Container Security

Container Security

ChallengesTraditional tools aren't fit to secure containers (and kubernetes): too heavy handed such, e.g., EDR, vulnerability scanners, hostbased firewalls, network forensics, security analytics.Alternative dedicated lightweight tools are being

Kubernetes (CKA/S) certifications

Kubernetes (CKA/S) certifications

⚠️ This information might have changed in newer versions of the certification examsIntroductionThe Linux foundation provides quite a few certifications and some of the most looked after are related to Kubernetes.

Docker

Docker

Getting startedImages are the blueprint to instantiate containers that are built, run, and distributed by the Docker Daemon, which used via a Docker Client and pull images from a registry

Kubernetes

Kubernetes

The most used container orchestration tool for deployment, scaling, and maintenance in the cloud. Notes are living documents and will change over time 🌱

Helm

Helm

The package manager for Kubernetes, e.g. helm install wpdemo stable/wordpress helm status wpdemo NAME: wpdemo LAST DEPLOYED: May 25 15:06:44 2020 NAMESPACE: default STATUS: deployed REVISION:

K8s Admin

K8s Admin

Administration and common tasks on Kubernetes clusters

Vagrant

Vagrant

IntroA cross-platform tool created by Hashicorp to make configuring and sharing VMs easy by automating VM management with an end-to-end lifecycle management utility. Core benefits of VMs are reproducible environment,