The logs told a story no one wanted to read. A Kubernetes Ingress had been breached. Packets moved where they shouldn’t. Connections rose and fell in patterns too precise to be random. In forensic investigations, details hide in the noise. The key is finding them before they vanish.
Kubernetes Ingress is the gatekeeper between your cluster and the outside world. It routes HTTP and HTTPS traffic to services inside the cluster. In a forensic investigation, the Ingress becomes both a witness and a suspect. Every request and response, every changed configuration, every failed handshake can reveal what happened.
The first step is log collection. Ingress controllers like NGINX or HAProxy keep detailed access logs. Capture them in full. Do not rotate too early. Store them securely. Investigators need raw, untampered evidence to perform traffic pattern analysis and timeline reconstruction.
Next is configuration review. Check Ingress resources in Kubernetes for recent edits. Use kubectl get ingress --show-managed-fields to see metadata. Compare current YAML against version-controlled manifests. Unauthorized changes to annotations, path rules, or TLS settings can indicate compromise.