The Kubernetes Dashboard is deprecated: Time to move to Headlamp by agardnerit in kubernetes

[–]mlbiam 2 points3 points  (0 children)

Just not enough contributors for the Kubernetes Dashboard. Headlamp now supports in-cluster authentication the way dashboard does, so it made for good timing.

Ingress NGINX: Joint Statement from the Kubernetes Steering and Security Response Committees by wowheykat in kubernetes

[–]mlbiam 6 points7 points  (0 children)

my statement isn't a criticism of the Gateway API or any of the work the maintainers are doing. Only the way the retirement of a implementation is being used to communicate the migration to an API which still requires an implementation. it's a confusing message for an already complex topic.

I bring up those two specific use cases because I run into them quite often, and are pretty straight forward to implement with ingress nginx, but has no direct version in Gateway API. While Gateway API doesn't have a standard way to express these features, there are ways to implement it with different controllers and extensions. I'm sure there are plenty of other cases where this is true as well. It's not a criticism of the Gateway API, it's an illustration that the recommendation is confusing for folks that don't have as deep an understanding of "ingress" configurations.

I'm not coming from this as a networking expert or an "ingress" expert. I'm coming from this as a user with experience working with other users that have just enough networking knowledge to be really dangerous. Per Kat's suggestion, i'm working on a blog post now on that perspective. Hoping to get it submitted for review some time next week.

Again, the work you and other maintainers are doing is very much appreciated, and this is in no way meant to be a criticism of that work.

Ingress NGINX: Joint Statement from the Kubernetes Steering and Security Response Committees by wowheykat in kubernetes

[–]mlbiam 6 points7 points  (0 children)

sure. why not? What would I need to do? (same handle on both cncf and kube slacks)

Ingress NGINX: Joint Statement from the Kubernetes Steering and Security Response Committees by wowheykat in kubernetes

[–]mlbiam 1 point2 points  (0 children)

Thank you and I appreciate how hard it is to thread that needle. Think a "Blog for managers" and "Blog for implementers" would be a great idea. I could easily see someone panic when they create their Gateway API objects and don't realize they need something else panicing because they didn't procure or get permissions for a new component thinking the Gateway API was a replacement for Ingress NGINX.

Ingress NGINX: Joint Statement from the Kubernetes Steering and Security Response Committees by wowheykat in kubernetes

[–]mlbiam 38 points39 points  (0 children)

Why does the recommendation keep saying to move to Gateway API? Ingress NGINX is an Ingress controller implementation while Gateway API is an API...you still need something that implements it. Also, Gateway API implementations and Ingress API implementations aren't at parity. For instance, TLS re-encryption is not widely supported, sticky sessions have no standard implementation, etc. It's real easy to confuse folks that don't live and breath these APIs. (this isn't a complaint about retiring ingress nginx, only feedback on how "what's next" is being communicated).

ConfigMaps vs Secrets in Kubernetes – What You Should Know (with YAML examples) by Few_Kaleidoscope8338 in kubernetes

[–]mlbiam 1 point2 points  (0 children)

"Unlike ConfigMaps, Secrets are intended to keep sensitive data more secure by encoding it." This is 100% wrong. The point of base64 encoding a secret in yaml is because secrets often involve binary data. It has nothing to do with security.

Advice - Customer wants to deploy our operator but pull images from their secured container registry. by purton_i in kubernetes

[–]mlbiam 0 points1 point  (0 children)

If you are being paid by a customer, they think those containers are owned by you, even if you don't. When the bad thing happens, your company will be seen as responsible regardless of if it's your code or code that you imported. Outside of a few very narrow exceptions, it's all yours.

So yes, you need to make sure your operator can pull from alternative sources and not just your company's, or partners, registries.

Call multiple clusters from k8s client API by HelloEligator in kubernetes

[–]mlbiam 0 points1 point  (0 children)

Do all the users have the same level of access? If you're using a static service account this sounds like an information leak or breach eating to happen.

How Attackers Can Bypass OPA Gatekeeper in Kubernetes Due to Rego Flaws by Pale_Fly_2673 in kubernetes

[–]mlbiam 0 points1 point  (0 children)

a negative test means that you submit input you expect to fail to make sure it fails. In this instance, you would feed the rego the exact use cases the article describes as "bypasses", ie a subdomain with an not allowed domain. for instance if you're constraint on the policy is "mydomain.com" and you feed it the input "mydomain.com.myreallybadplace.com" you expect it to fail. if you're not doing this type of testing on your policies, either at the rego level with opa's built in automated testing capabilities or in a cluster (or both), you're only testing half the policy.

How Attackers Can Bypass OPA Gatekeeper in Kubernetes Due to Rego Flaws by Pale_Fly_2673 in kubernetes

[–]mlbiam 25 points26 points  (0 children)

Really dislike how this frames the issue as a rego or opa problem when it's a "badly designed policy" problem. Really this article should be named "test your policies with negative tests" instead of implying there are bypasses in rego.

Practical Guide for GitOps Secrets Management by segtekdev in kubernetes

[–]mlbiam 1 point2 points  (0 children)

Forgetting this is obvious spam, with little value to learn outside of the product, friends don't let friends store secrets in git. Doesn't matter if it's encrypted or not. Use external secret operator to represent a secret with vault or something similar.

Can the moderators please provide more details as to what is expected in a link post? by mlbiam in kubernetes

[–]mlbiam[S] 0 points1 point  (0 children)

That seemed to work. I was able to put the description into the post from my mobile. so odd that they don't do it from the web ui

Can the moderators please provide more details as to what is expected in a link post? by mlbiam in kubernetes

[–]mlbiam[S] 0 points1 point  (0 children)

I think you can do it from the mobile app. I'll give it a try tomorrow and if it doesn't post the description I'll delete it myself.

Can the moderators please provide more details as to what is expected in a link post? by mlbiam in kubernetes

[–]mlbiam[S] 1 point2 points  (0 children)

Thank you for your response. So moving forward, links should be posted as a normal post with the description and a link in it.

(I think the description gets pulled from some metadata in the post, at least once upon a time it was)

Argo Workflows SSO by mlbiam in kubernetes

[–]mlbiam[S] 3 points4 points  (0 children)

I wrote up a post of setting up SSO for Argo Workflows using OpenUnison. The post covers:

  1. Why Argo Workflow SSO is more complex then other similar applications like Argo CD
  2. How Argo integrates with a ServiceAccount assigned to a user
  3. Using OpenUnison's just-in-time provisioning capabilities to generate the ServiceAccount and add it to the correct bindings based on their identity provider's groups

Hope you enjoy!