Kubernetes Networking and Cilium
The Kubernetes Networking and Cilium book by Nicolas Vibert is now available.
The Kubernetes Networking and Cilium book by Nicolas Vibert is now available.
How to install Tetragon, the eBPF based security observability tool on Kubernetes. Follow along on the Tetragon installation guide to install the Cilium/Tetragon helm chart, download Tetragon, and verify Tetragon has successfully rolled out.
After installing Tetragon, apply a TracingPolicy using Tetragon. A TracingPolicy is a user-configurable Kubernetes custom resource definition (CRD) that allows you to trace arbitrary events in the kernel and define actions to take on match.
After installing Tetragon, generate events in the Tetragon CLI and observe process and socket events. In our case, we are going to observe tcp_connect, tcp_close, and kernel functions to track when a TCP connection opens and closes respectively.
eBPF is the new standard to program Linux kernel capabilities in a safe and efficient manner without requiring to change kernel source code or loading kernel modules. It has enabled a new generation of high performance tooling to be developed covering networking, security, and observability use cases. The best way to learn about eBPF is to read the book “What is eBPF” by Liz Rice. And the best way to have your first experience with eBPF programming is to walk through this lab, which takes the opensnoop example out of the book and teaches you to handle an eBPF tool, watch it loading its components and even add your own tracing into the source eBPF code.
Security Observability is a new paradigm that utilizes eBPF, a Linux kernel technology, to allow Security and DevOps teams, SREs, Cloud Engineers, and Solution Architects to gain real-time visibility into Kubernetes and helps to secure your production environment with Tetragon. Tetragon is an open source Security Observability and Runtime Enforcement tool from the makers of Cilium. It captures different process and network event types through a user-supplied configuration to enable security observability on arbitrary hook points in the kernel; then translates these events into actionable signals for a Security Team. The best way to learn about Security Observability and Cilium Tetragon is to read the book “Security Observability with eBPF” by Jed Salazar and Natalia Reka Ivanko. And the best way to have your first experience with Tetragon is to walk through this lab, which takes the Real World Attack example out of the book and teaches you how to detect a container escape step by step!
Kubernetes changes the way we think about networking. In an ideal Kubernetes world, the network would be entirely flat and all routing and security between the applications would be controlled by the Pod network, using Network Policies. In many Enterprise environments, though, the applications hosted on Kubernetes need to communicate with workloads living outside the Kubernetes cluster, which are subject to connectivity constraints and security enforcement. Because of the nature of these networks, traditional firewalling usually relies on static IP addresses (or at least IP ranges). This can make it difficult to integrate a Kubernetes cluster, which has a varying —and at times dynamic— number of nodes into such a network. Cilium’s Egress Gateway feature changes this, by allowing you to specify which nodes should be used by a pod in order to reach the outside world.
In this video, Thomas Graf discusses the benefits of the Cisco acquisition for the Isovalent community and teases some of what they can expect in the future...
Detecting XZ Utils liblzma CVE 2024-3094 backdoor exploit with Tetragon and eBPF. Includes ready to apply yaml policy.
As the team behind Cilium, eBPF, and Tetragon, Isovalent has the expertise to assist enterprises that are expanding their cloud-native applications. With our tools, market knowledge, and bench of experts, we are well-equipped to help you take your offerings to the next level and make sense of growing network and application complexities.
Isovalent's VP of Customer Success, Toufic Arabi, outlines what prospective customers should expect when onboarding with Isovalent.
Cilium and Hubble give you deep visibility into the network flows across your cloud-native platform and can inspect and show you meaningful data between the transactions between services, such as URL parameters. Sometimes this data can be classified as sensitive, or even potentially unnecessary when storing the network flows. In Cilium 1.15, the Hubble Redact features provide the ability to sanitize sensitive information from Layer 7 data flows captured by Hubble.
In this video, Isovalent's Head of Global Cloud Alliances, Jeff Clawson, break down Isovalent's payment model and the types of businesses that it's implemented to help with the most.
Learn about the Network Policy Editor in this in-depth tutorial!
Join Toufic Arabi, Isovalent's VP of Customer Success, as he outlines the 3 more top outcomes that Isovalen't customers can expect when using our products and services.
In this video, Isovalent's CTO and Co-founder Thomas Graf touches on what he sees as the major outcomes that users of Cilium and Tetragon can expect.
Learn how to build and deploy network policies for Kubernetes in this deep dive guide on Cilium Network Policy Tutorial.
