The StackRox Kubernetes Security Platform version 2.4.19 includes several new features and enhancements. To upgrade to this release from a previous version, see the Upgrade StackRox section.
When securing a cluster, you can now choose to collect the runtime activity by using an Extended Berkeley Packet Filter (eBPF) program instead of a Linux kernel module.
This feature adds support for runtime visibility and detection in clusters running Container-Optimized OS from Google.
To use eBPF data collection, your cluster nodes must run a supported operating system and kernel version, such as Ubuntu, Debian, or Container-Optimized OS from Google.
eBPF collection is available as a Preview feature. It’s recommended to test this feature in a development or testing environment before deploying it in a production environment.
You can now apply policies to specific clusters or namespaces, or only to services matching specific labels.
Important system changes are now saved and exported to Splunk. To get started, configure a Splunk integration.
When you’re assessing compliance, it’s now easier to see the details of related controls, namespaces, and nodes for each cluster. Look for the new tabs on the compliance page for your cluster.
A copy of the StackRox Kubernetes Security Platform documentation is now included in the StackRox
Portal. To access it, log in and enter the URL
We're happy to help! Reach out to us to discuss questions, issues, or feature requests.