Cluster computing

Sunday, May 12, 2019

›
Credentials and Identity   Credentials and identity are assets to be managed and surely there are plenty of reasons to dedicate sof...
Saturday, May 11, 2019

›
Aliases and robots: Usernames and passwords became a representation of the user. With the use of cryptography and X509, we now have public...
Friday, May 10, 2019

›
We were discussing the ingress resource for Kubernetes cluster. The ingress resource can fan out the traffic to different destinations ba...
Thursday, May 9, 2019

›
KeyCloak is a complex software and so are the features for a gatekeeper. An end to end design will separate the concerns for deployment whi...
Wednesday, May 8, 2019

›
One of the least anticipated security vulnerabilities in ingress control is the use of an https proxy. As with any proxy it splits the se...
Tuesday, May 7, 2019

›
Ingress control versus external and internal application endpoint security An ingress controller controls the traffic into the Kubernetes ...
Monday, May 6, 2019

›
Ingress control on Applications requiring  Keystore  and  truststore  on  Kubernetes  clusters.   Keys and certificates are used to s...
‹
›
Home
View web version

About Me

My photo
Ravi Rajamani
View my complete profile
Powered by Blogger.