Hubble is a fully distributed networking and security observability platform for cloud native workloads. It is built on top of Cilium and eBPF to enable deep visibility into the communication and behavior of services as well as the networking infrastructure in a completely transparent manner.
As your cloud-native Kubernetes environments expand, you must work with the right partners and technologies to optimize and create secure applications. Isovalent is working with the hyperscalers and cloud marketplaces to deliver this value to customers who looking to maximize their cloud-native solutions.
Learn how Isovalent Enterprise Support helps customers achieve success using hardened cilium distributions & customer replica testing environments.
Why eBPF is the future of FIM, a technical look at Tetragon's file monitoring and enforcement architecture.
Join Toufic Arabi, Isovalent's VP of Customer Success, as he provides a high-level overview of the types of support that Isovalent customers can expect from our Customer Success team.
Envoy is a powerful L7 proxy which can be used for many Service Mesh needs. Cilium uses Envoy for L7 Network Policies, L7 observability, L7 internal load-balancing, and even allows users to configure Envoy for their own needs.
As you wrap up your training, gain a clear understanding of its practical application in your day-to-day tasks—just like Jorge Guttierez. The buzz in our labs and the distinctive badges have set the stage. Embark on your learning journey today: https://lnkd.in/guB-HTr4 🚀
Kubernetes is built on the premise that a Pod should belong to a single network. While this approach may work for the majority of use cases, enterprise and telco often require a more sophisticated and flexible networking model. There are many use cases where a Pod may require attachments to multiple networks with different properties via different interfaces. With Cilium Multi-Networking, available in Isovalent Enterprise for Cilium, you can connect your Pod to multiple networks, without having to compromise on security and observability. Watch this video to learn more
Curious to learn how Service Mesh works? In this video, Thomas Graf, CTO of Isovalent, walks through Service Mesh's applications with Cilium and more broadly.
Learn what are Cilium Network Policies and how to use them!
Read the Cilium white paper from Isovalent and ControlPlane, solving NIST and other compliance frameworks in cloud-native environments. The executive summary below maps out the scope and importance of this white paper for technical audiences and leadership teams. This guide is framed around the NIST 800 controls as a way to dive into specific feature-to-control relationships, and is written to be applicable and foundational across any compliance framework. Download now and get a deep, technical understanding of the future of cloud-native compliance, regardless of which compliance framework you are looking to solve!
S&P Global was in a transition to a 100% cloud strategy. With the help of Cilium, they were able to break down the silos between networking and developer teams. As a result, S&P Global was able to run its Kubernetes ecosystem securely and reliably in a multi-cloud environment.
This tutorial guides you on how to create a private AKS cluster with Isovalent Enterprise for Cilium in a hub and spoke environment with Azure Firewall.
Learn how Tetragon can provide network observability directly from the Kernel. Walkthrough example use-cases such as bandwidth, latency, and DNS monitoring, from the host, from the pod, and also from the binaries running inside of the containers!
Multicast support in Kubernetes has finally come to Cilium! In this lab, you will discover how to set it up, take advantage of it, and observe multicast traffic in Kubernetes, using Cilium and Tetragon in Isovalent Enterprise.
In this quarterly update for Feb 2024, learn about all the updates Cilium running in the public and private cloud providers.
Migrating to Cilium from another CNI is a very common task. But how do we minimize the impact during the migration? How do we ensure pods on the legacy CNI can still communicate to Cilium-managed during pods during the migration? How do we execute the migration safely, while avoiding a overly complex approach or using a separate tool such as Multus? With the use of the new Cilium CRD CiliumNodeConfig, running clusters can be migrated on a node-by-node basis, without disrupting existing traffic or requiring a complete cluster outage or rebuild. In this lab, you will migrate your cluster from Calico to Cilium.
In this video, learn about a new Cilium 1.15 feature - support for BGP communities!
This tutorial describes the steps of how to enable cilium cluster mesh on an AKS cluster running Isovalent Enterprise for Cilium from Azure Marketplace.
In this video, learn about a new Cilium 1.15 feature - MD5-based authentication of BGP sessions!
In this video, learn about a new Cilium 1.15 feature - gRPC routing using Cilium Gateway API!
