Security Observability with eBPF /

Kubernetes has become the de facto cloud operating system, making it a rich target for both passive and direct attackers. In fact, the largest concern most organizations have with Kubernetes is securing their production environments. But Kubernetes doesn't include observability or a default sec...

Full description

Bibliographic Details
Main Authors: Salazar, Jed (Author), Ivanko, Natalia Reka (Author)
Format: eBook
Language:English
Published: Sebastopol, CA : O'Reilly Media, Inc., 2022.
Edition:First edition.
Subjects:
Online Access:Connect to the full text of this electronic book

MARC

LEADER 00000cam a22000007i 4500
001 in00004670806
006 m o d
007 cr cnu|||unuuu
008 220412s2022 caua o 000 0 eng d
005 20230425122226.5
035 |a (OCoLC)on1310473490 
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d OCLCO  |d OCLCF  |d OCLCQ 
020 |z 9781492096702 
035 |a (OCoLC)1310473490 
037 |a 9781492096719  |b O'Reilly Media 
050 4 |a QA76.76.A65 
082 0 4 |a 005.3  |2 23 
049 |a TXAM 
100 1 |a Salazar, Jed,  |e author. 
245 1 0 |a Security Observability with eBPF /  |c by Jed Salazar and Natalia Reka Ivanko. 
250 |a First edition. 
264 1 |a Sebastopol, CA :  |b O'Reilly Media, Inc.,  |c 2022. 
300 |a 1 online resource (65 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a Kubernetes has become the de facto cloud operating system, making it a rich target for both passive and direct attackers. In fact, the largest concern most organizations have with Kubernetes is securing their production environments. But Kubernetes doesn't include observability or a default security configuration to discern if your pods or clusters have been attacked or compromised. With this report, authors Jed Salazar and Natalia Reka Ivanko help you discover how secure your Kubernetes environment actually is. Using the new eBPF security observability paradigm, security and DevOps teams, SREs, cloud engineers, and solution architects will gain real-time visibility into Kubernetes security. You'll learn how eBPF provides historical and current metrics to help you track improvements and degradations over time. 
650 0 |a Application software  |x Development  |x Automation. 
650 0 |a Open source software. 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Logiciels d'application  |x Développement  |x Automatisation. 
650 6 |a Logiciels libres. 
650 6 |a Sécurité informatique. 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Open source software.  |2 fast  |0 (OCoLC)fst01046097 
700 1 |a Ivanko, Natalia Reka,  |e author. 
856 4 0 |u https://go.oreilly.com/TAMU/library/view/-/9781492096719/?ar  |z Connect to the full text of this electronic book  |t 0 
955 |a Safari/O'Reilly ebooks 
994 |a 92  |b TXA 
999 f f |s f77e7ad1-8ee6-481e-9400-fe13bad7fe8f  |i 9d59ed63-fb22-4d8f-9877-b908f4886e5d  |t 0 
952 f f |a Texas A&M University  |b College Station  |c Electronic Resources  |d Available Online  |t 0  |e QA76.76.A65   |h Library of Congress classification 
998 f f |a QA76.76.A65   |t 0  |l Available Online