Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

CNCF [Cloud Native Computing Foundation]

Confidential Observability on Kubernetes - Protecting Telemetry End-to-End

CNCF [Cloud Native Computing Foundation] via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a lightning talk demonstrating how to secure Kubernetes observability pipelines using confidential computing to protect sensitive telemetry data throughout the entire collection and processing workflow. Learn about the security vulnerabilities in popular observability tools like Fluent Bit, OpenTelemetry, and Loki that expose sensitive data including user identifiers, tokens, and internal service metadata during collection and processing, even when encryption at rest and in transit is implemented. Discover a practical, zero-intrusion design that leverages confidential computing-enabled Kubernetes nodes to run observability components within hardware-isolated environments, ensuring telemetry data remains encrypted at the source and is only processed by trusted, attested workloads. Understand how this approach combines Kubernetes-native observability tools with confidential compute infrastructure to deliver end-to-end encrypted, trusted observability solutions specifically designed for regulated workloads in finance, healthcare, and government sectors where data protection is paramount.

Syllabus

Confidential Observability on Kubernetes: Protecting Telemetry End-to-End - Jitendra Singh, IBM

Taught by

CNCF [Cloud Native Computing Foundation]

Reviews

Start your review of Confidential Observability on Kubernetes - Protecting Telemetry End-to-End

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.