Seccomp on Kubernetes & Cloud Native Buildpacks

Paris

May 11, 2021, 4:30 – 7:00 PM

Virtual event

Hello à tous! Encore un excellent événement à venir 😃 Nous sommes heureux d'avoir 2 sujets que nous n'avons pas abordé jusqu'à maintenant. Nous recevons Alban Crequy (Kinvolk) sur les possibilités de seccomp sur Kubernetes ainsi que Guillaume Morini (VMWare) qui nous en dira plus sur kpack qui fait usage des Cloud Native Buildpacks. À noter que le premier talk sera en anglais. À très bientôt !

About this event

AGENDA :


Seccomp Notify on Kubernetes

Bio

===

Alban is the Co-founder of Kinvolk and director of engineering for Kinvolk Labs. He has a particular interest in integrating BPF into Kubernetes. He’s a maintainer of the gobpf library and has worked on software in the cloud space using BPF with Golang: Weave Scope, Traceleft, Project Calico, and recently Inspektor Gadget, Traceloop, and Network Policy Advisor.

Abstract

========

Until now, you could define seccomp policies in Kubernetes to allow or deny system calls but not much more. The new Seccomp Notify feature in Linux 5.9 will enable more complex policies and the ability to write your own agents to handle new use cases in Kubernetes. Attend to find out why and how!

Seccomp is a feature of the Linux kernel that allows to filter the system calls that a process is allowed to execute. This is commonly used by containers as a way to improve the isolation between the container and the host. Both container runtime runc and Kubernetes allow users to define a Seccomp policy via the OCI Runtime Specification and the PodSpec respectively.

Seccomp recently grew a new feature called the Seccomp Notify in Linux 5.0 and improved in Linux 5.9. This allows a seccomp policy not only to take an immediate decision on whether to allow or deny a system call but also to defer the control to an external process that I called the Seccomp Agent. The Seccomp agent can decide to block the system call, let it continue, or, up to some extent, execute the system call on behalf of the container. This allows new use cases like running privileged workloads in a safer way and some unprivileged container builds setups.

In this talk, I will present the Seccomp Notify feature and the architecture in runc that makes use of it. I will describe the current status of this feature in Kubernetes. I will demonstrate a couple of use cases in Kubernetes and show how easy it is to build your own seccomp agent in Golang to support new use cases. The audience can expect mentions of pidfd_getfd, the addfd ioctl, and more.


Simplifier, automatiser la création de vos images de conteneurs avec les Cloud Native Buildpacks

Bio

===

Guillaume Morini travaille pour VMware en tant que Solution Engineer, spécialisé dans la famille de produit VMware Tanzu. Il aide les clients à écrire de meilleurs logiciels et à déployer des plateformes modernes pour les accueillir. Il est doublement certifié Kubernetes avec les certifications CKA et CKAD. Avant cela, il a travaillé pour Docker et Cisco. Il possède une forte expertise sur les infrastructures des Data Centers et des Clouds ainsi que leurs liens avec les applications.

Abstract:

=========

Durant ce talk, nous verrons les avantages à utiliser les Cloud Native Buildpacks, projet de la CNCF, pour simplifier et automatiser la création de vos images de conteneurs.

Fini les Dockerfiles et les temps de build d'images super longs sur vos postes, grâce à l'utilisation de kpack, vous pourrez effectuer vos builds directement dans vos clusters Kubernetes en tâche de fond. Et si vous avez branché votre CI/CD sur votre registry, automatiser également les déploiements.


Organizers

  • Smaïne Kahlouch

    Ogenki

    Lead Organizer

  • Reda Benzair

    LUMEN

    Lead organizer - CNCF Amabassor

  • Jean-Christophe Sirot

    Aircall

    Lead organizer

  • Emmanuel Lagrée

    Team CNCF Paris Organizer

  • Andrea Giardini

    CNCF Paris Organizer

CONTACT US