Not rendering correctly? View this email as a web page here.

Have your say! Help us build the next iteration of Magalix

Hey there,

Got 1 hour of free time to make $50? If you're in DevOps, work with Kubernetes and other cloud-native tools, and can spare an hour of your time, we'll reimburse you for feedback on the next version of our product.

👉Sign up here👈

This week over on the Magalix Blog, we took a deep dive into Kubernetes Authentication and Authorization, the difference between the two, and how and why they're used. Check that out below the fold. Thanks for reading!

Screenshot 2020-01-23 20.37.45

Kubernetes Authorization

The role of kubernetes authorization is important, While authentication refers to validating the identity of a specific subject to decide whether or not it could be granted access, authorization handles what follows that access. Using authorization mechanisms, you can fine-tune who has access to which resources on your Kubernetes cluster. In this article, we will be discussing the Role-Based Access Control (RBAC) and how you can use it to secure your cluster.


Authentication 2

Kubernetes Authentication

Kubernetes Authentication means validating the identity of who or what is issuing the request. For example, if you want to access a Linux box through SSH, the SSH daemon must verify that the username and password you are using for login matches an account that lives in /etc/passwd and /etc/shadow files. For them to be Combined together, those files represent the authentication database for Linux. On the other hand, authorization refers to what you are allowed to do once you gain access..


From the K8s Community

Build a highly scalable dashboard that runs on Kubernetes

This article is part of a larger project. If you are also interested in scalable web scraping or how we prepared the data with Natural Language Processing based on Spark, packaged the code in Docker and deployed it via Kubernetes, you will find corresponding links at the end of the article.

Read More....

Top 12 Kubernetes Security Best Practices for 2020

One of the most important developments in Information Technology is clearly the rapid increase of companies deploying Kubernetes and Docker Containers.

However, with this rapid increase comes a significant number of organizations not clearly managing their container environments. This poor oversight can lead to numerous container threats that increase the risks for your organization.


Container Security Rises to Meet the Challenges of Container Vulnerabilities

Container technology has quickly become ubiquitous in the IT industry, with most companies having adopted container technology on some level or contemplating adopting it soon. A survey by Portworx and Aqua Security discovered that 87 percent of IT professionals surveyed (up from 67 percent the previous year) were running container technologies in some capacity, with over 90 percent of them running in production. The trend toward container adoption continues to accelerate as enterprises and DevOps teams are increasingly seduced by the lightweight and agile nature of a cloud-native model that supports continuous integration and deployment (CI/CD) and microservices architecture.

Read More....

CNCF Annual Report Shows Kubernetes Growth

An annual report published today by the Cloud Native Computing Foundation (CNCF) suggests the pool of IT professionals who have Kubernetes expertise is expanding.

The number of IT professionals participating in a Kubernetes Massively Open Online Course (MOOC) offered by CNCF reached 98,000 enrollments in 2019, while a Certified Kubernetes Administrator (CKA) training program reached 12,950 enrollments. At the same time, there were 5,754 Certified Kubernetes Application Developer (CKAD) exam registrations and 5,247 Kubernetes Certified Service Provider (KCSP) exam registrations.

Read More....

If there is something you want us to include in a newsletter please send it to

Ready to understand more about your K8s clusters? Check us out at the Azure and GCP Marketplaces below.

Azure GCP marketplace

Find us on GitHub github_PNG58