Shaik Mustafamustafa-k8s.hashnode.dev·Dec 4, 2024ConfigMaps vs. Secrets: The Silent Heroes of Kubernetes ConfigurationsCONFIGMAPS: A ConfigMap in Kubernetes is used to store configuration data in the form of key-value pairs. This data is typically non-confidential and helps to decouple the configuration settings from the application code, eliminating hardcoded values...99 readskubernetes configmaps and secrets
Santosh Ncsantoshnc.hashnode.dev·Nov 28, 2024How to Install and Configure HashiCorp Vault on Linux (Ubuntu)HashiCorp Vault is a popular tool for securely storing and accessing secrets. Whether you’re managing database credentials, API keys, or encryption keys, Vault provides a unified interface to access secrets across different environments. In this blog...HashiCorp Vault Vault Installation Vault Configuration Secret Management DevOps Security Infrastructure as Code Linux Vault Setup System Administration IT Securit
Tanvir Sayyadtanvirali-sayyad.hashnode.dev·Nov 12, 2024Understanding the Seal and Unseal Process in HashiCorp VaultWhen learning about HashiCorp Vault, one important topic to understand is the seal and unseal process. This process is a big part of Vault’s security system. When Vault is initialized, it begins in a sealed state. This critical stage ensures that Vau...Unlock the Vault: HashiCorp Vault Certification Serieshashicorp
Subbu Tech Tutorialssubbutechtutorials.hashnode.dev·Nov 9, 2024Secrets Management in K8sUsing credentials directly in the Helm chart's values.yaml file is convenient for testing and development, but it's not recommended for production or real-world scenarios due to security risks. In real-world deployments, sensitive information like da...Kubernetes Basics: A Beginner’s GuideKubernetes
Tanvir Sayyadtanvirali-sayyad.hashnode.dev·Nov 3, 2024🔒 HashiCorp Vault Explained: Components, Architecture, and Data ProtectionVault by HashiCorp is a great tool. Its main purpose is to protect our secrets, store sensitive data and encrypt everything correctly. This guide will take you through Vault's key elements such as storage backends, secrets engines, auth methods and t...Unlock the Vault: HashiCorp Vault Certification Serieshashicorp
Amulyaawscloudbasics.hashnode.dev·Oct 23, 2024AWS Secrets Management: A Comprehensive Guide for DevOps EngineersAs a DevOps engineer, managing sensitive information securely is one of your critical responsibilities. In this comprehensive guide, we'll explore different approaches to secrets management in AWS and when to use each solution. Why is Secrets Managem...AWSAWS
Kashinath Meshramkashidevops.hashnode.dev·Oct 15, 2024Unlocking the Power of HashiCorp Vault: Your Key to Bulletproof Secrets ManagementIn today's digital landscape, where data breaches are becoming increasingly common, protecting sensitive information is paramount. Enter HashiCorp Vault - the Swiss Army knife of secrets management. In this comprehensive guide, we'll dive deep into V...Security
Yilia Linapi7.hashnode.dev·Oct 10, 2024API7 Enterprise v3.2.16: Integrated Secret ProvidersIn API7 Enterprise, you may store a large amount of sensitive information, such as SSL certificates and private keys, usernames and passwords of consumer authentication credentials, and that required by certain plugins to connect to external systems....Security
Engin Diriblog.ediri.io·Oct 6, 2024Advanced Secret Management on Kubernetes with Pulumi: External Secrets OperatorTL;DR Le code https://github.com/dirien/quick-bites Introduction This article is part three of my series on secret management on Kubernetes with the help of Pulumi. In my first article, we talked about the Sealed Secrets controller. The second arti...77 readsAdvanced Secret Management on KubernetesPulumi
Mahira Technology Private Limitedmahiratechnology.hashnode.dev·Oct 3, 2024Accessing Secrets Using Cross Account Role between Two AWS Accounts.Introduction :- In the world of cloud computing, managing secrets across different #AWS accounts can be a challenging task. However, by using cross-account roles, we can simplify this process and enhance security. This blog post will guide you throug...AWS