Use Tetragon to Limit Network Usage for a set of Binary

This page summarizes the projects mentioned and recommended in the original post on dev.to

Our great sponsors
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
  • SaaSHub - Software Alternatives and Reviews
  • tetragon

    eBPF-based Security Observability and Runtime Enforcement

  • Many interesting software are coming from the community, many are distributed through the package manager of the operating system. But for the others, you can download them from Github release pages, use snap or homebrew to cite a few. But this last installation method bypasses the security team that tries to improve the security of your operating system. By doing so, you are implicitly trusting the author he is not distributing malware or implementing backdoors. How many tools did you install by hand? Do you really trust all of them? Confidence is very important, yet it would be nice to limit capabilities for a set of binary that you don't fully trust. In this blog post, we will use Tetragon to forbid network usage for tools that don't need to.

  • jq

    Command-line JSON processor

  • jq

  • InfluxDB

    Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.

    InfluxDB logo
  • k9s

    šŸ¶ Kubernetes CLI To Manage Your Clusters In Style!

  • k9s

  • jless

    jless is a command-line JSON viewer designed for reading, exploring, and searching through JSON data.

  • jless

  • yq

    yq is a portable command-line YAML, JSON, XML, CSV, TOML and properties processor

  • yq

  • helm

    The Kubernetes Package Manager

  • helm

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts