{"id":17909,"date":"2022-02-15T19:05:58","date_gmt":"2022-02-15T13:35:58","guid":{"rendered":"http:\/\/onlineappsdba.com\/?p=17909"},"modified":"2022-02-15T19:05:58","modified_gmt":"2022-02-15T13:35:58","slug":"day-4-recap","status":"publish","type":"post","link":"https:\/\/onlineappsdba.com\/index.php\/2022\/02\/15\/day-4-recap\/","title":{"rendered":"\ud835\udc03\ud835\udc1a\ud835\udc32 4 \ud835\udc11\ud835\udc1e\ud835\udc2f\ud835\udc22\ud835\udc1e\ud835\udc30 \ud835\udc1a\ud835\udc27\ud835\udc1d \ud835\udc10\/\ud835\udc00: \ud835\udc12\ud835\udc1e\ud835\udc1c\ud835\udc2e\ud835\udc2b\ud835\udc1e \ud835\udc08\ud835\udc27\ud835\udc20\ud835\udc2b\ud835\udc1e\ud835\udc2c\ud835\udc2c, \ud835\udc1a\ud835\udc27\ud835\udc1d \ud835\udc11\ud835\udc1e\ud835\udc2c\ud835\udc2d\ud835\udc2b\ud835\udc22\ud835\udc1c\ud835\udc2d \ud835\udc00\ud835\udc1c\ud835\udc1c\ud835\udc1e\ud835\udc2c\ud835\udc2c \ud835\udc2d\ud835\udc28 \ud835\udc0d\ud835\udc28\ud835\udc1d\ud835\udc1e \ud835\udc0c\ud835\udc1e\ud835\udc2d\ud835\udc1a\ud835\udc1d\ud835\udc1a\ud835\udc2d\ud835\udc1a [\ud835\udc02\ud835\udc0a\ud835\udc12]"},"content":{"rendered":"<p><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;\ud835\udc03\ud835\udc1a\ud835\udc32 4 \ud835\udc11\ud835\udc1e\ud835\udc2f\ud835\udc22\ud835\udc1e\ud835\udc30 \ud835\udc1a\ud835\udc27\ud835\udc1d \ud835\udc10\/\ud835\udc00: \ud835\udc12\ud835\udc1e\ud835\udc1c\ud835\udc2e\ud835\udc2b\ud835\udc1e \ud835\udc08\ud835\udc27\ud835\udc20\ud835\udc2b\ud835\udc1e\ud835\udc2c\ud835\udc2c, \ud835\udc1a\ud835\udc27\ud835\udc1d \ud835\udc11\ud835\udc1e\ud835\udc2c\ud835\udc2d\ud835\udc2b\ud835\udc22\ud835\udc1c\ud835\udc2d \ud835\udc00\ud835\udc1c\ud835\udc1c\ud835\udc1e\ud835\udc2c\ud835\udc2c \ud835\udc2d\ud835\udc28 \ud835\udc0d\ud835\udc28\ud835\udc1d\ud835\udc1e \ud835\udc0c\ud835\udc1e\ud835\udc2d\ud835\udc1a\ud835\udc1d\ud835\udc1a\ud835\udc2d\ud835\udc1a [\ud835\udc02\ud835\udc0a\ud835\udc12]\\n\\n\ud83d\udccc \ud835\udc14\ud835\udc29\ud835\udc20\ud835\udc2b\ud835\udc1a\ud835\udc1d\ud835\udc1e \ud835\udc0a\ud835\udc2e\ud835\udc1b\ud835\udc1e\ud835\udc2b\ud835\udc27\ud835\udc1e\ud835\udc2d\ud835\udc1e\ud835\udc2c \ud835\udc02\ud835\udc25\ud835\udc2e\ud835\udc2c\ud835\udc2d\ud835\udc1e\ud835\udc2b \u27aa Software aging is the most obvious reason for a Kubernetes upgrade. We are required to upgrade the cluster to keep up with the latest security features and bug fixes, as well as benefit from new features being released on an on-going basis. \\n\\n\ud83d\udccc \ud835\udc0a\ud835\udc2e\ud835\udc1b\ud835\udc1e\ud835\udc2b\ud835\udc27\ud835\udc1e\ud835\udc2d\ud835\udc1e\ud835\udc2c \ud835\udc2c\ud835\udc1e\ud835\udc1c\ud835\udc2b\ud835\udc1e\ud835\udc2d\ud835\udc2c \u27aa Secrets are used to hold sensitive data like passwords or keys. They\u2019re similar to Config Map except that they\u2019re stored in an encoded or hashed format with config maps.\\n\\n\ud83d\udccc \ud835\udc00\ud835\udc29\ud835\udc29\ud835\udc00\ud835\udc2b\ud835\udc26\ud835\udc28\ud835\udc2b \u27aa AppArmor (\\&quot;Application Armor\\&quot;) is a Linux kernel security module that allows the system administrator to restrict programs' capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths.\\n\\n\ud83e\udd14Didn\u2019t it seem interesting already?\ud83e\udd29  \ud835\udc02\ud835\udc21\ud835\udc1e\ud835\udc1c\ud835\udc24 \ud835\udc28\ud835\udc2e\ud835\udc2d \ud835\udc2d\ud835\udc21\ud835\udc22\ud835\udc2c \ud835\udc1b\ud835\udc25\ud835\udc28\ud835\udc20 https:\/\/k21academy.com\/cksday4   that covers:\\n\\n\ud83c\udf40 Upgrade Kubernetes Cluster.\\n\ud83c\udf40 Create and manage Kubernetes secrets\\n\ud83c\udf40 Kernel Hardening tools (Apparmor, Seccomp)\\n\ud83c\udf40 ETCD Encryption and much more....\\n\\n\ud83d\udcabWant more in-depth training? Check the FREE CLASS now at https:\/\/k21academy.com\/cks02 \\n\\nNeed other preparation ideas? Follow @K21Academy: Learn Cloud from Experts\\n\\n\\n&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:1061805,&quot;3&quot;:{&quot;1&quot;:0},&quot;5&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:{&quot;1&quot;:2,&quot;2&quot;:0}},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;6&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:{&quot;1&quot;:2,&quot;2&quot;:0}},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;8&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:{&quot;1&quot;:2,&quot;2&quot;:0}},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;10&quot;:2,&quot;11&quot;:4,&quot;12&quot;:0,&quot;15&quot;:&quot;Calibri&quot;,&quot;16&quot;:11,&quot;23&quot;:1}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0}\uee10{&quot;1&quot;:1061,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:1091}\" data-sheets-hyperlinkruns=\"{&quot;1&quot;:1061,&quot;2&quot;:&quot;https:\/\/k21academy.com\/cksday4&quot;}\uee10{&quot;1&quot;:1091}\">\ud83d\udccc \ud835\udc14\ud835\udc29\ud835\udc20\ud835\udc2b\ud835\udc1a\ud835\udc1d\ud835\udc1e \ud835\udc0a\ud835\udc2e\ud835\udc1b\ud835\udc1e\ud835\udc2b\ud835\udc27\ud835\udc1e\ud835\udc2d\ud835\udc1e\ud835\udc2c \ud835\udc02\ud835\udc25\ud835\udc2e\ud835\udc2c\ud835\udc2d\ud835\udc1e\ud835\udc2b \u27aa Software aging is the most obvious reason for a Kubernetes upgrade. We are required to upgrade the cluster to keep up with the latest security features and bug fixes, as well as benefit from new features being released on an on-going basis.<\/p>\n<p>\ud83d\udccc \ud835\udc0a\ud835\udc2e\ud835\udc1b\ud835\udc1e\ud835\udc2b\ud835\udc27\ud835\udc1e\ud835\udc2d\ud835\udc1e\ud835\udc2c \ud835\udc2c\ud835\udc1e\ud835\udc1c\ud835\udc2b\ud835\udc1e\ud835\udc2d\ud835\udc2c \u27aa Secrets are used to hold sensitive data like passwords or keys. They\u2019re similar to Config Map except that they\u2019re stored in an encoded or hashed format with config maps.<\/p>\n<p>\ud83d\udccc \ud835\udc00\ud835\udc29\ud835\udc29\ud835\udc00\ud835\udc2b\ud835\udc26\ud835\udc28\ud835\udc2b \u27aa AppArmor (&#8220;Application Armor&#8221;) is a Linux kernel security module that allows the system administrator to restrict programs&#8217; capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths.<\/p>\n<p>\ud83e\udd14Didn\u2019t it seem interesting already?\ud83e\udd29 \ud835\udc02\ud835\udc21\ud835\udc1e\ud835\udc1c\ud835\udc24 \ud835\udc28\ud835\udc2e\ud835\udc2d \ud835\udc2d\ud835\udc21\ud835\udc22\ud835\udc2c \ud835\udc1b\ud835\udc25\ud835\udc28\ud835\udc20 <a href=\"https:\/\/k21academy.com\/docker-kubernetes\/kubernetes-security\/day-4-recap\/?utm_source=onlineappsdba&amp;utm_medium=referral&amp;utm_campaign=cksday4_feb22\">https:\/\/k21academy.com\/cksday4<\/a> that covers:<\/p>\n<p>\ud83c\udf40 Upgrade Kubernetes Cluster.<br \/>\n\ud83c\udf40 Create and manage Kubernetes secrets<br \/>\n\ud83c\udf40 Kernel Hardening tools (Apparmor, Seccomp)<br \/>\n\ud83c\udf40 ETCD Encryption and much more&#8230;.