 The Tale of Smokey and the Crypto Banditsplatform healthy Ramiro Berrelleza October 28, 2020 ● Co-founder of Okteto ● Former architect @ Atlassian, Software Engineer @ Azure ● @rberrelleza Hey everyone! ● Developer platform, powered by + ContainerOS was not very performant Attempt #1 - The Postmortem Iteration is key ● Built a tool to automatically reload falco on rule changes ● Rules: monitor well known IPs, binary names,0 码力 | 14 页 | 926.57 KB | 1 年前3 The Tale of Smokey and the Crypto Banditsplatform healthy Ramiro Berrelleza October 28, 2020 ● Co-founder of Okteto ● Former architect @ Atlassian, Software Engineer @ Azure ● @rberrelleza Hey everyone! ● Developer platform, powered by + ContainerOS was not very performant Attempt #1 - The Postmortem Iteration is key ● Built a tool to automatically reload falco on rule changes ● Rules: monitor well known IPs, binary names,0 码力 | 14 页 | 926.57 KB | 1 年前3
 Cilium v1.5 Documentationusing a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services Event monitoring with metadata: When a packet is dropped, the tool doesn’t just report the source and des�na�on IP of the packet, the tool provides the full label informa�on of both the sender and receiver 443/TCP 3m53 Each pod will be represented in Cilium as an Endpoint. We can invoke the cilium tool inside the Cilium pod to list them: $ kubectl -n kube-system get pods -l k8s-app=cilium NAME0 码力 | 740 页 | 12.52 MB | 1 年前3 Cilium v1.5 Documentationusing a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services Event monitoring with metadata: When a packet is dropped, the tool doesn’t just report the source and des�na�on IP of the packet, the tool provides the full label informa�on of both the sender and receiver 443/TCP 3m53 Each pod will be represented in Cilium as an Endpoint. We can invoke the cilium tool inside the Cilium pod to list them: $ kubectl -n kube-system get pods -l k8s-app=cilium NAME0 码力 | 740 页 | 12.52 MB | 1 年前3
 Cilium v1.9 Documentationusing a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services Event monitoring with metadata: When a packet is dropped, the tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver 00/ to access the UI. Hubble UI is not the only way to get access to Hubble data. A command line tool, the Hubble CLI, is also available. It can be installed by following the instructions below: Linux0 码力 | 1263 页 | 18.62 MB | 1 年前3 Cilium v1.9 Documentationusing a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services Event monitoring with metadata: When a packet is dropped, the tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver 00/ to access the UI. Hubble UI is not the only way to get access to Hubble data. A command line tool, the Hubble CLI, is also available. It can be installed by following the instructions below: Linux0 码力 | 1263 页 | 18.62 MB | 1 年前3
 Cilium v1.6 Documentationusing a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services Event monitoring with metadata: When a packet is dropped, the tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver 443/TCP 3m53s Each pod will be represented in Cilium as an Endpoint. We can invoke the cilium tool inside the Cilium pod to list them: $ kubectl -n kube-system get pods -l k8s-app=cilium NAME0 码力 | 734 页 | 11.45 MB | 1 年前3 Cilium v1.6 Documentationusing a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services Event monitoring with metadata: When a packet is dropped, the tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver 443/TCP 3m53s Each pod will be represented in Cilium as an Endpoint. We can invoke the cilium tool inside the Cilium pod to list them: $ kubectl -n kube-system get pods -l k8s-app=cilium NAME0 码力 | 734 页 | 11.45 MB | 1 年前3
 Cilium v1.10 Documentationusing a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services Event monitoring with metadata: When a packet is dropped, the tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver 443/TCP 3m53s Each pod will be represented in Cilium as an Endpoint. We can invoke the cilium tool inside the Cilium pod to list them: $ kubectl -n kube-system get pods -l k8s-app=cilium NAME0 码力 | 1307 页 | 19.26 MB | 1 年前3 Cilium v1.10 Documentationusing a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services Event monitoring with metadata: When a packet is dropped, the tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver 443/TCP 3m53s Each pod will be represented in Cilium as an Endpoint. We can invoke the cilium tool inside the Cilium pod to list them: $ kubectl -n kube-system get pods -l k8s-app=cilium NAME0 码力 | 1307 页 | 19.26 MB | 1 年前3
