Kubernetes secrets play a pivotal role in securely managing and storing sensitive data. They achieve this by isolating sensitive data from code and configuration, thereby preventing unintended exposure and unauthorised access. To enhance both application security and ecosystem integrity, the integration of Secure Secrets Management Solutions into Kubernetes CI/CD deployments becomes imperative. By adhering to...
Keeping secrets secure on Kubernetes is crucial for every organization. However, it’s easier said than done.
Namespaces are a vital feature of Kubernetes. They allow you to separate uniquely named resources into logical groups, though names don’t need to be unique between different namespaces. Namespaces can enforce separation between different deployment environments, as well as divide a cluster’s resources between multiple users and groups of users using resource quotas. There are...
DevOps teams have rapidly adopted Kubernetes as the standard way to deploy and scale containers in the cloud. It provides everything you need to configure, launch, and maintain containerized workloads in distributed environments. Kubernetes is a complex system with many moving parts, however. You need to configure your deployments correctly to get the most value...
Once you start working with Kubernetes, it’s natural to think about how you can run your traditional applications inside a cluster. You might even have to work with Kubernetes for a while before you start thinking about other ways to structure your applications. But why should you restructure your applications in the first place? It’s...
Pods, deployments, and services are just some of the concepts that you need to understand in order to work with Kubernetes. They’re the main building blocks of a working Kubernetes cluster. On top of that, you’ll likely also have to learn about ConfigMaps, ingress controllers, and other functions. Even after you’re comfortable with these different resources and you’re deploying workloads...
Last week I published a blog, “How to spot gaps in your Public Cloud Kubernetes Security Posture” with the aim of providing a very high-level view of where security matters in public cloud Kubernetes. Originally I intended to provide information for people new to Kubernetes and a few people have asked for some context to...
Breaking down the core areas that you should be aware of when considering security around public cloud Kubernetes The Control Plane API Server The API server provides the entry point specifically for the management of a Kubernetes cluster. The API server endpoint is secured through public cloud IAM and also Kubernetes RBAC – however, it...
This is the story of how three Appvia Engineers contributed so much to the KOPS project that they became authorizing contributors, more commonly known as maintainers. Read about why they needed KOPs and what challenges they faced, as well as the particular changes they made for their own needs and for the needs of the...