Skip to content

Alexandre Vazquez

Kubernetes Policy Enforcement: Understanding Pod Security Admission (PSA)

Kubernetes Policy Enforcement: Understanding Pod Security Admission (PSA)

Kubernetes has introduced the Pod Security Admission (PSA) mechanism to replace the deprecated Pod Security Policies (PSP). This article dives into the key capabilities Kubernetes offers for policy enforcement out of the box, particularly focusing on the PSA framework. We will explore the core Pod Security Standards, how PSA improves security practices, and how to configure policies using Kubernetes labels to apply them to different namespaces.

Exposing TCP Ports Using Istio Ingress Gateway

Exposing TCP Ports Using Istio Ingress Gateway

Learn how to expose TCP ports using Istio Ingress Gateway in Kubernetes. This guide covers the steps to configure Istio for TCP traffic, including practical use cases like exposing TIBCO EMS servers, databases, and custom TCP services.

ConfigMap with Optional Values in Kubernetes

ConfigMap with Optional Values in Kubernetes

In this article, we will explore how to define an item in a Kubernetes ConfigMap as optional. This is essential to prevent deployment issues, such as `CreateContainerConfigError`, when the ConfigMap is not available. We’ll also discuss scenarios where optional ConfigMap values are useful, such as setting environment variables like proxy settings only when needed. A sample application will demonstrate how to implement this in your YAML configurations.

TIBCO BW ECS Logging Support

TIBCO BW ECS Logging Support

Learn how to enhance your TIBCO BW applications with ECS logging support, a crucial feature in the evolving landscape of log aggregation solutions. With the increasing adoption of Elastic Common Schema (ECS) within the Elastic stack, discover how to seamlessly adapt your applications to this new logging format. Regardless of your deployment model—whether on-premises or container-based—this article guides you through the steps to integrate ECS logging into your TIBCO BusinessWorks applications. Explore the straightforward process of including the required JAR files, modifying configurations, and leveraging the power of ECS encoding. Elevate your logging capabilities with ECS to ensure efficient log management in container architectures.

Boosting Kubernetes Security: Exploring KubeSec - A Must-Have Tool for Safeguarding Your Cluster

Boosting Kubernetes Security: Exploring KubeSec – A Must-Have Tool for Safeguarding Your Cluster

Discover KubeSec: Elevate your Kubernetes security with this essential tool. Developed by ControlPlane, KubeSec empowers experts and novices alike to assess security risks in Kubernetes resources. Learn about its versatile operational modes and JSON-based output for seamless integration. Strengthen your Kubernetes security standards with KubeSec’s user-friendly approach