 Cilium v1.11 Documentationusing a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services Event monitoring with metadata: When a packet is dropped, the tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver 443/TCP 3m53s Each pod will be represented in Cilium as an Endpoint. We can invoke the cilium tool inside the Cilium pod to list them: $ kubectl -n kube-system get pods -l k8s-app=cilium NAME0 码力 | 1373 页 | 19.37 MB | 1 年前3 Cilium v1.11 Documentationusing a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services Event monitoring with metadata: When a packet is dropped, the tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver 443/TCP 3m53s Each pod will be represented in Cilium as an Endpoint. We can invoke the cilium tool inside the Cilium pod to list them: $ kubectl -n kube-system get pods -l k8s-app=cilium NAME0 码力 | 1373 页 | 19.37 MB | 1 年前3
 Cilium v1.8 Documentationusing a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services Event monitoring with metadata: When a packet is dropped, the tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver 443/TCP 3m53s Each pod will be represented in Cilium as an Endpoint. We can invoke the cilium tool inside the Cilium pod to list them: $ kubectl -n kube-system get pods -l k8s-app=cilium NAME0 码力 | 1124 页 | 21.33 MB | 1 年前3 Cilium v1.8 Documentationusing a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services Event monitoring with metadata: When a packet is dropped, the tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver 443/TCP 3m53s Each pod will be represented in Cilium as an Endpoint. We can invoke the cilium tool inside the Cilium pod to list them: $ kubectl -n kube-system get pods -l k8s-app=cilium NAME0 码力 | 1124 页 | 21.33 MB | 1 年前3
 Cilium v1.7 Documentationusing a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services Event monitoring with metadata: When a packet is dropped, the tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver 443/TCP 3m53s Each pod will be represented in Cilium as an Endpoint. We can invoke the cilium tool inside the Cilium pod to list them: $ kubectl -n kube-system get pods -l k8s-app=cilium NAME0 码力 | 885 页 | 12.41 MB | 1 年前3 Cilium v1.7 Documentationusing a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services Event monitoring with metadata: When a packet is dropped, the tool doesn’t just report the source and destination IP of the packet, the tool provides the full label information of both the sender and receiver 443/TCP 3m53s Each pod will be represented in Cilium as an Endpoint. We can invoke the cilium tool inside the Cilium pod to list them: $ kubectl -n kube-system get pods -l k8s-app=cilium NAME0 码力 | 885 页 | 12.41 MB | 1 年前3
 Steering connections to sockets with BPF socket lookup hookhttps://blog.cloudflare.com/its-crowded-in-here/ ● Proof-of-concept tool for configuring BPF socket dispatch https://github.com/majek/inet-tool/ ● “Programmable socket lookup with BPF” presentation at Linux0 码力 | 23 页 | 441.22 KB | 1 年前3 Steering connections to sockets with BPF socket lookup hookhttps://blog.cloudflare.com/its-crowded-in-here/ ● Proof-of-concept tool for configuring BPF socket dispatch https://github.com/majek/inet-tool/ ● “Programmable socket lookup with BPF” presentation at Linux0 码力 | 23 页 | 441.22 KB | 1 年前3
 Containers and BPF: twagent storymulti-kernel VM tests (qemu) ● Resource usage (CPU cycles, memlock) monitored across the fleet by bpf_tax tool → ● Alerts on program load and attach failures [0] https://github.com/libbpf/libbpf0 码力 | 9 页 | 427.42 KB | 1 年前3 Containers and BPF: twagent storymulti-kernel VM tests (qemu) ● Resource usage (CPU cycles, memlock) monitored across the fleet by bpf_tax tool → ● Alerts on program load and attach failures [0] https://github.com/libbpf/libbpf0 码力 | 9 页 | 427.42 KB | 1 年前3
共 10 条
- 1














