Subbu Tech Tutorialssubbutechtutorials.hashnode.dev·Oct 4, 2024K8s: ConfigMaps & SecretsWhat are ConfigMaps in K8s? A ConfigMap is an API object used to store non-confidential data in key-value pairs. Pods can consume ConfigMaps as environment variables, command-line arguments, or as configuration files in a volume. A ConfigMap allows y...Discuss·29 readsKubernetes Basics: A Beginner’s GuideKubernetes
Rohit Pagoterohitpagote.hashnode.dev·Sep 28, 2024Security in KubernetesSecurity Primitives Secure Hosts Let’s begin with the host that form the cluster itself. All access to this hosts must be secured, route access disabled, password based authentication disabled and only SSH key based authentication to be made availa...DiscussKubernetesKubernetes
Ena Vaghelaenna.hashnode.dev·Sep 13, 2024Best Practices for Kubernetes Security: Protect Your Cloud InfrastructureSecuring your Kubernetes environment is more critical than ever as cloud-native applications become the backbone of modern infrastructure. With increasing complexity and growing security threats, safeguarding your Kubernetes cluster requires a proact...DiscussKubernetes
D V Shashidhar Reddysik2912.hashnode.dev·Sep 5, 2024KubeLinter: A Comprehensive Guide to Kubernetes Manifest LintingIntroduction This guide provides detailed instructions on using KubeLinter to analyze and improve Kubernetes manifests. Covering everything from installation and basic usage to advanced integrations, this resource is designed to help users at all ski...Discusskube-linter
Abigeal Afolabiarbythecoder.hashnode.dev·Aug 16, 2024Day 26 of my 90-Day Devops: Kubernetes Secrets and Access ControlHey DevOps Enthusiasts! Today's topic is all about Kubernetes Secrets and RBAC, a powerful duo for securing sensitive data in your deployments. I've been working with these concepts extensively in past projects, and I'm excited to share it with you b...DiscussKubernetes Security
vikash kumardevopswizard.hashnode.dev·Jul 21, 2024Kubernetes Security Simplified: Protecting with API Groups and RBACHey there, Kubernetes enthusiasts! 👋 Today, we're diving into some important security topics that will help you ace the Certified Kubernetes Administrator (CKA) exam and make you a Kubernetes security expert. We'll cover API Groups, Authorization, R...DiscussCKA journeyKubernetes Security Simplified
vikash kumardevopswizard.hashnode.dev·Jul 19, 2024Everything You Need to Know About Kubernetes Certificates with KubeCorpHey there, future Kubernetes wizards! 👋 Ready to unravel the mystery of Kubernetes certificates? Don't worry if it sounds scary - we're going to break it down using a fun analogy that'll make you feel right at home. let's dive into the world of Kube...DiscussCKA journeyKubernetes certificates
Aaron Williamskubesquad.com·Jul 6, 2024Enhancing Your Career with CKS CertificationIntroduction Curious if the CKS (Certified Kubernetes Security Specialist) Certification is the right choice for you? In this blog post, I’ll share my journey in obtaining this certification and what it took to pass on my first attempt. My primary mo...Discuss·75 readsKubernetes
Joseph Tankouakouamen.hashnode.dev·Jun 24, 2024Sécurité des imagesLes images sont utilisées comme base pour le déploiement des applications conteneurisées. Prenons, par exemple, un fichier de définition de pods simple. apiVersion: v1 kind: Pod metadata: name: nginx-pod spec: containers: name: web-server ...DiscussKubernetes Security
Platform Engineersplatformengineer.hashnode.dev·Jun 21, 2024Hardening the Kubernetes Control PlaneKubernetes, a widely adopted container orchestration system, relies on a robust control plane to manage and maintain the cluster. The control plane consists of several components, including the API server, controller manager, and scheduler. Ensuring ...DiscussPlatform Engineering