Hi everyone, my name is Robert and for the previo...
# kubernetes
r
Hi everyone, my name is Robert and for the previous months, I've been building a tool called kube-advisor.io. After many months of blood, sweat and tears put into it, https://kube-advisor.io is now available for everyone. So, what can you do with kube-advisor.io? It is a platform that lets you identify misconfigurations and best practice violations in your Kubernetes clusters. The setup is simple: You install a minimal agent on your cluster using a helm command and within seconds you can continuously identify configuration issues existing in your cluster using the UI at app.kube-advisor.io. Checks performed as of today are: → “Naked” Pods: check for pods that do not have an owner like a deployment, statefulset, job, etc. → Privilege escalation allowed: Pods are allowing privilege escalation using the “allowPrivilegeEscalation” flag → Missing probes: a container is missing liveness and/or readiness probes → No labels set / standard labels not set: A resource is missing labels altogether or does not have the Kubernetes standard labels set → Service not hitting pods: A Kubernetes service is having a selector that does not match any pods → Ingress pointing to non-existing service: An ingress is pointing to a service that does not exist → Volumes not mounted: A pod is defining a volume that is not mounted into any of its containers → Kubernetes version: Check if the Kubernetes version is up-to-date → Check if namespaces are used (more than 1 non-standard namespace should be used) → Check if there is more than one node … with many more to come in the future. If you want to write your own custom checks, you can do so using Kyverno “Validate”-type ClusterPolicy resources. Here is a huge list of existing templates. Coming soon: PDF reports, so you can prove progress in cluster hardening to managers and stakeholders. I'd be happy if you give it a try. If you have any questions or feedback, let me know!:) Sign up here: app.kube-advisor.io/register