Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
github.com.mxmilu.top/banzaicloud/logging-operator
Logging operator for Kubernetes based on Fluentd and Fluent-bit.
The Logging operator automates the deployment and configuration of a Kubernetes logging pipeline. The operator deploys and configures a Fluent Bit daemonset on every node to collect container and application logs from the node file system. Fluent Bit queries the Kubernetes API and enriches the logs with metadata about the pods, and transfers both the logs and the metadata to Fluentd. Fluentd receives, filters, and transfer logs to multiple outputs. Your logs will always be transferred on authenticated and encrypted channels.
This operator helps you bundle logging information with your applications: you can describe the behavior of your application in its charts, the Logging operator does the rest.
You can define outputs
(destinations where you want to send your log messages, for example, Elasticsearch, or and Amazon S3 bucket), and flows
that use filters and selectors to route log messages to the appropriate outputs. You can also define cluster-wide outputs and flows, for example, to use a centralized output that namespaced users cannot modify.
You can configure the Logging operator using the following Custom Resource Descriptions.
Fluentd
and Fluent-bit
configuration. Specifies the controlNamespace
. Fluentd and Fluent-bit will be deployed in the controlNamespace
clusteroutput
.filters
and outputs
. You can specify selectors
to filter logs by labels. Outputs can be output
or clusteroutput
. This is a namespaced resource. See also clusterflow
.controlNamespace
.See the detailed CRD documentation.
Follow these quickstart guides to try out the Logging operator!
Deploy Logging Operator with Kubernetes manifests or Helm chart.
Caution: The master branch is under heavy development. Use releases instead of the master branch to get stable software.
If you encounter problems that the documentation does not address, open an issue or talk to us on the Banzai Cloud Slack channel #logging-operator.
If you are using the Logging operator in a production environment and require commercial support, contact Banzai Cloud, the company backing the development of the Logging operator. If you are looking for the ultimate observability tool for multi-cluster Kubernetes infrastructures to automate the collection, correlation, and storage of logs and metrics, check out One Eye.
You can find the complete documentation of the Logging operator on the Banzai Cloud Documentation Page :blue_book:
If you find this project useful, help us:
For more information, read the developer documentation.
Copyright (c) 2017-2020 Banzai Cloud, Inc.
Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.
FAQs
Unknown package
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.