hubble
cilium-cli
Our great sponsors
hubble | cilium-cli | |
---|---|---|
7 | 11 | |
3,292 | 365 | |
3.3% | 6.3% | |
9.4 | 9.8 | |
8 days ago | 1 day ago | |
Go | Go | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
hubble
-
Architecting for Resilience: Crafting Opinionated EKS Clusters with Karpenter & Cilium Cluster Mesh — Part 1
Since we installed Hubble on the cluster, Let’s check its cool UI and see how the traffic flows between the pods. To do so, let’s run:
- cilium/hubble: Hubble - Network, Service & Security Observability for Kubernetes using eBPF
-
Getting started with kubectl plugins
This doesn’t just provide improved operational visibility - it’s incredibly beneficial to network security engineers. For instance, if Cilium is unable to communicate with core components such as ‘Hubble,’ this will show-up in the connectivity test.
-
Linux Audit comes at a cost, is that where BPF steps in?
It may be we could further optimize in some way, but in our testing we didn't find the streaming or EBPF based tables to work all that well for our purposes in osquery. This tool seems more promising for logging this sort of activity: https://github.com/cilium/hubble. We're focused on K8s visibility but this could replace all of our Linux Auditing level logging if it works well.
-
Cilium: eBPF powered CNI, a NOS Solution for Modern Clouds
Cilium team also offers Hubble (yes, the name is the same as the famous far space crawling telescope's one, but for clouds), which is a fully distributed networking and security observability platform for cloud native workloads. Hubble is open source software and built on top of Cilium and eBPF to enable deep visibility into the communication and behavior of services as well as the networking infrastructure in a completely transparent manner.
-
Managing Distributed Applications in Kubernetes Using Cilium and Istio with Helm and Operator for Deployment
However, if you look at projects like Cilium Hubble and Istio Galley, you can see that you not only get all the instrumentation to manage this stuff out of the box, but you also get observability into the health of your pods and fine-grained visibility that you won’t get with traditional tools.
-
Kubernetes cluster diagram
CNI plugins like Cilium
cilium-cli
-
Grant Kubernetes Pods Access to AWS Services Using OpenID Connect
resource "tls_private_key" "this" { algorithm = "ECDSA" ecdsa_curve = "P384" } resource "hcloud_ssh_key" "this" { name = var.stack_name public_key = tls_private_key.this.public_key_openssh } resource "hcloud_server" "this" { name = var.stack_name server_type = "cax11" image = "ubuntu-22.04" location = "nbg1" ssh_keys = [ hcloud_ssh_key.this.id, ] public_net { ipv4 = hcloud_primary_ip.this["ipv4"].id ipv6 = hcloud_primary_ip.this["ipv6"].id } user_data = <<-EOF #cloud-config users: - name: ${var.username} groups: users, admin, adm sudo: ALL=(ALL) NOPASSWD:ALL shell: /bin/bash ssh_authorized_keys: - ${tls_private_key.this.public_key_openssh} packages: - certbot package_update: true package_upgrade: true runcmd: - sed -i -e '/^\(#\|\)PermitRootLogin/s/^.*$/PermitRootLogin no/' /etc/ssh/sshd_config - sed -i -e '/^\(#\|\)PasswordAuthentication/s/^.*$/PasswordAuthentication no/' /etc/ssh/sshd_config - sed -i '$a AllowUsers ${var.username}' /etc/ssh/sshd_config - | curl https://get.k3s.io | \ INSTALL_K3S_VERSION="v1.29.3+k3s1" \ INSTALL_K3S_EXEC="--disable traefik --kube-apiserver-arg=service-account-jwks-uri=https://${cloudflare_record.this.name}/openid/v1/jwks --kube-apiserver-arg=service-account-issuer=https://${cloudflare_record.this.name} --disable-network-policy --flannel-backend none --write-kubeconfig /home/${var.username}/.kube/config --secrets-encryption" \ sh - - chown -R ${var.username}:${var.username} /home/${var.username}/.kube/ - | CILIUM_CLI_VERSION=v0.16.4 CLI_ARCH=arm64 curl -L --fail --remote-name-all https://github.com/cilium/cilium-cli/releases/download/$CILIUM_CLI_VERSION/cilium-linux-$CLI_ARCH.tar.gz{,.sha256sum} sha256sum --check cilium-linux-$CLI_ARCH.tar.gz.sha256sum sudo tar xzvfC cilium-linux-$CLI_ARCH.tar.gz /usr/local/bin - kubectl completion bash | tee /etc/bash_completion.d/kubectl - k3s completion bash | tee /etc/bash_completion.d/k3s - | cat << 'EOF2' >> /home/${var.username}/.bashrc alias k=kubectl complete -F __start_kubectl k EOF2 - reboot EOF }
