Gartner Report - Market Guide for Cloud Workload Protection Platforms (CWPP) Download Report >
{ .link_text }}
Kubernetes Namespaces Demystified - How To Make The Most of Them

Kubernetes Namespaces Demystified - How To Make The Most of Them

Kubernetes namespaces are a central part of how we structure, deploy, and manage containers today. However, namespaces are not a new concept; in fact, Linux namespaces were introduced in 2002 and designed to separate and group individual processes and capabilities. So how did the idea grow to be used in the robust fashion it is used today? This blog will review; What is a Namespace? What makes Kubernetes Namespace different?

Top Kubernetes Certifications and Why They Matter

Top Kubernetes Certifications and Why They Matter

Why Kubernetes? When containers first broke onto the scene, it was immediately apparent that it was a disruptive technology. What was not clear was how containers were going to be scaled and orchestrated effectively. In the early days, the container orchestration competition was intense, with applications such as Docker Swarm, Apache Mesos, and Kubernetes aiming to address this issue. However, in the last six years, Kubernetes has differentiated itself and pulled away as the clear container orchestration choice.

Demystifying DevSecOps - Everything You Must Know to Get it Right

Demystifying DevSecOps - Everything You Must Know to Get it Right

The rapid emergence of modern software development initiatives, public cloud services, and cloud-native tools such as Kubernetes and containers has accelerated the seminal move towards DevOps practices. DevOps has come to reflect a culture that champions principles such as increased collaboration, shared responsibility between engineering teams that spans development and operations, removal of operational silos, and autonomous decision-making, all in the spirit of achieving greater speed and consistency. DevOps relies on methodologies that leverage automation, continuous integration and delivery, and treating infrastructure and application components as immutable.

DevOps vs. DevSecOps - Here’s How They Fit Together

DevOps vs. DevSecOps - Here’s How They Fit Together

DevOps, DevSecOps, shift-left, security posture, cloud native, etc. Chances are you’ve heard these terms or similar buzzwords when discussing modern application development life cycles. These new industry words can be beneficial – by providing a framework that explains complex processes – or harmful through misuse or overuse. Whether misuse is intentional or not, a buzzword can convey a context that the user doesn’t truly represent. DevOps and DevSecOps are examples of terms that are often negatively received due to both their overuse and misuse.

What is KubeLinter?

What is KubeLinter?

What is KubeLinter? The KubeLinter is an open-source command-line interface to identify misconfigurations in Kubernetes objects. KubeLinter offers the ability to integrate checks on Kubernetes YAML files and Helm charts before deployment into a Kubernetes cluster. With 19 standard built-in checks and the room to configure your own, you get immediate feedback about misconfigurations and Kubernetes security violations. How Do I Use It? KubeLinter requires very minimal configuration and is used by executing commands in your command-line shell.

EKS vs GKE vs AKS - Evaluating Kubernetes in the Cloud

EKS vs GKE vs AKS - Evaluating Kubernetes in the Cloud

Providing an update on the core Kubernetes services offered by the big three We are now six years past the initial release of Kubernetes, and it continues to be one of the fastest-growing open-source projects to date. The rapid development and adoption of Kubernetes have resulted in many different implementations of the application. The Cloud Native Computing Foundation (CNCF) currently lists over 90 Certified Kubernetes offerings. To ensure some consistency between platforms, the CNCF focuses on three core tenets;

Part 4 - Rancher Kubernetes Engine (RKE) Security Best Practice for Cluster Maintenance and Network Security

Part 4 - Rancher Kubernetes Engine (RKE) Security Best Practice for Cluster Maintenance and Network Security

Rancher Kubernetes Engine (RKE) Security Best Practice for Cluster Maintenance and Network Security This is the last installment in our four-part RKE security blog series. Don’t forget to get caught up on everything you missed! Part 1 - Rancher Kubernetes Engine (RKE) Security Best Practices for Cluster Setup Part 2 - Rancher Kubernetes Engine (RKE) Security Best Practices for Authentication, Authorization, and Cluster Access Part 3 - Rancher Kubernetes Engine (RKE) Security Best Practice for Container and Runtime Security

Part 3 - Rancher Kubernetes Engine (RKE) Security Best Practice for Container and Runtime Security

Part 3 - Rancher Kubernetes Engine (RKE) Security Best Practice for Container and Runtime Security

Rancher Kubernetes Engine (RKE) Security Best Practice for Container and Runtime Security This is the third installment in our four-part RKE security blog series. Don’t forget to follow along to our upcoming posts and get caught up on everything you missed! Part 1 - Rancher Kubernetes Engine (RKE) Security Best Practices for Cluster Setup Part 2 - Rancher Kubernetes Engine (RKE) Security Best Practices for Authentication, Authorization, and Cluster Access

Part 2 - Rancher Kubernetes Engine (RKE) Security Best Practices for Authentication, Authorization, and Cluster Access

Part 2 - Rancher Kubernetes Engine (RKE) Security Best Practices for Authentication, Authorization, and Cluster Access

Rancher Kubernetes Engine (RKE) Security Best Practices for Authentication, Authorization, and Cluster Access This is the second installment in our four-part RKE security blog series. Don’t forget to follow along to our upcoming posts in the series: Part 1 - Rancher Kubernetes Engine (RKE) Security Best Practices for Cluster Setup Part 2 - Rancher Kubernetes Engine (RKE) Security Best Practices for Authentication, Authorization, and Cluster Access Part 3 - Rancher Kubernetes Engine (RKE) Security Best Practice for Container and Runtime Security

Part 1 - Rancher Kubernetes Engine (RKE) Security Best Practices for Cluster Setup

Part 1 - Rancher Kubernetes Engine (RKE) Security Best Practices for Cluster Setup

Rancher Kubernetes Engine (RKE) Security Best Practices for Cluster Setup This is the first installment in our four-part RKE security blog series. Don’t forget to follow along to our upcoming posts in the series: Part 1 - Rancher Kubernetes Engine (RKE) Security Best Practices for Cluster Setup Part 2 - Rancher Kubernetes Engine (RKE) Security Best Practices for Authentication, Authorization, and Cluster Access Part 3 - Rancher Kubernetes Engine (RKE) Security Best Practice for Container and Runtime Security

CKS Certification Study Guide: Monitoring, Logging, and Runtime Security

CKS Certification Study Guide: Monitoring, Logging, and Runtime Security

Previous Sections This is the sixth installment in our six-part CKS Certification series. Don’t forget to check out all the posts in the series: Part 1 - CKS Certification Study Guide: Cluster Setup in Kubernetes Part 2 - CKS Certification Study Guide: Cluster Hardening Part 3 - CKS Certification Study Guide: System Hardening in Kubernetes Part 4 - CKS Certification Study Guide: Minimize Microservice Vulnerabilities Part 5 - CKS Certification Study Guide: Supply Chain Security Part 6 - CKS Certification Study Guide: Monitoring, Logging, and Runtime Security CKS CNCF Announcement and Exam Study This blog references tools to set up a Kubernetes version 1.