-
Notifications
You must be signed in to change notification settings - Fork 614
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
LFX: Add Kubearmor project for March - May term 2024
Signed-off-by: PrimalPimmy <[email protected]> LFX: Add Kubearmor project for March - May term 2024 Signed-off-by: PrimalPimmy <[email protected]> LFX: Add Kubearmor project for March - May term 2024 Signed-off-by: PrimalPimmy <[email protected]>
- Loading branch information
1 parent
d37e3d0
commit 9e91775
Showing
1 changed file
with
38 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -133,3 +133,41 @@ | |
- [Manan Gupta](https://github.com/GuptaManan100) ([email protected]) | ||
- [Harshit Gangal](https://github.com/harshit-gangal) ([email protected]) | ||
- Issue: <https://github.com/vitessio/vitess/issues/14931> | ||
|
||
### Kubearmor | ||
|
||
#### Kubearmor Kata Container Support | ||
|
||
- Description: Kata Containers is an open source community working to build a secure container runtime with lightweight virtual machines that feel and perform like containers, but provide stronger workload isolation using hardware virtualization technology as a second layer of defense. | ||
- Expected Outcome: KubeArmor natively protecting Kata containers with required Integration. | ||
- Recommended Skills: Go, Kubernetes, Linux | ||
- Mentor(s): | ||
- Barun Acharya (@daemon1024, [email protected]) | ||
- Prashant Mishra (@primalpimmy, [email protected]) | ||
- Rudraksh Pareek (@DelusionalOptimist, [email protected] ) | ||
- Upstream Issue: https://github.com/kubearmor/KubeArmor/issues/1340 | ||
|
||
#### Leverage OCI Hooks for Container Events | ||
|
||
- Description: Use OCI hooks and get events in context to container start/stop: Currently KubeArmor mounts docker/containerd/crio UNIX domain socket file in KubeArmor to watch for container events. The aim is to use OCI hooks for getting such container events. | ||
- Expected Outcome: Eliminate exposing docker/containerd/crio UNIX domain sockets inside a container. | ||
- Recommended Skills: Go, Kubernetes, Linux | ||
- Mentor(s): | ||
- Barun Acharya (@daemon1024, [email protected]) | ||
- Akshay Gaikwad (@akshay196, [email protected]) | ||
- Rudraksh Pareek (@DelusionalOptimist, [email protected] ) | ||
- Upstream Issue: https://github.com/kubearmor/KubeArmor/issues/1390 | ||
|
||
#### Dashboards for application behavior and KubeArmor state | ||
|
||
- Description: For showing an application's behaviour, we'd like to have a Kibana/Grafana dashboard. We have existing integrations for | ||
visualizing alerts with Elastic/Loki and we can use them for creating these. | ||
We want to leverage the above for creating a plugin which will allow users to see an application's behavior based on visibility logs sent by KubeArmor. | ||
- Expected Outcome: A kubernetes dashboard setup that also has the app behaviours described. | ||
- Recommended Skills: Grafana, Javascript, Go, Kubernetes, Linux | ||
- Mentor(s): | ||
- Barun Acharya (@daemon1024, [email protected]) | ||
- Prashant Mishra (@primalpimmy, [email protected]) | ||
- Rudraksh Pareek (@DelusionalOptimist, [email protected] ) | ||
- Anurag Kumar (@kranurag7, [email protected]) | ||
- Upstream Issue: https://github.com/kubearmor/KubeArmor/issues/1390 |