Skip to content

Commit 53e6e97

Browse files
committed
Add Helm to intro
1 parent 49c6c79 commit 53e6e97

File tree

3 files changed

+52
-6
lines changed

3 files changed

+52
-6
lines changed

docs/introduction.md

Lines changed: 40 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,19 @@
11
# Introduction
22

3-
TODO!
3+
TODO! document the attack vectors
44

55
> We’ll start with possible attack vectors, to help you map out the threat model that applies to your cluster, so you can figure out where you need to focus your efforts for security.
66
7-
> We’ll show you how to compromise a deployment with a pod running with a known vulnerability. Once you’ve had the attacker’s eye-view, we’ll walk you through the most important techniques and open source tools to prevent compromise.
7+
We’ll show you how to compromise a deployment with a pod running with a known vulnerability. Once you’ve had the attacker’s eye-view, we’ll walk you through the most important techniques and open source tools to prevent compromise.
8+
9+
- [Scanning container images for vulnerabilities](scanning.md)
10+
- [Configuring container images with security in mind, and checking them with policies](policies.md)
11+
- [Checking your Kubernetes configuration](settings.md)
12+
- [Enhancing security using GitOps](gitops.md)
813

914
## Create a Kubernetes cluster
1015

11-
To follow along with the practical examples in this tutorial you'll need a Kubernetes cluster that you can experiment with. Since at times you will be deploying insecure code, please don't use your production cluster! You can run a cluster locally on your laptop, for example using [Kind - Kubernetes IN Docker](https://kind.sigs.k8s.io).
16+
To follow along with the practical examples in this tutorial you'll need a Kubernetes cluster that you can experiment with. Since at times you will be deploying insecure code, please don't use your production cluster! You can run a cluster locally on your laptop, for example using [Kind - Kubernetes IN Docker](https://kind.sigs.k8s.io). We'll also be using Helm to run software on the Kind cluster.
1217

1318
### Install kind
1419

@@ -56,4 +61,35 @@ NAME STATUS ROLES AGE VERSION
5661
kind-control-plane Ready master 78m v1.18.2
5762
```
5863

59-
Great! You have a Kubernetes cluster running locally that you can experiment with.
64+
Great! You have a Kubernetes cluster running locally that you can experiment with.
65+
66+
## Install Helm
67+
68+
If you don't already have Helm on your laptop, you'll want to install that too. Find full instructions in the [Helm documentation](https://helm.sh/docs/intro/install/) or here is a quick guide:
69+
70+
On MacOS using Homebrew:
71+
72+
```
73+
brew install helm
74+
```
75+
76+
On MacOS / Linux:
77+
78+
```
79+
curl -fsSL -o get_helm.sh https://raw.githubusercontent.com/helm/helm/master/scripts/get-helm-3
80+
chmod +x get_helm.sh
81+
./get_helm.sh
82+
```
83+
84+
On Windows using Chocolatey:
85+
86+
```
87+
choco install kubernetes-helm
88+
```
89+
90+
If you have a fresh Kind installation there won't be any Helm charts installed yet, so a `helm ls` will return an empty list:
91+
92+
```
93+
$ helm ls
94+
NAME NAMESPACE REVISION UPDATED STATUS CHART APP VERSION
95+
```

docs/scanning.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1,10 @@
1-
# Including vulnerability scanning in your workflow
1+
# Vulnerability scanning
2+
3+
The Shellshock vulnerability [demonstrated](compromise.md) is a serious vulnerability, but it's just one of thousands of known, exploitable vulnerabilities that range from negligible right up to critical in severity.
4+
5+
6+
7+
To make sure that your container images don't include
8+
9+
## Including vulnerability scanning in your workflow
10+

mkdocs.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,10 @@ copyright: 'Copyright © Liz Rice and Michael Hausenblas'
77
nav:
88
- Overview: index.md
99
- Introduction: introduction.md
10-
- Secure settings: settings.md
10+
- Compromise a pod!: compromise.md
1111
- Scanning: scanning.md
1212
- Policies: policies.md
13+
- Secure settings: settings.md
1314
- GitOps: gitops.md
1415
theme:
1516
name: 'material'

0 commit comments

Comments
 (0)