Secure Kubernetes Cloud in Six Ways

There are multiple ways to secure your deployed Kubernetes cluster. In this article, the five, most effective steps and ways to achieve your security goals, then protect your cluster from hiking are summarized. Secure cluster access through firewall Control the Kubernetes cluster master management node access through reverse proxy with IPSec encrypted communication between theContinue reading “Secure Kubernetes Cloud in Six Ways”

Two Key Takeaways from F5 Agility Conference

Digital transform will change the way of code development, service delivery, daily working style and more. How do we adapt to this change? We need to adopt a batch of new technologies, culture changes and promote new best practices. From a technology point of view, a shift from monolithic way of development to cloud native,Continue reading “Two Key Takeaways from F5 Agility Conference”