Confidential Observability on Kubernetes - Protecting Telemetry End-to-End
CNCF [Cloud Native Computing Foundation] via YouTube
Start speaking a new language. It’s just 3 weeks away.
PowerBI Data Analyst - Create visualizations and dashboards from scratch
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a lightning talk demonstrating how to secure Kubernetes observability pipelines using confidential computing to protect sensitive telemetry data throughout the entire collection and processing workflow. Learn about the security vulnerabilities in popular observability tools like Fluent Bit, OpenTelemetry, and Loki that expose sensitive data including user identifiers, tokens, and internal service metadata during collection and processing, even when encryption at rest and in transit is implemented. Discover a practical, zero-intrusion design that leverages confidential computing-enabled Kubernetes nodes to run observability components within hardware-isolated environments, ensuring telemetry data remains encrypted at the source and is only processed by trusted, attested workloads. Understand how this approach combines Kubernetes-native observability tools with confidential compute infrastructure to deliver end-to-end encrypted, trusted observability solutions specifically designed for regulated workloads in finance, healthcare, and government sectors where data protection is paramount.
Syllabus
Confidential Observability on Kubernetes: Protecting Telemetry End-to-End - Jitendra Singh, IBM
Taught by
CNCF [Cloud Native Computing Foundation]