Istio Security AssessmentSensitive Information 002 Medium Default Production Profile Not Sufficiently Hardened 003 Medium Weak Hash Used for Integrity 009 Medium Go Trace Profiling Enabled By Default 013 Medium Permissive Kubernetes ig-profiles/ 14 | Google Istio Security Assessment Google / NCC Group Confidential Finding Weak Hash Used for Integrity Risk Medium Impact: Medium, Exploitability: Low Identifier NCC-GOIST2005-009 instructions into the cluster. Description A cryptographic hash is a function which takes a string of bytes and returns a small, fixed-size value. Hash functions guarantee that the same input always results in the0 码力 | 51 页 | 849.66 KB | 1 年前3
Accelerate Istio with ebpfKnowledge Prog type ● SOCK_OPS ➢ Set callbacks for TCP state changing ➢ Help functions: BPF_MAP_UPDATE_ELEM, BPF_SOCK_HASH_UPDATE ● SK_MSG ➢ Attach to a SOCKHASH map, capture the packets sent by a socket socket in SOCKHASH map and determine its destination socket ➢ Help functions: BPF_MSG_REDIRECT_HASH Istio Meetup China Work Flow of Acceleration ● sock_ops o Capture socket in specific states and0 码力 | 15 页 | 591.60 KB | 1 年前3
Accelerate Istio-CNI with ebpfof Inbound, 4-tuple key may conflict due to same src/dst ip address #IstioCon Use pod ip as hash key Use pod_ip to generate a unique key is a way to distinguish socket from different network0 码力 | 15 页 | 658.90 KB | 1 年前3
Preserve Original Source
Address within IstioAddress Preserve #IstioCon What is the use case of original address 1. Sticky Session: based on ip hash, traffic from same client is forwarded to the same backend 2. Security Policy: set white/black list0 码力 | 29 页 | 713.08 KB | 1 年前3
Istio at Scale: How eBay is building a massive Multitenant Service Mesh using Istioimplement common Security, Observability, Service Routing & Discovery functions as features of the infrastructure - ○ Functions: TLS Termination, Traffic Management, Tracing, Rate Limiting, Protocol0 码力 | 22 页 | 505.96 KB | 1 年前3
Observability and Istio Telemetrycom/apache/incubator-skywalking/blob/master/docs/en/ concepts-and-designs/oal.md • Extendable Aggregation Functions • Aggregation Function • Count • Calls per minute • Avg response time • Sum • Thermodynamic0 码力 | 21 页 | 5.29 MB | 6 月前3
Kubernetes容器应用基于Istio的灰度发布实践builds on Kubernetes and Istio to support deploying and serving of serverless applications and functions. http://www.servicemesher.com0 码力 | 38 页 | 14.93 MB | 1 年前3
Is Your Virtual Machine Really Ready-to-go with Istio?and shift ● Packaged software ○ Non-Linux ○ unikernels ● Domain specific workloads ○ Network Functions (NFV) #IstioCon Hybrid and Multi Clouds #IstioCon Istio VM Integration is? A Tumultuous Odyssey…0 码力 | 50 页 | 2.19 MB | 1 年前3
Istio audit report - ADA Logics - 2023-01-30 - v1.0communicates with Istiod to automate key and certificate rotation, like so: Istio-agent has two functions: 1. To receive SDS requests from Envoy and send certificate signing requests to the CA which typically0 码力 | 55 页 | 703.94 KB | 1 年前3
共 9 条
- 1













