Podman

Podman for Docker Users

...
Podman for Docker Users

Podman is the command-line interface tool that lets you interact with Libpod, a library for running and managing OCI-based containers. It is important to note that Podman doesn't depend on a daemon, and it doesn't require root privileges. The first part of this tutorial focuses on similarities between Podman and...

...
CONTINUE READING
Security

Kubernetes Authorization and RBAC

...
Kubernetes Authorization and RBAC

Authorization Modes Kubernetes supports the following authorization modes: Attribute-Based Access Control: An authorizer through which access rights are granted to users through policies combining attributes (resources attributes, user attributes, objects, etc.)Node Authorization: A special-purpose authorizer that grants permissions to kubelets based on the pods they are scheduled to run...

...
CONTINUE READING
Kubernetes

Configure Kubernetes Network with Flannel

...
Configure Kubernetes Network with Flannel

Introduction Network overlays in Kubernetes clusters are used to address containers, pods, services and external client connectivity.  Overlays are software components that decouple the physical infrastructure from networking services. Overlays encapsulate a packet-within-a-packet to achieve connectivity and routing. An overlay is a virtual network serving on the underlying network or...

...
CONTINUE READING
DevOps

Explaining Microservices and Service Mesh with Istio

...
Explaining Microservices and Service Mesh with Istio

Application builds when broken down into multiple smaller service components, are known as Microservices. When compared to the traditional Monolithic way, a Microservice Architecture treats each microservice as a standalone entity/module, essentially helping to ease the maintenance of its code and related infrastructure. Each microservice of an application can...

...
CONTINUE READING
CI/CD

GitHub Actions: Testing, Building and Notifying

...
GitHub Actions: Testing, Building and Notifying

In a previous article, we discussed How to improve your CI/CD workflow using GitHub Actions. Today we are going a step further. We will work with some additional actions to test our application, before submitting the Docker image and sending a notification to a Slack channel. First of all,...

...
CONTINUE READING
Terraform

Configuring bare-metal Packet servers with cloud-init

...
Configuring bare-metal Packet servers with cloud-init

IntroductionOftentimes there will be cases where you will want to automate the provisioning and configuration of your Packer bare-metal infrastructure. There are a plethora of tools out there, however, cloud-init is an industry-standard that is used to initialize and configure instances with user-data. What is Terraform?Terraform is an Infrastructure-as-code...

...
CONTINUE READING
Cloud-init

Configuring Digital Ocean droplets with cloud-init

...
Configuring Digital Ocean droplets with cloud-init

IntroductionOftentimes there will be cases where you will want to automate the provisioning and configuration of your Digital Ocean droplets. There are a plethora of tools out there, however, cloud-init is an industry-standard that is used to initialize and configure instances with user-data. What is Terraform?Terraform is an Infrastructure-as-code...

...
CONTINUE READING
CI/CD

CI/CD Pipeline Using Jenkins, Git and Maven

...
CI/CD Pipeline Using Jenkins, Git and Maven

Development and release management of a software/application can become a complicated process, especially when deployment infrastructure grows. CI and CD process allows developers to integrate the development work and helps to catch bugs/errors as early as possible. In this guide, we will deploy an application using Jenkins, Maven,...

...
CONTINUE READING
Kubernetes

Kubernetes Authentication

...
Kubernetes Authentication

There are 3 steps that Kubernetes uses to enforce security access and permissions - Authentication, Authorization and Admission. In this article we are going to consider Authentication first. The Authentication, Authorization and Admission Control ProcessThe first thing in Authentication is Identity. IdentityKubernetes assumes that 'users' are managed outside of Kubernetes:...

...
CONTINUE READING