Magalix Blog
The latest from Magalix on kubernetes, containers and smart DevOps.

Unchangeable Configuration Pattern

  When there is a need to inject external data to a Kubernetes Pod, we use environment variables, ConfigMaps, and Secret...

The ConfigMap Pattern

    In one of our articles, we discussed the environment variable pattern; how to define them, where to use them and their potential drawbacks. We briefly touched the configMap and Secrets resources a...

Kubernetes Service Catalog 101

  What is a Service Catalog and why you may need to use it? As a Kubernetes user/operator, you’ve dealt with a lot of resources to provision different components of your infrastructure. You’ve used re...

Kubernetes RBAC 101

    Role-Based Access Control (RBAC) Overview RBAC is a security design that restricts access to valuable resources based on the role the user holds, hence the name role-based. To understand the impor...

Kubernetes Secrets 101

  What is a Kubernetes Secret? There are many times when a Kubernetes Pod needs to use sensitive data. Think for examples of: SSH keys Database passwords OAuth tokens API keys Image registry keys Kube...

Kubernetes Configuration Management 101

    What Configuration Management is and Why You Should Implement it in Your infrastructure Wikipedia defines Configuration Management as “a systems engineering process for establishing and maintainin...

Kubernetes Patterns : Environment Variables Configuration Pattern

  Each and every application out there needs external configuration at some point. For example, the error verbosity level of a PHP script, the output format of a Python Flask API (XML or JSON), the co...