- Install RKE2 with Cilium and Metallb
- External service LB with k8s cluster
-
libvirt-k8s-provisioner - Ansible and terraform to build a cluster from scratch in less than 10 minutes ok KVM - Updated for 1.25
network plugin to be used, based on the documentation. (Project Calico ,Flannel, Cilium )
-
7 Kubernetes Companies to Watch in 2022
Isovalent makes an enterprise version of Cilium, an open source tool that uses eBPF to provide security and observability for cloud native environments. Liz gave a great talk at KubeCon Los Angeles about eBPF that I highly recommend. My reaction to her talk was that I wished I had Cilium years ago to troubleshoot some difficult incidents. When I first heard about eBPF I had thought of it more from the observability standpoint, but Cilium also provides a CNI plugin, transparent encryption, logs for security audits, and much more.
-
Pixie: an X-ray Machine for Kubernetes Traffic
Pixie is one of a handful of observability tools that offer eBPF or kernel-level observability. Other well-known tools are Cilium and CVF.
-
Redundancy for apps
A lot of projects are currently heavily focused on K8S (like Cilium - ebpf service mesh).
-
Managing Distributed Applications in Kubernetes Using Cilium and Istio with Helm and Operator for Deployment
Using a container network interface (Cilium) and service mesh (Istio) on top of your K8s infrastructure to more easily manage your distributed applications.
-
Ask HN: Who is hiring? (March 2022)
Isovalent | Multiple roles | Mountain View (US), Zürich (CH), or Remote
We're the company behind the open source Cilium project (https://cilium.io) (11K stars on GitHub) providing eBPF-based networking, observability, and security for container workloads and clusters.
We have an amazing and in-demand product using revolutionary technology and are looking for top talent to help us build and explore all of its possibilities.
We're remote-first, mainly in the EU and US timezones.
If you're interested please apply through our careers site https://isovalent.com/careers and mention Hacker News in your application.
Keywords for searchers: open source, Go/Golang, eBPF, C, C++, Kubernetes, networking, OpenShift, Linux kernel, performance, CI, SRE, technical writing, marketing, community advocate
-
libvirt-k8s-provisioner - Ansible and terraform to build a cluster from scratch in less than 10 minutes ok KVM
network plugin to be used, based on the documentation. (Project Calico ,Flannel, Cilium )
What are some alternatives?
eBPF-Guide - eBPF (extended Berkeley Packet Filter) Guide. Learn all about the eBPF Tools and Libraries for Security, Monitoring , and Networking.
ingress-nginx - Ingress-NGINX Controller for Kubernetes
kube-state-metrics - Add-on agent to generate and expose cluster-level metrics.
metallb - A network load-balancer implementation for Kubernetes using standard routing protocols
kubernetes-event-exporter - Export Kubernetes events to multiple destinations with routing and filtering
Netmaker - Netmaker makes networks with WireGuard. Netmaker automates fast, secure, and distributed virtual networks.
KubeArmor - Runtime Security Enforcement System. Workload hardening/sandboxing and implementing least-permissive policies made easy leveraging LSMs (BPF-LSM, AppArmor).
istio - Connect, secure, control, and observe services.
coroot - Coroot is an open-source APM & Observability tool, a DataDog and NewRelic alternative 📊, 🖥️, 👉. Powered by eBPF for rapid insights into system performance. Monitor, analyze, and optimize your infrastructure effortlessly for peak reliability at any scale.
Gravitational Teleport - The easiest, and most secure way to access and protect all of your infrastructure.
cilium - eBPF-based Networking, Security, and Observability
operator-sdk - SDK for building Kubernetes applications. Provides high level APIs, useful abstractions, and project scaffolding.