๐ ๐๐ฎ๐๐๐ซ๐ง๐๐ญ๐๐ฌ is the most used platform among admins and developers. Containerization has made it easier than ever to swiftly design and deploy application environments with Kubernetes. However, security is the most common source of concern when it comes to container adoption. ๐ ๐๐ฎ๐๐๐ซ๐ง๐๐ญ๐๐ฌ security is all about establishing and implementing security measures to protect […]
Read More๐ ๐๐ฉ๐ ๐ซ๐๐๐ ๐๐ฎ๐๐๐ซ๐ง๐๐ญ๐๐ฌ ๐๐ฅ๐ฎ๐ฌ๐ญ๐๐ซ โช Software aging is the most obvious reason for a Kubernetes upgrade. We are required to upgrade the cluster to keep up with the latest security features and bug fixes, as well as benefit from new features being released on an on-going basis. ๐ ๐๐ฎ๐๐๐ซ๐ง๐๐ญ๐๐ฌ ๐ฌ๐๐๐ซ๐๐ญ๐ฌ โช Secrets are used to […]
Read Morecertified Kubernetes Security Specialist | Day 2 Review and Q/A: Kubernetes RBAC, Service Account and Network Policy [Certified Kubernetes Security Specialist]Role-based access control (RBAC)ย โช is a way of regulating access to Kubernetes object resources based on certain roles of individual users within any organization.Service accountsย โช are used to provide an identity to the […]
Read MoreCertified Kubernetes Security Specialist | Day 1 Review and Q/A: Kubernetes Components, Architecture, and Installation [Certified Kubernetes Security Specialist] [CKS] Kubernetes Security โช uses an approach to divide the security strategies applied in Cloud-native systems into four different layers known as 4Cs of Cloud-native Security. These 4Cs are as follow: โข Code โข Container โข […]
Read MoreWhat is a Container? Containers, in simple terms, are the objects that package your application and its dependencies and help you run them anywhere you want! What is a Container Image? A container image is a lightweight, standalone, executable package of software that includes everything needed to run an application: code, runtime, system tools, system […]
Read More๐ก๏ธSecurity is a concern that never fades away! And Kubernetes is no exception. โธ๏ธ Is security a concern in Kubernetes? Well, yes and no. No, because it doesnโt come with the most secure environment by default. Yes, since configuring or clusters with the CIS Benchmarks and 3-party tools can be hardened and secured. โ What […]
Read MoreWe can write our own routing rules, which are implemented in seconds, and these rules also can be utilized in the application source code. Furthermore, endpoints like REST-APIs, static content, and dynamic web front ends may all be accessed via one IP address, potentially serving content for multiple domain names. This is often precisely what […]
Read MoreDocker containers in todayโs world is seeming to be a must for application deployment! A docker image is a file that defines which data and processes should exist inside a particular container when it starts. Any docker image be it from official repositories or the one built on your own might have vulnerabilities and possess […]
Read MoreMost of us love the GUI based interactions rather than the old and boring CLI ones. Are you wondering if the K8s also has a GUI which makes our lives a lot easier? Yes, it does! Its called the Kubernetes Dashboard. The web-based console, which is a general-purpose UI made to look after the Cluster […]
Read MoreWhen you install Kubernetes, choose an installation type based on ease of maintenance, security, control, available resources, and expertise required to operate and manage a cluster. You can deploy a Kubernetes cluster on a local machine, cloud, or choose a managed Kubernetes cluster. If you are interested in Docker & Kubernetes and wish to know […]
Read More