WEBINAR: On August 10th, 2020, join us to learn how to solve Capacity Management on Kubernetes.

Exit icon Register
Magalix Blog
The latest from Magalix on kubernetes, containers and smart DevOps.

Mohamed Ahmed

Founder & CEO who lives another day to inspire people & transforming markets.

Running Containers Securely Under Kubernetes

  When you decide to use containers for running your software, you save money, effort, and can make use of orchestration systems like Kubernetes, and that even increases your business efficiency. Howe...

Kubernetes Authentication

Kubernetes Authentication means validating the identity of who or what is issuing the request. For example, if you want to access a Linux box through SSH, the SSH daemon must verify that the username ...

Kubernetes Authorization

  The role of kubernetes authorization is important, While authentication refers to validating the identity of a specific subject to decide whether or not it could be granted access, authorization han...

Basics of Securing Your Kubernetes Cluster

  How To Approach The Security Topic? When it comes to cloud-native technologies, a lot of people fall into the trap of overlooking security. They mistakenly think that, since their application is hos...

Kubernetes Observability: Log Aggregation Using ELK Stack

Logging In The Cloud-Native Age In the old days, all components of your infrastructure were well-defined and well-documented. For example, a typical web application could be hosted on a web server and...

Cloud-Native Logging And Monitoring Pattern

  The Need For Observability in The Cloud-Native World Any system that runs without exposing the necessary information about its health, the status of the applications running inside it, and whether o...

Defining Cloud-Native Apps (And Why You Should Care)

We all know what Cloud Computing means, But what about “native”? According to Merriam-Webster, “native” can be defined as “inborn, innate”. So, cloud-native apps can roughly be identified as software ...