Catégorie : Kubernetes (AKS)

Podcast | Kubernetes Security with Imad Bensisaid


I’m thrilled to share an insightful French webinar discussion on Kubernetes Security, featuring an expert in the field, Imad Bensisaid for the UNi5 youtube channel. Together, we explore various aspects of securing Kubernetes environments, ranging from basic attacks to advanced strategies, and delve into best practices for developers to safeguard against malicious code injection through external libraries.

Kubernetes Basic Attacks

  • Understanding common attack vectors.
  • Identifying vulnerabilities in default configurations.

Advanced Kubernetes Attacks

  • Exploring sophisticated attack techniques.
  • Mitigating advanced threats and securing the cluster.

Security Best Practices for Developers

  • Preventing malicious code injection.
  • Recommended code analysis tools.
  • Managing malicious developers: Strategies and procedures.

Static Code Analysis

  • Implementing code scanning for early detection.
  • Analyzing code libraries for potential vulnerabilities.

Container Image Management

  • Keeping container images up-to-date.
  • CI/CD pipeline with automated code scanning and vulnerability detection.

Image Lifecycle Management

  • Best practices for handling container images.
  • Recommended scanners for image protection and analysis.

Build Pack Hardening

  • Strengthening container images for security.

Real-time Detection Tools

  • Aqua, Twistlock, Falco, and their roles in real-time detection and behavior analysis.

Infrastructure Design for Security

  • Adopting a secure mindset for infrastructure design.
  • Managing rights and network configurations.

Deployment Strategies

  • Leveraging infrastructure as code.
  • Deploying exclusively through pipelines.

Azure Security Tools

  • Utilizing Azure policies for enhanced security.
  • Leveraging Microsoft Defender for Cloud.

Watch the Webinar:

In this webinar, Imad and I share practical insights and actionable strategies to enhance Kubernetes security. Whether you are a developer, IT professional, or someone interested in bolstering their Kubernetes knowledge, this discussion provides valuable insights into securing your containerized environments.

Stay secure,


AKS | AKS Managed Namespaces Label


The introduction of the « » label brings a new layer of visibility and control to AKS managed namespaces. This label serves as a marker, indicating the entity responsible for managing a particular namespace within the AKS environment. Whether it’s an individual, a team, or an automated process, this label acts as a key identifier, simplifying the tracking and administration of AKS resources.



AKS | Artifact Streaming 


High-performance compute workloads often grapple with the challenge of managing large container images, leading to extended image pull times and delayed workload deployments. Recognizing this pain point, Azure Kubernetes Service (AKS) introduces Artifact Streaming, a powerful feature designed to streamline the process of streaming container images from Azure Container Registry (ACR) to AKS. This article delves into the benefits and implementation of Artifact Streaming, shedding light on how it can significantly enhance the performance of your AKS workloads.

Large images in high-performance compute workloads can impede efficiency, resulting in prolonged image pull times and, subsequently, delayed deployment of workloads. This bottleneck can be particularly problematic for workloads that require rapid scalability and responsiveness.

Artifact Streaming on AKS offers a solution to this challenge by optimizing the process of streaming container images from ACR to AKS. Unlike traditional methods, AKS with Artifact Streaming only pulls the essential layers needed for the initial pod startup. This targeted approach dramatically reduces the time required to pull images, resulting in faster and more efficient workload deployments.

Key Benefits of Artifact Streaming:

  • Reduced Time to Pod Readiness:
    • Experience over a 15% reduction in time to pod readiness, particularly impactful for time-sensitive workloads.
  • Optimized for Images <30GB:
    • While Artifact Streaming is most effective for images under 30GB, our testing showcased substantial improvements for images under 10GB, with pod start-up times decreasing from minutes to seconds.
  • Concurrent Pod Start-ups:
    • Artifact Streaming enables concurrent pod start-ups, offering a significant advantage over the traditional serial start-up process.

Create a new node pool with Artifact Streaming enabled:

az aks nodepool add --resource-group myResourceGroup --cluster-name myAKSCluster --name myNodePool --enable-artifact-streaming

In conclusion, Artifact Streaming on AKS proves to be a game-changer for high-performance compute workloads, offering a streamlined approach to handling large container images. By significantly reducing image pull times and enhancing pod start-up efficiency, AKS with Artifact Streaming empowers businesses to meet the demands of dynamic and scalable workloads. Follow the implementation guide provided to unlock the full potential of this feature and elevate the performance of your AKS deployments.