WEBINAR: On August 10th, 2020, join us to learn how to solve Capacity Management on Kubernetes.

Exit icon Register
Magalix Blog
The latest from Magalix on kubernetes, containers and smart DevOps.

Running Containers Securely Under Kubernetes

  When you decide to use containers for running your software, you save money, effort, and can make use of orchestration...

Kubernetes Authentication

Kubernetes Authentication means validating the identity of who or what is issuing the request. For example, if you want to access a Linux box through SSH, the SSH daemon must verify that the username ...

Kubernetes Authorization

  The role of kubernetes authorization is important, While authentication refers to validating the identity of a specific subject to decide whether or not it could be granted access, authorization han...

Improving Capacity Management in Kubernetes Clusters: Q&A With Mohamed

This article was originally published at https://www.infoq.com/news/2020/01/Kubernetes-Capacity-Management/ InfoQ recently spoke with Mohamed Ahmed, the co-founder and CEO of Magalix, a Kubernetes opt...

Basics of Securing Your Kubernetes Cluster

  How To Approach The Security Topic? When it comes to cloud-native technologies, a lot of people fall into the trap of overlooking security. They mistakenly think that, since their application is hos...

Kubernetes Observability: Log Aggregation Using ELK Stack

Logging In The Cloud-Native Age In the old days, all components of your infrastructure were well-defined and well-documented. For example, a typical web application could be hosted on a web server and...

Cloud-Native Logging And Monitoring Pattern

  The Need For Observability in The Cloud-Native World Any system that runs without exposing the necessary information about its health, the status of the applications running inside it, and whether o...