Difference between revisions of "Hardeneks"
Jump to navigation
Jump to search
(2 intermediate revisions by the same user not shown) | |||
Line 2: | Line 2: | ||
* https://github.com/aws-samples/hardeneks | * https://github.com/aws-samples/hardeneks | ||
− | + | * <code>[[pip install hardeneks]]</code> | |
− | |||
[[hardeneks --help]] | [[hardeneks --help]] | ||
Line 13: | Line 12: | ||
* [[Kubernetes security]] | * [[Kubernetes security]] | ||
* [[KICS]]: <code>[[kics scan]]</code> | * [[KICS]]: <code>[[kics scan]]</code> | ||
+ | * [[Datree]] [[kubectl plugin]] | ||
== See also == | == See also == |
Latest revision as of 19:00, 27 February 2024
Runs checks to see if an EKS cluster follows EKS Best Practices.
hardeneks --help hardeneks --cluster hardeneks --cluster your-cluster-name --export-html your_exported_file.html
Related[edit]
See also[edit]
hardeneks [ --cluster ] --help
- EKS,
eksctl
, EKS add-ons, Amazon EKS cluster role, Terraform EKS, Kubernetes Autoscaler, Karpenter, Terraform module: EKS, Terraform resource: aws eks node group, Terraform data source: aws_eks_cluster, AWS Controllers for Kubernetes, AWS Load Balancer Controller, Amazon EKS Anywhere, Kustomize,aws-iam-authenticator
, ACK, tEKS, Amazon EKS authorization, Amazon EKS authentication, Nodegroup, EKS storage,aws-ebs-csi-driver, aws-efs-csi-driver, aws-load-balancer-controller, amazon-vpc-cni-k8s
, EKS security, EKS Best Practices Guides,hardeneks
, EKS versions,fargate-scheduler
,eks-connector
, Resilience in Amazon EKS, EKS control plane logging, Security groups for Pods in EKS
Advertising: