Confidential Observability on Kubernetes - Protecting Telemetry End-to-End
CNCF [Cloud Native Computing Foundation] via YouTube
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore how to secure Kubernetes observability pipelines using confidential computing in this 11-minute lightning talk from KubeCon + CloudNativeCon. Learn about the security challenges faced by observability tools like Fluent Bit, OpenTelemetry, and Loki when handling sensitive telemetry data including user identifiers, tokens, and internal service metadata. Discover how traditional encryption methods fall short during data collection and processing phases, leaving vulnerabilities in observability workflows. Examine a practical implementation that leverages confidential computing-enabled Kubernetes nodes to create hardware-isolated environments where observability components operate securely. Understand how this zero-intrusion design ensures telemetry data remains encrypted at the source and is only processed by trusted, attested workloads. Gain insights into combining Kubernetes-native observability tools with confidential compute infrastructure to achieve end-to-end encrypted, trusted observability solutions particularly valuable for regulated industries including finance, healthcare, and government sectors.
Syllabus
Confidential Observability on Kubernetes: Protecting Telemetry End-to-End- Jitendra Singh, Microsoft
Taught by
CNCF [Cloud Native Computing Foundation]