Intelligence for Kubernetes Containers
To use Threat Intelligence on your Kubernetes Kubernetes, often abbreviated as “K8s”, orchestrates containerized applications to run on a cluster of hosts. cluster, you have to onboard it to Intelligence. For more information, see Onboarding Kubernetes Clusters to Intelligence.
With Kubernetes Intelligence, you can:
-
Visualize and analyze north-south and east-west network traffic for your Kubernetes cluster
-
Identify communications with malicious addresses
-
Monitor cross-namespace communication
-
Identify port scanning
CloudGuard provides a preconfigured Intelligence ruleset and custom queries created with a graphical GSL-based query builder.
Supported Versions
Name |
Version |
---|---|
Kubernetes |
v1.16 and higher |
OS |
Linux kernel v4.1 and higher |
Architecture
Kubernetes Intelligence includes these components:
-
Inventory agent - A single-replica Kubernetes Deployment responsible to report inventory information on cluster resources to CloudGuard.
-
Flow Logs DaemonSet - A DaemonSet of agents that do this:
-
Interact with the underlying cluster node to monitor IP traffic between the virtual network interfaces in the cluster
-
Upload crafted logs to CloudGuard for analysis
-
Rulesets and Policy
CloudGuard shows alerts for security events found in the Intelligence logs as part of the Threat & Security Events table on the Events page. To see events related to your cluster, it is necessary to configure a Kubernetes Ruleset or use the preconfigured CloudGuard-managed Kubernetes CloudGuard Best Practices ruleset. Then you set up a Policy that associates the ruleset with one or more Kubernetes clusters and assigns a notification.
Kubernetes Intelligence rulesets are equivalent to other Intelligence Rulesets (see Intelligence Security Events).
Actions
Use instructions in Intelligence Security Events for a Kubernetes cluster where an environment is mentioned.
|
Note - Kubernetes Intelligence does not support Audit Logs. It uses network traffic Flow Logs and Kubernetes assets data. |
Known Limitations
For a full list of known limitations, see Known Limitations
More Links