Security

JWT

Reading Time: 3 minutes JWT stands for JSON Web Token. It is basically used to transform some information between two parties as a JSON object. This information can be verified and trusted because it is digitally signed. JWTs can be signed using a secret (with HMAC algorithm) or a public/private key pair using RSA. JWT is very compact in size, we can send it through the HTTP header, Post parameter, etc. It’s Continue Reading

Spring Security: How it works internally

Reading Time: 5 minutes Definition Spring Security is a framework provided by Spring that helps to customize an access and authentication process. It plays a very crucial role in terms of securing the applications. Spring Security, mainly focuses on authentication and authorization to provide all benefits to java applications. It is very helpful and provides an easy approach to apply in real projects. And, permits to do custom modifications Continue Reading

Information Security

Reading Time: 5 minutes Introduction Being in 21st century, seeing technological transformations is not a big deal any more. Today where there are no limits to the enhancements of technological aspects, it has become possible for one to get all his day to day work done using technologies like desktops and mobile phones, while sitting on a chair. It is now easy for one to reach any point or Continue Reading

dev-tools

Dev Tools to the Rescue – Part 2

Reading Time: 6 minutes In my previous article Dev Tools to the Rescue – Part 1, we looked at some of the best developer tools for software development, project management, continuous delivery/integrity, designing, testing, etc. In this article, we’ll continue with tools that are helpful for purposes like monitoring, analysis, cloud development, security, etc. Confluence Confluence is a team collaboration application that allows teams to work together and share Continue Reading

Audit DC/OS Service via Prometheus/Filebeat

Reading Time: 3 minutes In our previous blog post, How to audit DC/OS Services?, we learned how to locally audit service/app in DC/OS via dcos-adminrouter.service. This blog is in continuation of the previous one and here we will explore how we can audit DC/OS Service via Prometheus /Filebeat. Quick Recap We have seen that DC/OS doesn’t provides any web interface is to track the change in service/app configs , Continue Reading

How to audit DC/OS Services?

Reading Time: 4 minutes DC/OS is a distributed systems kernel that lets you manage multiple machines as if they were a single computer. Its included web interface facilitates user to interact with its services. Now, this is where it gets quite messy to keep track of the users who are interacting with the services running in the cluster. It is the responsibility of the cluster-admin to keep track and Continue Reading

Threat Modelling: An Overview

Reading Time: 3 minutes A secure architecture has become the need of the hour for almost everyone. As a result, no one needs any vulnerabilities in their clusters. But is it wise to add security after a mishap has occurred? What if we can identify potential risks at the time of development itself? This is exactly where Threat Modelling fits almost perfectly while helping organisations excel in creating more Continue Reading

Understanding DevSecOps for Kubernetes

Reading Time: 4 minutes Increase in Security Demands for Cloud Native Ecosystems In today’s world, the need for securing our cloud native clusters has increased more than ever. Also this year, cloud-native security is again top trending, according to a report published by Gartner. DevSecOps is a simple answer to multiple questions. In the recently concluded KubeCon 2020, we saw that a lot of organisations are taking huge strides Continue Reading

Knoldus-Blog-Monitoring-Solution-with-rust

Monitoring solutions reduce costs & lead to better asset utilization

Reading Time: 2 minutes In a world where the future’s uncertain and businesses are compelled to embrace digital solutions, an unreliable IT infrastructure is out of the question. After all, you cannot afford application outages, security breaches, or system downtimes as they can harm business continuity. According to Gartner, the average cost of IT downtime is $5,600 per minute, which varies across industries. However, the right monitoring tools provide Continue Reading

An Introduction to SSH – Secure Shell

Reading Time: 4 minutes What is SSH ? SSH is a network protocol that allows secure connection between different computers. SSH protocol also referred to as Secure Shell, provides many functionalities like, Strong connection and security Strong authentication Maintains connection integrity Strong encryption. In general, there are different ways for logging in to a remote machine, Know the password of that machine. SSH public and private keys. Host-based authentication Continue Reading

Introduction To Ansible Vault

Reading Time: 2 minutes Hi readers, in this blog we will be discussing Ansible vault. Also, we will be looking at how to encrypt different playbooks and how they can be decrypted. Introduction The “Vault” is a feature of Ansible that allows you to keep sensitive data such as passwords or keys protected at rest, rather than as plain text in playbooks or roles.  Why use Ansible Vault? Ansible Continue Reading

A Quick Guide through UFW – Uncomplicated Firewall

Reading Time: 4 minutes UFW, short for Uncomplicated Firewall, is basically a simplified firewall mechanism that is implemented upon iptables itself. As a result, making it much easier to configure ufw than to configure iptables. Therefore, it can be said that ufw is technically a program for managing a netfilter firewall which aims to provide an easy to use interface for the user. Need for UFW – uncomplicated firewall Continue Reading

Go Through with Rego components

Reading Time: 3 minutes In this blog, we’ll understand Rego that uses for declaring policy in OPA(open policy Agent). Rego is a declarative logic programming language, not a programming language. We can get content based on the policy defined by Rego as it’s declarative nature it has many benefits than the imperative language.