Безопасность Kubernetes: полный гайд для начинающих или как не повторить ошибку Tesla

Kubernetes взламывают не «эксплойтом века», а банальностями: открытый доступ, cluster-admin «на время», default serviceAccount, секреты в манифестах (да, base64 не защита). Дальше сценарий предсказуемый — от тихого майнинга до утечки ключей, как в истории с Tesla. В статье разберу три базовых опоры k8s-безопасности: минимизация прав через RBAC, нормальная работа с секретами и изоляция workload’ов через securityContext и политики — с типовыми ошибками и практиками, которые реально внедрить.

https://habr.com/ru/companies/otus/articles/994136/

#kubernetes #безопасность #devsecops #rbac #секреты #pod_security #checkov #kyverno

Безопасность Kubernetes: полный гайд для начинающих или как не повторить ошибку Tesla

Всем привет, меня зовут Сергей Прощаев, и в этой статье я расскажу про базовые принципы безопасности в Kubernetes , которые уберегут вас от кошмаров вроде взлома кластера для майнинга криптовалюты....

Хабр
Kubernetes multi-tenant governance: managing multi-tenant Kubernetes clusters | Jorijn Schrijvershof

In-depth technical article on Kubernetes multi-tenant governance for DevOps teams. Learn about soft vs. hard multi-tenancy, risks (noisy neighbors, privilege escalation), and best practices: RBAC, resource quotas, network isolation, policies (Kyverno/OPA), cost allocation (showback/chargeback), minimal governance for small teams, and when a dedicated cluster per tenant is the better choice.

Anyone using #kyverno? I’m migrating a couple current unmaintained mutating web hooks to kyverno this week. There’s a good amount of crds and a couple controllers, once you sort of disable a load of features it’s fairly light.

Any tips or anecdotes about using it and managing policies, etc, would be welcomed.

#devops #kubernetes

Just dropped a quick guide on how to build better Kyverno alerts using Loki. 🔍

The main challenge was that Kyverno logs originate from its namespace, but I needed the alert to reflect the target namespace (where the policy violation actually occurred).

I used LogQL's label_format to rewrite namespace_extracted → namespace before aggregation to get actionable alerts.

Check it out here: https://wael.nasreddine.com/kubernetes/alert-kyverno-policy-validatio.html

#Kubernetes #SRE #Loki #Kyverno #Observability #DevOps #LogQL #socialmedia

🚨Alerting on Kyverno Policy Validation Failures with Loki - Wael's Digital Garden

Was Kyverno bzw. eine Kubernetes-native Policy-Engine ist, und welches Problem es in Kubernetes löst?

Warum du Kyverno als Systemadministrator kennen solltest Kyverno ist ein Kubernetes-natives Policy-Engine, das dir als Systemadministrator hilft, deine Cluster sicherer und konsistenter zu machen. Du solltest es kennen, weil es deklarative Policies ermöglicht, die Sicherheitsrichtlinien, Compliance-Anforderungen und Best Practices automatisch durchsetzt, ohne dass du komplexe Skripte schreiben musst. In Kubernetes-Umgebungen wächst die Komplexität schnell, und Kyverno löst genau das […]

https://andreas-moor.de/was-kyverno-bzw-eine-kubernetes-native-policy-engine-ist-und-welches-problem-es-in-kubernetes-lost/

Today's lesson: Using #kyverno you can configure cluster policies to replicate secrets from a reference namespace to any set of arbitrary destination namespaces.

However, one needs to ensure that the proper events are used to trigger the policy - we don't just want to copy secrets on namespace creation, but also when namespaces are updated, and for any eligible namespace at the time the policy was created. We also want to ensure that destinations secrets are updated when the source secret changes.

Kyverno makes this simple with a few features:

* The `synchronize: true` parameter for its cluster policy will create secrets for new eligible namespaces, and update secrets when the source secret changes.
* With `generateExisting: true`, a background job is created when the policy is instantiated to retroactively make it apply to existing namespaces.

Finally, with the recently released Kyverno version 1.15, new CEL-based policy types are available that are even more flexible and powerful.

https://kyverno.io/docs/policy-types/cluster-policy/generate/#clone-examples

https://kyverno.io/docs/policy-types/cluster-policy/generate/#generate-for-existing-resources

https://kyverno.io/docs/policy-types/generating-policy/

#k8s #kubernetes #AdmissionControl

Generate Rules

Create new Kubernetes resources based on a policy and optionally keep them in sync.

Kyverno
Kubernetes namespace exclusion options for Kyverno policies – Daniel's Tech Blog

Welcome and thank you to Platinum Sponsor, Nirmata, creators of #Kyverno - a CNCF incubating project. Meet the team at #KCDDC2025
🎟️ ➡️ https://bit.ly/KCDDC2025
KCD Washington DC 2025 | CNCF

In-person Event - Celebrate our 5th annual event - thanks to members like you!

CNCF

Tomorrow on 'You Choose!', Viktor Farcic and I will discuss Policies and State Synchronization with Kyverno and Argo CD—CNCF tools you’ve already chosen in past seasons. ♫

Join us as we continue building an Internal Developer Platform!
fun fun fun

Don’t miss it! Click ‘Notify Me’:

https://youtu.be/mWbOpe4CktY

#CNCF #Kyverno #ArgoCD #Kubernetes #InternalDeveloperPlatform

Policies & State Synchronization (GitOps - Feat. Kyverno & Argo CD (You Choose!, Ch. 05, Ep. 02)

YouTube

for those among us who prefer kustomize, i made the kyverno community policies available as such

https://github.com/xyhhx/kyverno-policies-kustomize

#kubernetes #k8s #kyverno #kustomize

GitHub - xyhhx/kyverno-policies-kustomize: Kyverno policies for security and best practices

Kyverno policies for security and best practices . Contribute to xyhhx/kyverno-policies-kustomize development by creating an account on GitHub.

GitHub