Skip to content

Kubernetes

Using Kubernetes Ingress on OpenShift: How Routes Are Generated and When to Use Each

OpenShift supports both its native Route resources and Kubernetes Ingress. While Ingress objects are automatically translated into Routes by the OpenShift Router, this approach comes with caveats. In this article we break down how the translation works, how annotations can tune behavior, and when you should prefer Routes directly to unlock advanced features like weighted backends, wildcard hosts, or special TLS modes.

Kubernetes Policy Enforcement: Understanding Pod Security Admission (PSA)

Kubernetes has introduced the Pod Security Admission (PSA) mechanism to replace the deprecated Pod Security Policies (PSP). This article dives into the key capabilities Kubernetes offers for policy enforcement out of the box, particularly focusing on the PSA framework. We will explore the core Pod Security Standards, how PSA improves security practices, and how to configure policies using Kubernetes labels to apply them to different namespaces.

Exposing TCP Ports Using Istio Ingress Gateway

Learn how to expose TCP ports using Istio Ingress Gateway in Kubernetes. This guide covers the steps to configure Istio for TCP traffic, including practical use cases like exposing TIBCO EMS servers, databases, and custom TCP services.

ConfigMap with Optional Values in Kubernetes

In this article, we will explore how to define an item in a Kubernetes ConfigMap as optional. This is essential to prevent deployment issues, such as `CreateContainerConfigError`, when the ConfigMap is not available. We’ll also discuss scenarios where optional ConfigMap values are useful, such as setting environment variables like proxy settings only when needed. A sample application will demonstrate how to implement this in your YAML configurations.

Boosting Kubernetes Security: Exploring KubeSec – A Must-Have Tool for Safeguarding Your Cluster

Discover KubeSec: Elevate your Kubernetes security with this essential tool. Developed by ControlPlane, KubeSec empowers experts and novices alike to assess security risks in Kubernetes resources. Learn about its versatile operational modes and JSON-based output for seamless integration. Strengthen your Kubernetes security standards with KubeSec’s user-friendly approach