
Size: a a a
Supports code branching and merging
Supports multiple developers
Supports multiple database types
Supports XML, YAML, JSON and SQL formats
Supports context-dependent logic
Cluster-safe database upgrades
Generate Database change documentation
Generate Database "diffs"
Run through your build process, embedded in your application or on demand
Automatically generate SQL scripts for DBA code review
Does not require a live database connection
This is a simple penetration testing tool which takes advantage of public cloud provider approaches to providing kubelet credentials to nodes in a Kubernetes cluster in order to gain privileged access to the k8s API. This access can then potentially be used to further compromise the applications running in the cluster or, in many cases, access secrets that facilitate complete control of Kubernetes.