kURL
kube-hunter
Our great sponsors
kURL | kube-hunter | |
---|---|---|
5 | 10 | |
718 | 4,605 | |
0.6% | 0.8% | |
9.7 | 4.5 | |
1 day ago | about 1 month ago | |
Shell | Python | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
kURL
-
Air gapped on prem install - what would you do?
Wow, thanks! Yes, we created & maintain the kurl.sh project that OP mentioned (disclaimer: I work there). Our customers (HashiCorp, BigID, Smartbear etc) basically get all the tooling to do all of the commercial things the OP mentioned (combining it with Helm or KOTS our installer, Troubleshoot.sh for disconnected troubleshooting etc).
-
Looking for Tips on Open Sourcing a kubernetes security tool
Minikube might be helpful to get you started, but you might want some other self-hosted (kurl.sh) and managed (AKS, EKS, GKE) clusters to test against.
- Any good howto set up your own full cluster?
-
Any Kubernetes provider you could recommend me?
You could use Vagrant and VirtualBox to deploy a single node using https://kurl.sh. You can build your own installer.
- GitHub - replicatedhq/kURL: Production-grade, airgapped Kubernetes installer combining upstream k8s with overlays and popular components
kube-hunter
- Looking for Tips on Open Sourcing a kubernetes security tool
-
Implement DevSecOps to Secure your CI/CD pipeline
Use tool like Kube-hunter, Popeye and Kubescape for security weaknesses and misconfigurations in kubernetes clusters and visibility of security issues.
-
GitHub - aquasecurity/kube-hunter: Hunt for security weaknesses in Kubernetes clusters
It's even true: https://github.com/aquasecurity/kube-hunter/commit/1a91ac63daa55ffff8f3ad52795b89f937158fae
-
kube-hunter :: K8's Security
git clone https://github.com/aquasecurity/kube-hunter.git cd ./kube-hunter pip install -r requirements.txt python3 kube_hunter
-
Top 6 Kubernetes Security Tools
Here's a link to Kube-Hunter on Github
-
Introduction to Kubernetes Pentesting
kube-hunter - Hunt for security weaknesses in Kubernetes clusters
-
Container security best practices: Comprehensive guide
Other tools you can use are linux-bench, docker-bench, kube-bench, kube-hunter, kube-striker, Cloud Custodian, OVAL, and OS Query.
- 27 open-source tools that can make your Kubernetes workflow easier 🚀🥳
-
Kubernetes Security Checklist 2021
Cluster Configuration should be audited regularly (Kube-bench, Kube-hunter, Kubestriker)
What are some alternatives?
cloud-native-platform - Repo for "How to build your own cloud-native platform on IaaS clouds in 2021"
kube-bench - Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark
kubectl-node-restart - Krew plugin to restart Kubernetes Nodes sequentially and gracefully
trivy - Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
kubetail - Bash script to tail Kubernetes logs from multiple pods at the same time
falco - Cloud Native Runtime Security
k3s-ansible - The easiest way to bootstrap a self-hosted High Availability Kubernetes cluster. A fully automated HA k3s etcd install with kube-vip, MetalLB, and more. Build. Destroy. Repeat.
kubeaudit - kubeaudit helps you audit your Kubernetes clusters against common security controls
awesome-kubernetes - A curated list for awesome kubernetes sources :ship::tada:
syft - CLI tool and library for generating a Software Bill of Materials from container images and filesystems
kube-linter - KubeLinter is a static analysis tool that checks Kubernetes YAML files and Helm charts to ensure the applications represented in them adhere to best practices.
kubesec - Security risk analysis for Kubernetes resources