Magalix Blog
The latest from Magalix on kubernetes, containers and smart DevOps.

Running Containers Securely Under Kubernetes

  When you decide to use containers for running your software, you save money, effort, and can make use of orchestration systems like Kubernetes, and that even increases your business efficiency. Howe...

Kubernetes Authentication

Kubernetes Authentication means validating the identity of who or what is issuing the request. For example, if you want to access a Linux box through SSH, the SSH daemon must verify that the username ...

Basics of Securing Your Kubernetes Cluster

  How To Approach The Security Topic? When it comes to cloud-native technologies, a lot of people fall into the trap of overlooking security. They mistakenly think that, since their application is hos...

Kubernetes RBAC 101

    Role-Based Access Control (RBAC) Overview RBAC is a security design that restricts access to valuable resources based on the role the user holds, hence the name role-based. To understand the impor...

Take the Smart Approach to Container Security, With Orchestration Tools

Although containers present many advantages over traditional VM architecture, they also come with a number of inherent risks – some of which are elevated beyond those of a conventional VM environment....

Your First Five Steps in the World of Containerization

Containers have completely changed the web development game. Ever since the release of Docker in March 2013, the concept of running services inside containers has exploded in popularity. Every time we...
1