Secure Kubernetes Cloud in Six Ways

There are multiple ways to secure your deployed Kubernetes cluster. In this article, the five, most effective steps and ways to achieve your security goals, then protect your cluster from hiking are summarized. Secure cluster access through firewall Control the Kubernetes cluster master management node access through reverse proxy with IPSec encrypted communication between theContinue reading “Secure Kubernetes Cloud in Six Ways”

Control Kubernetes Pod’s Lifecycle

When you put your application into Kubernetes pod and orchestrated by Kubernetes, the orchestrator provides multiple mechanisms to decide when the pod can be treated as fully out of rebooting process, the pod is functional and ready to be put into the service to accept live, application network traffic. All those are achieved by aContinue reading “Control Kubernetes Pod’s Lifecycle”

Achieve CNCF WorkFlow using Azure Public Cloud

CNCF recommends four steps to achieve cloud native for your application: Containerization of your application through Docker and push its image into registry Setup CI/CD pipeline for DevOps automation Using orchestrator such as Kubernetes to manage the full application life cycle Add observability and analysis capacity to your deployed application Add building block such asContinue reading “Achieve CNCF WorkFlow using Azure Public Cloud”