In the fast-evolving landscape of cloud-native technologies, securing containerized workloads is a top priority. Kubernetes and containers power modern applications, but their shared kernel architecture introduces risks like privilege escalation and container breakouts. Edera’s Am-I-Isolated tool, an open-source security scanner, steps in to address these challenges by evaluating container isolation and offering practical fixes. Written … Continue reading Edera’s Am-I-Isolated Tool: Fortifying Container Security
Category: Linux
Set up Role-Based Access Control (RBAC) in Vault
Providing efficient and customized access management for sensitive information is critical to upholding robust security and protecting a company’s confidential data. With HashiCorp Vault’s roles and policies, you can implement that control reliably and with assurance. Prerequisites: You require a running vault cluster for this activity. Refer to the official link https://developer.hashicorp.com/vault/docs/platform/k8s/helm/run for a refresher … Continue reading Set up Role-Based Access Control (RBAC) in Vault
Set Up Mutual TLS (mTLS) with Vault’s PKI Secrets Engine
Mutual TLS (mTLS) is a security mechanism that requires both the client and the server to verify each other's identities using digital certificates. In contrast to one-way TLS, where only the server’s identity is validated, mTLS adds an extra layer of security by ensuring mutual authentication. Vault's PKI secrets engine streamlines the management of these … Continue reading Set Up Mutual TLS (mTLS) with Vault’s PKI Secrets Engine
The trifecta of ARM, Assembly, and C: Pointers, Registers, and …
Our sincerest request to the reader is to go through the previous post The trifecta of ARM, Assembly, and C. This discussion builds up on top of it. We often tend to develop for a particular OS on regular development cycles. It may sound improbable, but often most embedded developers find dealing in tandem with constructs … Continue reading The trifecta of ARM, Assembly, and C: Pointers, Registers, and …
Terraform module: one lesson learned hard way
The module are lifesavers in terraform. Making them is one acquired skill. It seems it's easy at first but really gets complicated when used for actual use-case. Some pit-falls are innocuous like this one.
The Password Story
At some point or other we face the problem of not being able to login after a recent install of ubuntu. This is story of those of us and an attempt at solution..
Elastic Storage in Hadoop using Logical Volume Management
Apache Hadoop is one of the most popular tool for dealing with Big Data.
Kubernetes: Up and Running
Kubernetes is a software that allows us to deploy, manage and scale applications. The applications will be packed in containers and kubernetes groups them into units. It allows us to span our application over thousands of servers while looking like one single unit.
You must be logged in to post a comment.