Kubernetes etcd Snapshot

Cloud & SaaSCloud InfrastructureKubernetesCloud Control PlaneDisk Image

Location

etcd data directory on control-plane nodes (/var/lib/etcd) or managed-equivalent snapshot (e.g., AKS etcd backup)

Description

Point-in-time snapshot of the etcd key-value store that holds the full desired-state and recent-history of every Kubernetes object in the cluster: pods, services, secrets, RBAC policies, CRDs, and their metadata.

Forensic Value

An etcd snapshot captures the exact cluster state at a moment in time, including secrets and configurations attackers may have modified. Used for control-plane forensics where runtime objects have been altered or deleted, and as a point-in-time anchor for reconstructing what the attacker saw and touched.

Tools Required

etcdctlcloud-provider backup tooling

Collection Commands

etcdctl

ETCDCTL_API=3 etcdctl snapshot save /tmp/etcd-snapshot.db --endpoints=https://127.0.0.1:2379 --cacert=/etc/kubernetes/pki/etcd/ca.crt --cert=/etc/kubernetes/pki/etcd/server.crt --key=/etc/kubernetes/pki/etcd/server.key

etcdctl (inspect)

ETCDCTL_API=3 etcdctl snapshot status /tmp/etcd-snapshot.db --write-out=table

Collection Constraints

  • Managed clusters (EKS, GKE, AKS) do not provide direct etcd access; backup features vary per provider
  • etcd snapshot contains secrets in plaintext unless encryption-at-rest was configured; treat the snapshot as top-secret evidence

MITRE ATT&CK Techniques

T1552.007T1613