HomeAboutNew StorySign In

Welcome to Kube.news

Technical / Guide to Kubernetes Egress Network Policies

By Viswajith Venugopal

Published by :Kube Admin

Network policies are used in Kubernetes to specify how groups of pods are allowed to communicate with each other and with external network endpoints. They can be thought of as the Kubernetes equivalent of a firewall. As with most Kubernetes objects, network policies are extremely flexible and powerful – if you know the exact communications patterns of the services in your application, you can use network policies to restrict communications to exactly what’s required and nothing more.
Technical / Setup and Deploy Vitess on Kubernetes (Minikube) for MySQL – Part III of III

By Alkin Tezuysal

Published by :Kube Admin

In this blog post, we will continue to explore Vitess and test an example database provided in its repository. This is Part III.
Technical / Tutorial: How to use Kubernetes Secrets for storing sensitive config data

By Abhishek Gupta

Published by :Kube Admin

In this post, we will explore Kubernetes Secrets and how they can be used to store sensitive configuration data which needs to be handled securely e.g. database credentials, API keys etc.
Technical / Templating YAML in Kubernetes with real code

By Daniele Polencic

Published by :Kube Admin

TL;DR: You should use tools such as yq and kustomize to template YAML resources instead of relying on tools that interpolate strings such as Helm.

Published by :Kube Admin

Kubernetes livenessProbe can be dangerous. I recommend to avoid them unless you have a clear use case and understand the consequences. This post looks at both Liveness and Readiness Probes and describes some "DOs" and "DON'Ts"
Technical / Monitoring blocked and passthrough external service traffic

Published by :Kube Admin

Understanding, controlling and securing your external service access is one of the key benefits that you get from a service mesh like Istio. From a security and operations point of view, it is critical to monitor what external service traffic is getting blocked as they might surface possible misconfigurations or a security vulnerability if an application is attempting to communicate with a service that it should not be allowed to. Similarly, if you currently have a policy of allowing any external service access, it is beneficial to monitor the traffic so you can incrementally add explicit Istio configuration to allow access and better security your cluster. In either case, having visibility into this traffic via telemetry is quite helpful as it enables you to create alerts and dashboards, and better reason about your security posture. This was a highly requested feature by production users of Istio and we are excited that the support for this was added in release 1.3.
Technical / A Practical Guide to Setting Kubernetes Requests and Limits

Published by :Kube Admin

Setting Kubernetes requests and limits effectively has a major impact on application performance, stability, and cost. And yet working with many teams over the past year has shown us that determining the right values for these parameters is hard. For this reason, we have created this short guide and are launching a new product to help teams more accurately set Kubernetes requests and limits for their applications.
Technical / Upgrade to Istio 1.3 using the operator with ease

By Zsolt Varga

Published by :Kube Admin

In this post, we’ll be outlining how to easily upgrade Istio control planes to 1.3 with the Banzai Cloud Istio operator, within a single-mesh multi-cluster topology or across a multi-cloud or hybrid-cloud service mesh.
Technical / What is a Service Mesh?

By Matthew Casperson / Octopus

Published by :mcasperson

If you have used Kubernetes for any length of time, you will have heard the term Service Mesh. Several big companies are backing service mesh projects, such as Google with Istio and the Cloud Native Computing Foundation with Linkerd. So what is a Service Mesh, and how is it different from the standard Service and Ingress resources native to Kubernetes?
Technical / Kubernetes Web UIs

By Henning Jacobs

Published by :Kube Admin

This post takes a look at different open source Kubernetes web UIs.
Technical / Least Privilege in Kubernetes Using Impersonation

Published by :Kube Admin

Kubernetes supports the concept of ‘impersonation’ and we’re going to look at the user & group configuration that we created using impersonation to enable a least-privilege type of access to the cluster, even as an administrator, to ensure that it was more difficult to accidentally perform unwanted actions, while keeping the complexity level low.
Technical / A Deep-Dive On Kubernetes For Edge

By Sagar Nangare / Calsoft Inc.

Published by :Sagar Nangare

As edge computing continues to gain momentum to deal with streaming data generated by numerous IoT devices, there are several challenges that have shown-up associated with remote management of software deployment and updates; latency, pre-processing of data, orchestration of different workloads and end-to-end orchestration of compute resources. Kubernetes has emerged as a perfect solution to service providers and enterprises who want to or have deployed edge nodes. It brings cloud native approach to edge use cases along with large feature sets for public cloud, private cloud and core datacenters. This ebook focuses on current scenarios of adoption of Kubernetes for edge use cases, current Kubernetes + edge case studies, approached of deployment and open source and commercial solutions.