- ‣ DevOps Pulse 2020 Survey Results Reveal Huge Demand for Cloud Based DevOps Services
- ‣ Kubernetes Security Specialist Certification Now Available
- ‣ Cert-Manager Now Part of The CNCF Sandbox Family as Jetstack Completes Donation
- ‣ S3: Millions of hotel reservations exposed in massive data breach
- ‣ AWS to spend $2.77 billion on new cloud region in India
- ‣ Challenges of Enterprise Kubernetes
- ‣ Stackrox announces the release of KubeLinter
- ‣ IBM and AT&T partnership on building 5G-powered hybrid cloud initiative
- ‣ AWS announces new budget actions
- ‣ Robin.io launches a free version of Kubernetes storage solution
- ‣ Microsoft Pushes Cloud Computing to Space; Launches Azure Space
- ‣ Microsoft launches Akri bringing Kubernetes to Edge Devices
Stackrox announces the release of KubeLinter
Nov. 9, 2020, 2:03 p.m. in DevSecOps
KubeLinter offers the automated analysis of Kubernetes YAML files and HELM charts before deployment.
KubeLinter integrates security-as-a-code in DevOps and other related processes. It helps ensure that the Kubernetes configuration is correct and the automatic enforcement of security policies for Kubernetes applications.
As per Stackrox reports, 67% of all Kubernetes misconfigurations happen due to human error.
With KubeLinter, users can build security in the configuration as code in the application development process itself. It helps validate that the Kubernetes configuration is according to the security best practices.
KubeLinter users can integrate this tool to automate the process of carrying out configuration checks and errors identification.
KubeLinter is available for download at GitHub.
Stackrox’s new static analysis tool KubeLinter fulfills the need for a security tool that identifies misconfigurations before the deployment of a Kubernetes cluster. KubeLinter has been written in the Go programming language and accomplishes the security needs in a single binary file that developers can run in a command line.
KubeLinter offers an automated way to carry out Kubernetes configuration checks as part of continuous integration (CI) workflow. It makes it easier to track how changes are proposed and made to YAML files and Helm charts.
The importance of security in Kubernetes deployments has led more companies to build tools to enhance security and reduce the occurrence of security incidents at runtime. Some other tools similar to KubeLinter are:
- Kubeval: It is used for the validation of single or multiple Kubernetes configuration files. It may be used locally as part of the development workflow or in CI pipelines.
- Kube-score: It performs static code analysis of Kubernetes object definitions and provides a list of recommendations to make your application more resilient and secure.
- Config-lint: It is a command-line tool that uses YAML-specified rules to validate configuration files.
- Copper: Copper validates your configuration files and helps apply policies and best practices to your Kubernetes configurations.
- Conftest: It helps you write tests against structured configuration data.
- Polaris: Polaris runs a litany of tests to ensure that the configuration of Kubernetes pods and controllers is done using best practices.
Stackrox also plans to add auto-remediation capabilities to Kubelinter in the future.
We developed KubeLinter to provide the Kubernetes community with a better, more automated way to identify misconfigurations and deviations from best practices that limit organizations from realizing the full potential of cloud-native applications.Ali GolshanCo-founder and CTO, StackRox
Share this story with your friends
5 hours ago
13 hours ago
1 month ago
1 month, 2 weeks ago