Saurabh Adhaudevopsvoyager.hashnode.dev·Oct 18, 2024Configuring OIDC Provider with AWS Account to Access S3 Bucket from a Kubernetes Pod Using AWS Management ConsoleIntroduction Accessing AWS resources securely from applications running in Kubernetes is a common requirement. By using AWS IAM Roles for Service Accounts (IRSA) and OpenID Connect (OIDC), you can grant fine-grained permissions to your Kubernetes pod...Discuss·10 likesAWSAWS
Rahul Vadakkiniyilrahulvadakkiniyil.hashnode.dev·Oct 7, 2024Day 23/24/25 of 40daysofkubernetes : Kubernetes RBAC ExplainedIntroduction In this blog, we will explore how we can authorize our new user (learner) to interact with cluster resources using RBAC, with hands-on examples. Let's get started. What is RBAC? Role-Based Access Control (RBAC) in Kubernetes is a method ...Discuss#40daysofkubernetes
Mahira Technology Private Limitedmahiratechnology.hashnode.dev·Oct 3, 2024Accessing Secrets Using Cross Account Role between Two AWS Accounts.Introduction :- In the world of cloud computing, managing secrets across different #AWS accounts can be a challenging task. However, by using cross-account roles, we can simplify this process and enhance security. This blog post will guide you throug...DiscussAWS
sowmya surekha manukondaforSAP MDG | Team Blogssapmdg.hashnode.dev·Oct 2, 2024SAP MDG: How to make Roles default for Customer & Supplier Change Request TypeScenario: Process: Create a Class Method – DERIVE_DATA Code: METHOD if_mdg_bs_bp_access_handler~derive_data. DATA : lv_crtype TYPE usmd_crequest_type, lt_bp_role TYPE TABLE OF /mdgbp/_s_bp_pp_bp_role, ls_bp_role...DiscussGod
linhbqforSRE Tribeblogs.sretribe.net·Sep 6, 2024ConfigMap, Secret and Role, RoleBinding and ServiceAccount replication for KubernetesThis repository contains a custom Kubernetes controller that can be used to make secrets and config maps available in multiple namespaces. Contents Deployment Using Helm Manual Usage "Role and RoleBinding replication "Push-based" replication ...Discussrolebinding
Mahira Technology Private Limitedmahiratechnology.hashnode.dev·Sep 3, 2024Snowflake Secrets: Mastering Role Creation and User Grants via TerraformOverview :- Snowflake, a cloud-based data warehousing platform, has become increasingly popular for its scalability and flexibility. One of the key aspects of managing a Snowflake environment is setting up proper access controls through roles and use...Discusssnowflake
EniolaMercyeniolamercy.hashnode.dev·Aug 25, 2024How to Start Your Tech Journey Without Prior KnowledgeSo, you’re interested in tech but unsure where to begin. What should you do first? Hi there. My name is Eniolamercy. Consider this article a simple guide based on my personal experience to help you transition into the tech space. Everything here is w...Victor Fawole and 2 others are discussing this3 people are discussing thisDiscuss·35 likes·381 readstechnology
Dinesh Kumar Kblog.dineshcloud.in·Aug 25, 2024Ansible - RolesOne of its core features is Ansible Roles, which help in organizing playbooks and reusable components efficiently. In this post, I’ll walk you through creating a simple Ansible role to install and configure Apache. Step 1: Initialize the Ansible Role...Discuss·46 readsDevOpsansible
Dinesh Kumar Kblog.dineshcloud.in·Aug 5, 2024Jenkins Role-based Authorization StrategyJenkins, by default, provides a basic level of access control through its built-in security options, but for more granular control, you’ll need to use the Role-based Authorization Strategy plugin. This plugin allows you to define roles with specific ...DiscussDevOpsJenkins
Nikunj Vaishnavdevcloudjourney.hashnode.dev·Jul 6, 2024AWS IAM: Manage Identity and Access EasilyHello, tech enthusiasts! Today, we're diving into the world of AWS and exploring one of its fundamental services: AWS Identity and Access Management (IAM). If you're managing AWS resources, securing access with IAM is a must. Let’s break it down step...Discuss·30 readsAWS Cloud2Articles1Week