BGP support was initially introduced in Cilium 1.10 and subsequent improvements have been made since, such as the recent introduction of IPv6 support in Cilium 1.12 and Service IP Advertisements in Cilium 1.13. In Cilium 1.14, we introduced more BGP features, including: – BGP Timers Customization – eBGP Multihop – BGP Graceful Restart In Cilium 1.15, the following features are being added: – BGP Peering Security with MD5 – BGP Communities Support In this lab, the user will learn about both these new features and how they can simplify their network connectivity operations.
Learn how to connect your Kubernetes Clusters with your on-premises network using BGP. As Kubernetes becomes more pervasive in on-premise environments, users increasingly have both traditional applications and Cloud Native applications in their environments. In order to connect them together and allow outside access, a mechanism to integrate Kubernetes and the existing network infrastructure running BGP is needed. Cilium offers native support for BGP, exposing Kubernetes to the outside and all the while simplifying users’ deployments.
In this blog post, learn how you can use Cilium Gateway API to rewrite, redirect and mirror HTTP requests in Kubernetes!
Cilium and Azure Arc- solving the cluster manageability conundrum
This lab is a follow-up to the introductory Cilium Gateway API lab. We highly recommend you do the Cilium Gateway API lab first, if you haven’t done it already. In this one, you will learn about some additional specific use cases for Gateway API: HTTP request & response header rewrite HTTP redirect, rewrite and mirror Cross-namespace routing gRPC routing
In this short lab, you will learn about Gateway API, a new Kubernetes standard on how to route traffic into a Kubernetes cluster. The Gateway API is the next generation of the Ingress API. Gateway API addresses some the Ingress limitations by providing an extensible, role-based and generic model to configure advanced L7 traffic routing capabilities into a Kubernetes cluster. In this lab, you will learn how you can use the Cilium Gateway API functionality to route HTTP and HTTPS traffic into your Kubernetes-hosted application, including load balancing / traffic splitting and TLS passthrough or termination.
Need security fixes or new features in a older Cilium version? That's called a backport. Learn how backports happen in Cilium with live examples!
A Note from Dan Wendlandt, CEO & Co-Founder Isovalent, to Current and Future Isovalent Customers
Cisco acquires Isovalent, founded by creators of eBPF and the team behind Cilium and Tetragon, the leading cloud native solutions leveraging eBPF technology.
Isovalent recognized as a leader in Container Networking by GigaOm. This GigaOm Radar report highlights key container networking vendors and their capabilities.
Learn how to deploy Cilium to Red Hat OpenShift Clusters!
In Cilium 1.13, we introduced support for LoadBalancer IP Address Management (LB-IPAM) and the ability to allocate IP addresses to Kubernetes Services of the type LoadBalancer. Cloud providers natively provide this feature for managed Kubernetes Services and therefore this feature is more one for self-managed Kubernetes deployments or home labs. LB-IPAM works seamlessly with Cilium BGP: the IP addresses allocated by Cilium can be advertised to BGP peers to integrate your cluster with the rest of your network. For users who do not want to use BGP or that just want to make these IP addresses accessible over the local network, we are introducing a new feature called L2 Announcements in Cilium 1.14. When you deploy a L2 Announcement Policy, Cilium will start responding to ARP requests from local clients for ExternalIPs and/or LoadBalancer IPs. Typically, this would have required a tool like MetalLB but Cilium now natively supports this functionality. Try it in this new lab!
Ever since its inception, Cilium has supported Kubernetes Network Policies to enforce traffic control to and from pods at L3/L4. But Cilium Network Policies even go even further: by leveraging eBPF, it can provide greater visibility into packets and enforce traffic policies at L7 and can filter traffic based on criteria such as FQDN, protocol (such as kafka, grpc), etc… Creating and manipulating these Network Policies is done declaratively using YAML manifests. What if we could apply the Kubernetes Network Policy operating model to our hosts? Wouldn’t it be nice to have a consistent security model across not just our pods, but also the hosts running the pods? Let’s look at how the Cilium Host Firewall can achieve this. In this lab, we will install SSH on the nodes of a Kind cluster, then create Cluster-wide Network Policies to regulate how the nodes can be accessed using SSH. The Control Plane node will be used as a bastion to access the other nodes in the cluster.
Raphaël Pinson and Nico Vibert sat down to discuss a detailed introduction as to what Cilium Cluster Mesh is, and how it can be applied to your workload.
Nico Vibert and Raphaël Pinson of Isovalent sat down to discuss some of the finer technical details that make up Cilium's architecture, and how they can be implemented more broadly.