WEBINAR: On August 10th, 2020, join us to learn how to solve Capacity Management on Kubernetes.

Exit icon Register
Magalix Blog
The latest from Magalix on kubernetes, containers and smart DevOps.

Running Containers Securely Under Kubernetes

  When you decide to use containers for running your software, you save money, effort, and can make use of orchestration...

Kubernetes Authentication

Kubernetes Authentication means validating the identity of who or what is issuing the request. For example, if you want to access a Linux box through SSH, the SSH daemon must verify that the username ...

Kubernetes Authorization

  The role of kubernetes authorization is important, While authentication refers to validating the identity of a specific subject to decide whether or not it could be granted access, authorization han...

Basics of Securing Your Kubernetes Cluster

  How To Approach The Security Topic? When it comes to cloud-native technologies, a lot of people fall into the trap of overlooking security. They mistakenly think that, since their application is hos...

Kubernetes Observability: Log Aggregation Using ELK Stack

Logging In The Cloud-Native Age In the old days, all components of your infrastructure were well-defined and well-documented. For example, a typical web application could be hosted on a web server and...

Kubernetes Automatic Scaling

  What is Scaling? Scaling means the practice of adapting your infrastructure to new load conditions. If you have more load, you scale up to enable the environment to respond swiftly/on-time and avoid...

Extending the Kubernetes Controller

  Kubernetes Controllers Overview At the core of Kubernetes itself, there is a large set of controllers. A controller ensures that a specific resource is (and remains) at the desired state dictated by...
2 3 4 5 6