Inspektor Gadget Logo

Inspektor Gadget

0
Free
Visit Website

Inspektor Gadget is a collection of tools (or gadgets) to debug and inspect Kubernetes resources and applications. It manages the packaging, deployment and execution of eBPF programs in a Kubernetes cluster, including many based on BCC tools, as well as some developed specifically for use in Inspektor Gadget. It automatically maps low-level kernel primitives to high-level Kubernetes resources, making it easier and quicker to find the relevant information. The Gadgets Inspektor Gadget tools are known as gadgets. You can deploy one, two or many gadgets. Explore the following documentation to find out which tools can help you in your investigations. advise: network-policy seccomp-profile audit: seccomp profile: block-io cpu tcprtt snapshot: process socket top: block-io ebpf file tcp trace: bind capabilities dns exec fsslower mount oomkill open signal sni tcp tcpconnect tcpdrop tcpretrans traceloop Installation Install Inspektor Gadget (client-side): Use krew plugin manager to install: $ kubectl krew install gadget Install Inspektor Gadget on Kubernetes: $ kubectl gadget deploy Read the detailed install instructions to find more information. How to use kubectl gadget --help will provide

FEATURES

ALTERNATIVES

Collection of Kubernetes manifests creating pods with elevated privileges for security testing.

Python library for building Docker images with advanced features.

Open-source tool for analyzing AWS temporary tokens to detect malicious activity.

CloudDefense.AI is a Cloud Native Application Protection Platform (CNAPP) that safeguards cloud infrastructure and cloud-native apps with expertise, precision, and confidence.

Commercial

Managed Kubernetes Inspection Tool leveraging FOSS tools to query and validate security-related settings.

Learn how to secure applications in Kubernetes Engine by granting varying levels of privilege based on requirements.

A Python script that lists all main resources of your AWS account, helping you find resources that affect billing and/or security.

In-depth analysis and insights on various cloud security topics by Rhino Security Labs team