Kubesonde is a tool to probe and test network security policies in Kubernetes.
Folders are organized as follows:
crd
: backend service and kubesonde CRDdocs
: documentation of the project/ideas.frontend
: contains the UI for analyzing the probe outputsexamples
: sample output from Kubesonde
You can run Kubernetes on the cloud, bare-metal or via Minikube or Kind.
Install the application you want to test (e.g., helm install wordpress bitnami/wordpress
). Make sure that the app is running with no errors.
To install kubesonde run kubectl apply -f kubesonde.yaml
. This creates all the required resources to run Kubesonde on your cluster. After that, you can install a scanner object for Kubesonde. For example, targeting only the default namespace is available. Then, you can create a Kubesonde object, for instance:
apiVersion: security.kubesonde.io/v1
kind: Kubesonde
metadata:
name: kubesonde-sample
spec:
namespace: default
probe: all
To fetch the results, you need to use the following commands:
kubectl --namespace kubesonde port-forward deployment.apps/kubesonde-controller-manager 2709
. This command creates a port mapping between your local computer and the Kubesonde deployment.
curl localhost:2709/probes > <output-file>.json
. This command gets the probe result and stores it in an output file.
Navigate to the kubesonde website and upload the generated file to see the results.
Logo from Elisabetta Russo [email protected]