Kubernetes Security : Inadequate Logging and Monitoring

Gupta Bless
6 min readOct 16, 2022
Photo by Ihor Dvoretskyi on Unsplash

Introduction

You may have a better understanding of the many security features that can be implemented with Kubernetes by reading the blog post that I wrote previously. Let’s talk about why logging and monitoring are essential to the safety of Kubernetes in this blog post, shall we? First things first: before we get into the specifics of why logging and monitoring are essential, let’s have a firm grasp on what they actually are.

Logging is a technique that stores or records the events of any operation that has been carried out digitally within an organization. Logging can refer to either storing or recording the occurrences. Therefore, if anyone logs onto their internal portal or participates in any of the activities, everything is being logged, which means that the records are being kept within a text file. The only method that can demonstrate both the identity and the integrity of the occurrences is logging. A log can contain a variety of important information, including the initiator, the source IP address, the date and time of the events, the source port, the destination port, and the device address, among other things.

Monitoring is the process through which a company tries to identify any harmful or unintentional behavior that may be occurring inside or outside of the organization as…

--

--