Author: Yamika Rajput

Jenkins Operator in kubernetes cluster(Part 2)

Reading Time: 2 minutes As In Part 1 we’ve seen to create jenkins instance using jenkins-operator and the same way. we’ll see in this blog to create the another jenkins instance named as secondjenkins and After that we’ll see how to delete both instances using simple commands in kubernetes cluster. Now how about creating another Jenkins instance by using jenkins-operator? So for that if you look at the manifest Continue Reading

Jenkins Operator in kubernetes cluster(Part 1)

Reading Time: 5 minutes Hi folks ,We’re going to learn about how to use Jenkins Operator in kubernetes cluster to manage jenkins instances and to understand it . So i’m assuming that you’re familiar with the below listing…. jenkins installation how to run jenkins in your kubernetes cluster Now, I’m using the Rancher k3d kubernetes in Docker Container as I wanted to trysomething new and it’s lightning fast  in Continue Reading

How to Secure cluster nodes and the network (Part 3)

Reading Time: 6 minutes   Restricting the use of security-related features in pods The examples in the previous articles have shown how a person deploying pods can do whatever they want on any cluster node, by deploying a privileged pod to the node, for example. Obviously, a mechanism must prevent users from doing part or all of what’s been explaine. The cluster admin can restrict the use of the Continue Reading

How to Secure cluster nodes and the network (Part 2)

Reading Time: 4 minutes Adding individual kernel capabilities to a container: In the old days, traditional UNIX implementations only distinguished between privileged and unprivileged processes, but for many years, Linux has supported a much more fine-grained permission system through kernel capabilities. Instead of making a container privileged and giving it unlimited permissions, a much safer method (from a security perspective) is to give it access only to the kernel Continue Reading

How to Secure cluster nodes and the network (Part 1)

Reading Time: 5 minutes In kubernetes , we know the Api Server which is responsible for validating and configuring the data for the api objects like pods, services, replicationcontrollers etc. and let’s understand why we need to secure kubernetes cluster nodes ? For instance ,what if the attacker gets the access of api server then they can manipulate the whatever they like by packaging their code into a container Continue Reading

Overview of Docker Registry

Reading Time: 4 minutes The Docker Registry is open-source, under the permissive Apache license. Docker Registry is a storage where you can store and distribute the docker images.  And why we need Docker Registry explained in below : So let’s say you’re working on your project and you have your own docker images so you want to host your docker images locally for your office work , your organization, Continue Reading