<\/p>\n<p>\ud83d\udcabWant more in-depth training? Check the FREE CLASS now at <a href=\"https:\/\/k21academy.com\/kubernetes-security-specialist-certification-free-class\/?utm_source=onlineappsdba&amp;utm_medium=referral&amp;utm_campaign=cks02_feb22\">https:\/\/k21academy.com\/cks02<\/a><\/p>\n<p>Need other preparation ideas? Follow @K21Academy: Learn Cloud from Experts<\/p>\n<p><\/span><\/p>\n<p><a href=\"https:\/\/k21academy.com\/kubernetes-security-specialist-certification-free-class\/?utm_source=onlineappsdba&amp;utm_medium=referral&amp;utm_campaign=cks02_feb22\"><img decoding=\"async\" src=\"https:\/\/k21academy.com\/wp-content\/uploads\/2020\/09\/CKACKS_CU_GIF.gif\" alt=\"UTM GIF\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\ud83d\udccc \ud835\udc14\ud835\udc29\ud835\udc20\ud835\udc2b\ud835\udc1a\ud835\udc1d\ud835\udc1e \ud835\udc0a\ud835\udc2e\ud835\udc1b\ud835\udc1e\ud835\udc2b\ud835\udc27\ud835\udc1e\ud835\udc2d\ud835\udc1e\ud835\udc2c \ud835\udc02\ud835\udc25\ud835\udc2e\ud835\udc2c\ud835\udc2d\ud835\udc1e\ud835\udc2b \u27aa Software aging is the most obvious reason for a Kubernetes upgrade. We are required to [&hellip;]<\/p>\n","protected":false},"author":115,"featured_media":17910,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[524,539],"tags":[],"class_list":["post-17909","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-docker-kubernetes","category-kubernetes-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>[Recap] Day 4: K8s Upgrade Cluster, Secret &amp; ETCD Encryption [CKS]<\/title>\n<meta name=\"description\" content=\"In our Certified Kubernetes Security Specialist training program, we have gone through installation of Kubernetes Dashboard, Introduction to Service Account\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/onlineappsdba.com\/index.php\/2022\/02\/15\/day-4-recap\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"[Recap] Day 4: K8s Upgrade Cluster, Secret &amp; ETCD Encryption [CKS]\" \/>\n<meta property=\"og:description\" content=\"In our Certified Kubernetes Security Specialist training program, we have gone through installation of Kubernetes Dashboard, Introduction to Service Account\" \/>\n<meta property=\"og:url\" content=\"https:\/\/onlineappsdba.com\/index.php\/2022\/02\/15\/day-4-recap\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-15T13:35:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2022\/02\/cka-day4-recap-fi.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1119\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Masroof Ahmad\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Masroof Ahmad\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/onlineappsdba.com\/index.php\/2022\/02\/15\/day-4-recap\/\",\"url\":\"https:\/\/onlineappsdba.com\/index.php\/2022\/02\/15\/day-4-recap\/\",\"name\":\"[Recap] Day 4: K8s Upgrade Cluster, Secret & ETCD Encryption [CKS]\",\"isPartOf\":{\"@id\":\"https:\/\/onlineappsdba.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/onlineappsdba.com\/index.php\/2022\/02\/15\/day-4-recap\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/onlineappsdba.com\/index.php\/2022\/02\/15\/day-4-recap\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2022\/02\/cka-day4-recap-fi.jpeg\",\"datePublished\":\"2022-02-15T13:35:58+00:00\",\"author\":{\"@id\":\"https:\/\/onlineappsdba.com\/#\/schema\/person\/909a876ed58d400faf82caf81d61bfdb\"},\"description\":\"In our Certified Kubernetes Security Specialist training program, we have gone through installation of Kubernetes Dashboard, Introduction to Service Account\",\"breadcrumb\":{\"@id\":\"https:\/\/onlineappsdba.com\/index.php\/2022\/02\/15\/day-4-recap\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/onlineappsdba.com\/index.php\/2022\/02\/15\/day-4-recap\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/onlineappsdba.com\/index.php\/2022\/02\/15\/day-4-recap\/#primaryimage\",\"url\":\"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2022\/02\/cka-day4-recap-fi.jpeg\",\"contentUrl\":\"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2022\/02\/cka-day4-recap-fi.jpeg\",\"width\":1119,\"height\":627},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/onlineappsdba.com\/index.php\/2022\/02\/15\/day-4-recap\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/onlineappsdba.