Discussion around Kubernetes security challenges and best practices for DevOps. You will learn how to: stay on top of ongoing Kubernetes hygiene by hardening your nodes, employing RBAC best practices; secure your production workloads; thwart an attack, with a live demo
For many DevOps teams, Kubernetes has become an enterprise IT mandate, but like previous waves of infrastructure change, Kubernetes security best practices must be followed throughout the container life cycle.
Join us for a discussion around Kubernetes security challenges and best practices. You will learn how to:
So you have updated a K8s Secret to accommodate some change but all the dependent pods hold on to the old value unless restarted! How to…
DevOps lifecycle delineates the journey of product development from the start till the end. Its main objective is to eradicate all discrepancies and achieve delivery of products at pace.
Slowly and steadily people are starting to believe that containers and Kubernetes are now as secure as physical and virtual machines.
In this "Kubernetes Security Tutorial: Attacking and Defending Kubernetes", you'll see how to attack Kubernetes clusters and learn what hardening techniques and freely available tools can break those attacks. You will also gain exposure to a new open source Kubernetes attack tool called Peirates.
DevOps. GitOps. DevSecOps. Organizations need to increase the automation of these processes to improve application quality.