Kubernetes

Kubernetes Authentication

...
Kubernetes Authentication

There are 3 steps that Kubernetes uses to enforce security access and permissions - Authentication, Authorization and Admission. In this article we are going to consider Authentication first. The Authentication, Authorization and Admission Control ProcessThe first thing in Authentication is Identity. IdentityKubernetes assumes that 'users' are managed outside of Kubernetes:...

...
CONTINUE READING
Kubernetes

How to Build A Kubernetes Operator

...
How to Build A Kubernetes Operator

This is the second part of our series focusing on Kubernetes Operators, and it shows how you can build a Kubernetes Operator based on the Bitnami Apache Helm chart. Note that you can refer to the steps in this tutorial to build an operator for your own applications. Prerequisites We...

...
CONTINUE READING
Kubernetes

First Steps with the Kubernetes Operator

...
First Steps with the Kubernetes Operator

This blog post demonstrates how you can use the Operator Lifecycle Manager to deploy a Kubernetes Operator to your cluster. Then, you will use the Operator to spin up an Elastic Cloud on Kubernetes (ECK) cluster. An operator is a software extension that uses custom resources (extension of the Kubernetes...

...
CONTINUE READING
Kubernetes

Kubernetes Dashboard WebUI

...
Kubernetes Dashboard WebUI

In this topic, we are going to consider the Kubernetes WebUI Dashboard. The Web User Interface allows us to browse our playground cluster and perform administrative tasks and things like that. It gives a good way to see what you have done on your playground without having to use the...

...
CONTINUE READING
Kubernetes

Kubernetes. Replication and self-healing

...
Kubernetes. Replication and self-healing

To start with, I would like to explain what does self-healing means in terms of Kubernetes. Self-healing is a fantastic feature of Kubernetes to recover from service or node failure automatically. In the following article, we will consider the benefit of using replication for your micro-services and how the Kubernetes...

...
CONTINUE READING
DevOps

Targeting Kubernetes Cluster with Gremlin Chaos Test

...
Targeting Kubernetes Cluster with Gremlin Chaos Test

Gremlin is a leading software company focusing on chaos-test in the market. It also has a tool similar to Chaos Monkey which belongs to Netflix, but is more customized to test the system with random loads or scheduled shutdowns. In the article below we will be testing a simple Kubernetes...

...
CONTINUE READING
Kubernetes

Deploying Secure Firecracker MicroVMs on K8s using Weave FireKube

...
Deploying Secure Firecracker MicroVMs on K8s using Weave FireKube

IntroductionAt their 2018 annual Re:Invent conference, AWS announced an exciting new product called "Firecracker" that is quickly setting the cloud-native ecosystem on fire. Firecracker is a Virtual Machine Manager (VMM) exclusively designed for running transient and short-lived processes. In other words, it is optimized for running functions and serverless...

...
CONTINUE READING