Magalix Blog
The latest from Magalix on kubernetes, containers and smart DevOps.

Extending the Kubernetes Controller

  Kubernetes Controllers Overview At the core of Kubernetes itself, there is a large set of controllers. A controller en...

The Configuration Template Pattern

  Injecting external configuration data to containerized application is a crucial requirement. You can seldom find an application that does not accept (or require) customization that alters its behavi...

Unchangeable Configuration Pattern

  When there is a need to inject external data to a Kubernetes Pod, we use environment variables, ConfigMaps, and Secrets. Each method has its own use-case scenario and best practice. However, you som...

The ConfigMap Pattern

    In one of our articles, we discussed the environment variable pattern; how to define them, where to use them and their potential drawbacks. We briefly touched the configMap and Secrets resources a...

Kubernetes Service Catalog 101

  What is a Service Catalog and why you may need to use it? As a Kubernetes user/operator, you’ve dealt with a lot of resources to provision different components of your infrastructure. You’ve used re...

Kubernetes RBAC 101

    Role-Based Access Control (RBAC) Overview RBAC is a security design that restricts access to valuable resources based on the role the user holds, hence the name role-based. To understand the impor...

Kubernetes Secrets 101

  What is a Kubernetes Secret? There are many times when a Kubernetes Pod needs to use sensitive data. Think for examples of: SSH keys Database passwords OAuth tokens API keys Image registry keys Kube...
1 2 3 4 5