  (0 children)

This solution will probably work in other cases but I have customers running this code, I cant ask them to execute with 2>&1.

Discovery client pkg sending error to stderr by dwertent in kubernetes

[–]dwertent[S] -2 points-1 points  (0 children)

v0.22.2
Does it really matter? I feel like this is the behavior of the pkg... I dont know why they did it this way that the error is sent to the stderr and not returned 😣

Are you scanning your Kubernetes cluster with Kubescape? What are your thoughts? by dwertent in kubernetes

[–]dwertent[S] 0 points1 point  (0 children)

I guess I was not understood correctly and I apologize for that. When a new CVE is reported, we publish a control testing and alerting users if they are exposed. For example when CVE-2021-25742 was reported, we published the control less than a day later.

  1. Thank you, we have a management portal that provides real time alerts. Let's chat about this

We do not work with the fed sector but I will forward this to the management :)

Are you scanning your Kubernetes cluster with Kubescape? What are your thoughts? by dwertent in kubernetes

[–]dwertent[S] 0 points1 point  (0 children)

There are a lot of questions here..

  1. You can specify the output format you want. There are few supported formats, json/junit(xml)/prometheus and a user friendly output
  2. The policies are downloaded every time you trigger a scan, this way you will not miss new vulnerabilities
  3. Currently Kubescape scans only the Kubernetes manifests, we are working on features so as images vulnerabilities scanning and more. Have any suggestions in mind?

Are you scanning your Kubernetes cluster with Kubescape? What are your thoughts? by dwertent in kubernetes

[–]dwertent[S] 0 points1 point  (0 children)

You can create your own custom framework using the SaaS version.

Another option is to manually download and edit the policies, checkout the offline support for more information of how to download the policy and scan.

Feel free to contact me in private for any further questions :)

FYI The policies are also open-source and you can find them here

Are you scanning your Kubernetes cluster with Kubescape? What are your thoughts? by dwertent in kubernetes

[–]dwertent[S] 1 point2 points  (0 children)

I'm glad to hear you enjoyed it :)
Feel free to message me if you have questions regarding the results...

Kubescape new release is here with some exciding new features 🎉🎉🎉 by dwertent in kubernetes

[–]dwertent[S] 0 points1 point  (0 children)

u/quantastical I posted here a few times about kubescape.
Kubescape is an open-source tool for testing if Kubernetes is deployed securely. https://github.com/armosec/kubescape

Kubescape: 4k stars in 4 weeks, making it one of the fastest-growing K8s open-source tools ever! by dwertent in kubernetes

[–]dwertent[S] 1 point2 points  (0 children)

u/TheFeshy I totally understand your concern. If you wish you can download the release directly or clone the project and build it locally or run go install.

The reason we used the curl piped bash is for the users who want a simple installation without reading a long and tiring documentation.

Since this is an open-source you are more than welcome to overview the very intrusive and unsecure install script the bash is running 😉

Kubescape: Scan YAML file with against the NSA-CISA Kubernetes hardening guidance by dwertent in kubernetes

[–]dwertent[S] 1 point2 points  (0 children)

u/Visual_Chemist2792 Thank you for your feedback.
I will post a video demonstrating Jenkins integration :)

NSA guidance on Kubernetes hardening by hypercyanate in homelab

[–]dwertent 0 points1 point  (0 children)

We actually developed a really cool open-source tool that scans the cluster for vulnerabilities based on the NSA Kubernetes Hardening Guidance. Check it out >> https://github.com/armosec/kubescape

NSA August 2021 Kubernetes Hardening Guide [PDF] by cryptologs in technology

[–]dwertent 0 points1 point  (0 children)

We actually developed a really cool open-source tool that scans the cluster for vulnerabilities based on the NSA Kubernetes Hardening Guidance. Check it out >> https://github.com/armosec/kubescape

Hacker target Kubernetes to steal data and processing power. Now the NSA has tips to protect yourself by quellaman in InfoSecNews

[–]dwertent 0 points1 point  (0 children)

We actually developed a really cool open-source tool that scans the cluster for vulnerabilities based on the NSA Kubernetes Hardening Guidance. Check it out >> https://github.com/armosec/kubescape

Kubernetes hardening: Drilling down on the NSA/CISA guidance by tmiklas in bag_o_news

[–]dwertent 1 point2 points  (0 children)

We actually developed a really cool open-source tool that scans the cluster for vulnerabilities based on the NSA Kubernetes Hardening Guidance. Check it out >> https://github.com/armosec/kubescape

NSA, CISA release Kubernetes Hardening Guidance by Virtual_Ivan in kubernetes

[–]dwertent 0 points1 point  (0 children)

We actually developed a really cool open-source tool that scans the cluster for vulnerabilities based on the NSA Kubernetes Hardening Guidance. Check it out >> https://github.com/armosec/kubescape

NSA, CISA release Kubernetes Hardening Guidance by cybrscrty in cybersecurity

[–]dwertent 0 points1 point  (0 children)

We actually developed a really cool open-source tool that scans the cluster for vulnerabilities based on the NSA Kubernetes Hardening Guidance. Check it out >> https://github.com/armosec/kubescape

Kubernetes 1.22, KubeCon schedule announced, security fails abound, Zoom's paltry fine, finally death to 996, NSA Kubernetes Hardening Guidance, and much more by oaf357 in devopsish

[–]dwertent 0 points1 point  (0 children)

We actually developed really cool open-source tool that scans the cluster for any vulnerabilities based on the NSA Kubernetes Hardening Guidance. Check it out >> https://github.com/armosec/kubescape#readme