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\ud835\udc03\ud835\udc1a\ud835\udc32 4 \ud835\udc11\ud835\udc1e\ud835\udc2f\ud835\udc22\ud835\udc1e\ud835\udc30 \ud835\udc1a\ud835\udc27\ud835\udc1d \ud835\udc10\/\ud835\udc00: \ud835\udc12\ud835\udc1e\ud835\udc1c\ud835\udc2e\ud835\udc2b\ud835\udc1e \ud835\udc08\ud835\udc27\ud835\udc20\ud835\udc2b\ud835\udc1e\ud835\udc2c\ud835\udc2c, \ud835\udc1a\ud835\udc27\ud835\udc1d \ud835\udc11\ud835\udc1e\ud835\udc2c\ud835\udc2d\ud835\udc2b\ud835\udc22\ud835\udc1c\ud835\udc2d \ud835\udc00\ud835\udc1c\ud835\udc1c\ud835\udc1e\ud835\udc2c\ud835\udc2c \ud835\udc2d\ud835\udc28 \ud835\udc0d\ud835\udc28\ud835\udc1d\ud835\udc1e \ud835\udc0c\ud835\udc1e\ud835\udc2d\ud835\udc1a\ud835\udc1d\ud835\udc1a\ud835\udc2d\ud835\udc1a [\ud835\udc02\ud835\udc0a\ud835\udc12]\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/onlineappsdba.com\/#website\",\"url\":\"https:\/\/onlineappsdba.com\/\",\"name\":\"\",\"description\":\"Oracle Implementation &amp; Training Experts\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/onlineappsdba.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/onlineappsdba.com\/#\/schema\/person\/909a876ed58d400faf82caf81d61bfdb\",\"name\":\"Masroof Ahmad\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/onlineappsdba.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/10f9db7bdbbd7f9ccfbe9b2d208e5978fc28315e9c704383e639a926ea0fce5f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/10f9db7bdbbd7f9ccfbe9b2d208e5978fc28315e9c704383e639a926ea0fce5f?s=96&d=mm&r=g\",\"caption\":\"Masroof Ahmad\"},\"url\":\"https:\/\/onlineappsdba.com\/index.php\/author\/masroof\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"[Recap] Day 4: K8s Upgrade Cluster, Secret & ETCD Encryption [CKS]","description":"In our Certified Kubernetes Security Specialist training program, we have gone through installation of Kubernetes Dashboard, Introduction to Service Account","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/onlineappsdba.com\/index.php\/2022\/02\/15\/day-4-recap\/","og_locale":"en_US","og_type":"article","og_title":"[Recap] Day 4: K8s Upgrade Cluster, Secret & ETCD Encryption [CKS]","og_description":"In our Certified Kubernetes Security Specialist training program, we have gone through installation of Kubernetes Dashboard, Introduction to Service Account","og_url":"https:\/\/onlineappsdba.com\/index.php\/2022\/02\/15\/day-4-recap\/","article_published_time":"2022-02-15T13:35:58+00:00","og_image":[{"width":1119,"height":627,"url":"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2022\/02\/cka-day4-recap-fi.jpeg","type":"image\/jpeg"}],"author":"Masroof Ahmad","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Masroof Ahmad","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/onlineappsdba.com\/index.php\/2022\/02\/15\/day-4-recap\/","url":"https:\/\/onlineappsdba.com\/index.php\/2022\/02\/15\/day-4-recap\/","name":"[Recap] Day 4: K8s Upgrade Cluster, Secret & ETCD Encryption [CKS]","isPartOf":{"@id":"https:\/\/onlineappsdba.