1. Only showing results from developers.redhat.com

    Clear filter to show all search results

  2. developers.redhat.com

    In this talk, you'll learn how to manage Kubernetes secrets from Alex Soto Bueno and Burr Sutter. Everyone is talking about microservices and serverless architecture, and how to deploy them using cluster managers like Kubernetes. But, what about the secrets (such as certificates, passwords, SSH, and API keys)? ...
  3. developers.redhat.com

    Jul 8, 2024The book concludes with a discussion on the future of secret management in Kubernetes, and an invitation to join the conversation. This end is fitting on so many levels: as RedHat affiliates, the authors embody the culture of community as a strategy. While reading the book, I felt like I was being invited to a parlor meeting with friends, where ...
  4. developers.redhat.com

    Everyone is talking about the microservices and serverless architecture and how to deploy them using cluster managers like Kubernetes. But, what about the secrets? The current trend increases the number of secrets required to run our services. This places a new level of maintenance on our security teams.
  5. developers.redhat.com

    When using sensitive data like API Keys, passwords etc. Secrets are the preferred and recommended way. In this second part of the series, we will explore configuring spring boot on kubernetes with Secrets. The sources for this blog post are available in my github repo. Setup. You might need access to Kubernetes Cluster to play with this ...
  6. developers.redhat.com

    Nov 6, 2023Red Hat OpenShift 4.14, based on Kubernetes 1.27 and CRI-O 1.27, is now generally available.This article highlights notable updates in this release for OpenShift developers. Enhanced security for workloads. OpenShift now has a Secret Store CSI Drive Operator that lets customers mount secrets from third-party secret management systems like Azure Key Vault, AWS Secrets Manager, AWS Systems ...
  7. developers.redhat.com

    Access to secrets, storage, etc. Privileges and capabilities; Workload isolation, network exposure, and blast radius; Use a secrets management tool to protect sensitive data. Assess the privileges used by containers to keep them to a minimum viable set of capabilities. Avoid deployments without resource limits unless absolutely necessary.
  8. developers.redhat.com

    Cert-manager is a cloud-native certificate management service for Kubernetes and Red Hat OpenShift.To configure cert-manager, you need to install several resources using custom resource definitions (CRDs). Depending on the issuer type and the certificate you need, creating these custom resources can become complex.
  9. developers.redhat.com

    Oct 7, 2024MicroShift is a lightweight Kubernetes distribution derived from Red Hat OpenShift that is intended for edge or embedded use cases in environments where the availability of computing resources is. Skip to main content ... Finally, secrets management is a challenge here. When using something like External Secrets or the CSI Secrets Driver, a ...
  10. developers.redhat.com

    Apr 26, 2024With the Red Hat OpenShift 4.15 release, the shared resource CSI Driver operator feature (in Tech Preview) allows for sharing secrets across namespaces. This addresses a common developer request, enabling the creation of secrets in one place and seamless sharing across projects. This is particularly handy for efficiently managing frequently accessed services like Messaging layer, Databases ...
  11. developers.redhat.com

    Feb 19, 2024Secrets containing developer credentials such as Git token, SSH keys, and Kubernetes token; ConfigMaps with developer-specific config as the Git name and email; Volumes that persist data such as the source code even when the CDE Pod is stopped; Figure 2: Dev Environment Isolation Figure 2: Dev environment isolation.
  12. Can’t find what you’re looking for?

    Help us improve DuckDuckGo searches with your feedback

Custom date rangeX