Open in app

Sign In

Write

Sign In

Sylia CHIBOUB
Sylia CHIBOUB

223 Followers

Home

About

Jun 13

Kubernetes Series: Explaining ConfigMaps with Practical Examples

Introduction This article aims at explaining the Kubernetes ConfigMap objects through a set of practical examples. ConfigMaps A ConfigMap is an k8s API object used to store non-confidential data in key-value pairs. It aims at making applications easily portable through decoupling their environment-specific configuration. [1]

Kubernetes

7 min read

Kubernetes Series: Explaining ConfigMaps with Practical Examples
Kubernetes Series: Explaining ConfigMaps with Practical Examples
Kubernetes

7 min read


Published in

Cloud Native Daily

·Jun 8

Kubernetes Series: Control Pods Traffic with Network Policies

Explaining k8s NetworkPolicies resources, Pod isolation based on network traffic types, a NetworkPolicy manifest and NetworkPolicy fields with some practical examples — Introduction This article covers the k8s Network Policies. Section 1 explains k8s NetworkPolicies resources, Section 2 goes through Pod isolation based on network traffic types. Section 3 illustrates a NetworkPolicy manifest and finally Section 4 details NetworkPolicy fields with some practical examples.

Kubernetes

7 min read

Kubernetes Series: Control Pods Traffic with Network Policies
Kubernetes Series: Control Pods Traffic with Network Policies
Kubernetes

7 min read


Jun 7

Kubernetes Series: Securing Access to the k8s API through RBAC

Introduction This article covers the k8s Role-based access control (RBAC). It is a continuation of two previous articles of the k8s series: Kubernetes Series: Managing Normal Users Access to the k8s API Managing ServiceAccounts Access to the k8s API Section 1 explains k8s RBAC resources, Section 2 and 3 describe how…

Kubernetes

10 min read

Kubernetes Series: Securing Access to the k8s API through RBAC
Kubernetes Series: Securing Access to the k8s API through RBAC
Kubernetes

10 min read


Jun 6

Kubernetes Series: Managing ServiceAccounts Access to the k8s API

Introduction This article covers the k8s API Access Control . Section 1 gives an overview of the Kubernetes API and Access Control functioning. Section 2 presents the kubeconfig file structure. Furthermore, Section 3 illustrates the creation of serviceAccounts and their associated tokens on k8s. Finally, this article ends with a conclusion. 1. API Server Overview …

Kubernetes

10 min read

Kubernetes Series: Managing ServiceAccounts Access to the k8s API
Kubernetes Series: Managing ServiceAccounts Access to the k8s API
Kubernetes

10 min read


Jun 5

Kubernetes Series: Managing Normal Users Access to the k8s API

Introduction This article covers the k8s API Access Control . Section 1 gives an overview of the Kubernetes API and Access Control functioning. Section 2 presents the kubeconfig file structure. Furthermore, Section 3 illustrates the creation of normal users on k8s. Finally, this article ends with a conclusion. 1. API Server Overview Kubernetes (k8s) in…

Cka

9 min read

Kubernetes Series: Managing Normal Users Access to the k8s API
Kubernetes Series: Managing Normal Users Access to the k8s API
Cka

9 min read


Published in

Level Up Coding

·Mar 30

Kubernetes Series: Getting practical with the Kubernetes API

Introduction This articles explains the structure and the functioning of Kubernetes API. Section 1 gives an overview of the Kubernetes API. Section 2 explains the requirements needed to follow up with this article . Furthermore, Section 3 explains the Kubernetes API terminology. Moreover, Section 4 goes up through some practical examples…

Kubernetes

13 min read

Kubernetes Series: Getting practical with the Kubernetes API
Kubernetes Series: Getting practical with the Kubernetes API
Kubernetes

13 min read


Published in

Level Up Coding

·Mar 15

Kubernetes Series: Helm Charts Overview

Introduction This guide walks through the basic concepts of Helm needed to start deploying applications on a Kubernetes cluster. It covers the basic usage patterns of the helm client, including creating, installing, searching, updating, upgrading, rollingback and uninstalling Helm Charts. General Concepts According to Helm Documentation. Helm is a package manager for Kubernetes…

Kubernetes

10 min read

Kubernetes Series: Helm Charts Overview
Kubernetes Series: Helm Charts Overview
Kubernetes

10 min read


Published in

Level Up Coding

·Feb 20

Cryptography Part II : Public Key Infrastructure

Introduction The major difficulty in Public Key Cryptography (known as PKC or Asymmetric Cryptography ) is to reliably trust the authenticity of the exchanged encryption information (public key, encryption function etc) . Since these information are typically transmitted over unsecured channels (i.e the internet) [1]. First, In order for the PKC…

Pki

12 min read

Cryptography Part II : Public Key Infrastructure
Cryptography Part II : Public Key Infrastructure
Pki

12 min read


Published in

Level Up Coding

·Feb 16

Cryptography Part I : The Basics

Introduction Entities have a legitimate need to not only encrypt their communication but also, verify the authenticity of individuals they communicate with and ensure the integrity of their exchanged messages. This is achieved through cryptography. 1. Cryptography Cryptography is a set of methods with a fundamental objective of enabling two entities usually referred…

Cryptography

7 min read

Cryptography Part I : The Basics
Cryptography Part I : The Basics
Cryptography

7 min read


Sep 27, 2021

Prometheus: Continuous Monitoring of SSL Certificates

Introduction Having a complete continious monitoring solution is crucial as it provides real-time feedback on the overall health of IT infrastructure including networks, applications and services deployed in the cloud or on-premises. …

Prometheus

3 min read

Prometheus: Continuous Monitoring of SSL Certificates
Prometheus: Continuous Monitoring of SSL Certificates
Prometheus

3 min read

Sylia CHIBOUB

Sylia CHIBOUB

223 Followers

Supporting Open Source and Cloud Native as a DevOps Engineer

Following
  • Parul Pandey

    Parul Pandey

  • Florian Hussonnois

    Florian Hussonnois

  • Matthew Stewart, PhD

    Matthew Stewart, PhD

  • Ryan Holiday

    Ryan Holiday

  • Mariah Ador

    Mariah Ador

See all (28)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams