- What are Replicasets & why exactly do we need them?- Practical example with Replicasets- What…
K8s consists of multiple components on both the Controller and Worker Nodes. Imagine you as a K8s administrator who has built a cluster, and you get a confirmation from users that they could deploy and test applications through this cluster successfully.
However, there is no guarantee that the cluster will…
In this blog post, let’s try understanding “K8s Network Policy”. We will be following the structure as below.
- Some network communication fundamentals- What is a NetworkPolicy- What are NetworkPolicy agents- Concluding thoughts
To start with, let’s lay out some fundamentals for K8s Networking for Pods for…
In the blog post, let’s try to understand what the K8s job object is and why do we need the same.
Running jobs mostly for the specific instance of invocation without a schedule.
2. Scheduled (CronJob)
Running jobs at a scheduled instance of time
I recently gave the Certified Jenkins Engineer Exam. This blog post will be sharing my experience on it.
The high-level flow would be
Jenkins is a fairly…
We saw an introduction to labels in our article here. In this article, let’s try to understand the differences between labels and annotation & when to use one over another.
Let’s quickly summarize what we learned about labels
Why use Labels in K8s?
In K8s, pods are the fundamental basic units that get deployed in a cluster. K8s deployment is an abstraction layer for the pods…
Eight months back I was a stranger to security & specifically PenTesting. Felt awesome today passing the eCPPTv2 exam, after finishing certifications like eCXD, eCRE & eJPT previously. In all honesty, being new to PenTesting this course was not an easy one for me, but I learned a lot. I got a lot of support from eLearnSecurity forums & also their unofficial discord channel.
I will have a detailed write-up on my journey here soon. Till then ciao!