We’re excited to introduce a powerful new container security capability that makes it easier than ever to view and query Kubernetes objects while exploring the entire exposure path with Upwind’s runtime topology map.

Upwind has always provided deep visibility into containerized resources, showing traffic by port, process, and protocol, as well as details into an individual resource’s exposure path.

Screenshot of a network dashboard from Upwind. It shows a network map with nodes labeled Internet and several services like ReverseProxy and Service Discovery. The sidebar includes options for Map, Risks, and Configurations.

With this enhancement, you can now also view, query, and filter Kubernetes (K8s) resources directly in the Upwind Topology Map, including details such as:

  • Kubernetes service names, service ports, and service types
  • Kubernetes ingress names and communication to Kubernetes clusters
  • Connected cloud provider load balancers 

These advanced search capabilities make it effortless to filter cloud topology automatically and pinpoint relevant Kubernetes resources and risk parameters. You can view the complete request path, including services, Internet connections, load balancers and more – helping you identify potential risks faster by:

  • Pinpointing misconfigurations that could lead to vulnerabilities
  • Identifying exposed services that may be unintentionally accessible
  • Tracing unintended communication paths to mitigate risks effectively

These new query capabilities empower you to gain deeper visibility into resource communication, validate infrastructure changes, and proactively secure containerized environments. To learn more, schedule a demo today.