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/onlineappsdba.com\/index.php\/2022\/02\/15\/day-4-recap\/#primaryimage"},"image":{"@id":"https:\/\/onlineappsdba.com\/index.php\/2022\/02\/15\/day-4-recap\/#primaryimage"},"thumbnailUrl":"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2022\/02\/cka-day4-recap-fi.jpeg","datePublished":"2022-02-15T13:35:58+00:00","author":{"@id":"https:\/\/onlineappsdba.com\/#\/schema\/person\/909a876ed58d400faf82caf81d61bfdb"},"description":"In our Certified Kubernetes Security Specialist training program, we have gone through installation of Kubernetes Dashboard, Introduction to Service Account","breadcrumb":{"@id":"https:\/\/onlineappsdba.com\/index.php\/2022\/02\/15\/day-4-recap\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/onlineappsdba.com\/index.php\/2022\/02\/15\/day-4-recap\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/onlineappsdba.com\/index.php\/2022\/02\/15\/day-4-recap\/#primaryimage","url":"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2022\/02\/cka-day4-recap-fi.jpeg","contentUrl":"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2022\/02\/cka-day4-recap-fi.jpeg","width":1119,"height":627},{"@type":"BreadcrumbList","@id":"https:\/\/onlineappsdba.com\/index.php\/2022\/02\/15\/day-4-recap\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/onlineappsdba.com\/"},{"@type":"ListItem","position":2,"name":"\ud835\udc03\ud835\udc1a\ud835\udc32 4 \ud835\udc11\ud835\udc1e\ud835\udc2f\ud835\udc22\ud835\udc1e\ud835\udc30 \ud835\udc1a\ud835\udc27\ud835\udc1d \ud835\udc10\/\ud835\udc00: \ud835\udc12\ud835\udc1e\ud835\udc1c\ud835\udc2e\ud835\udc2b\ud835\udc1e \ud835\udc08\ud835\udc27\ud835\udc20\ud835\udc2b\ud835\udc1e\ud835\udc2c\ud835\udc2c, \ud835\udc1a\ud835\udc27\ud835\udc1d \ud835\udc11\ud835\udc1e\ud835\udc2c\ud835\udc2d\ud835\udc2b\ud835\udc22\ud835\udc1c\ud835\udc2d \ud835\udc00\ud835\udc1c\ud835\udc1c\ud835\udc1e\ud835\udc2c\ud835\udc2c \ud835\udc2d\ud835\udc28 \ud835\udc0d\ud835\udc28\ud835\udc1d\ud835\udc1e \ud835\udc0c\ud835\udc1e\ud835\udc2d\ud835\udc1a\ud835\udc1d\ud835\udc1a\ud835\udc2d\ud835\udc1a [\ud835\udc02\ud835\udc0a\ud835\udc12]"}]},{"@type":"WebSite","@id":"https:\/\/onlineappsdba.com\/#website","url":"https:\/\/onlineappsdba.com\/","name":"","description":"Oracle Implementation &amp; Training Experts","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/onlineappsdba.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/onlineappsdba.com\/#\/schema\/person\/909a876ed58d400faf82caf81d61bfdb","name":"Masroof Ahmad","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/onlineappsdba.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/10f9db7bdbbd7f9ccfbe9b2d208e5978fc28315e9c704383e639a926ea0fce5f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/10f9db7bdbbd7f9ccfbe9b2d208e5978fc28315e9c704383e639a926ea0fce5f?s=96&d=mm&r=g","caption":"Masroof Ahmad"},"url":"https:\/\/onlineappsdba.com\/index.php\/author\/masroof\/"}]}},"_links":{"self":[{"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/posts\/17909","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/users\/115"}],"replies":[{"embeddable":true,"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/comments?post=17909"}],"version-history":[{"count":0,"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/posts\/17909\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/media\/17910"}],"wp:attachment":[{"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/media?parent=17909"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/categories?post=17909"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/tags?post=17909"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}