Category: Cloud Native Security
-
AKS | Bring your own keys (BYOK) with Azure disks
Read more: AKS | Bring your own keys (BYOK) with Azure disksHi! The “Bring your own keys” (BYOK) capability for Azure disks is now supported in preview within AKS. By default, data is safeguarded using Microsoft-managed keys, ensuring a high level…
-
AKS | Operation Abort
Read more: AKS | Operation AbortHi! AKS now supports aborting a long running operation. The abort operation supports the following scenarios: The following example terminates an operation on a node pool on a specified cluster: az…
-
AKS | CNCF Quebec Meetup
Read more: AKS | CNCF Quebec MeetupHi, I am thrilled to share that I had the opportunity to speak at the CNCF Québec meetup this week. My presentation focused on the various security vectors that a…
-
AKS | Istio-based service mesh add-on
Read more: AKS | Istio-based service mesh add-onHi!, As cloud-native applications continue to become more complex, managing the communication between services in a microservices architecture becomes a challenge. Service mesh technology offers a solution to this challenge…
-
AKS | Pod Sandboxing
Read more: AKS | Pod SandboxingHi! In a traditional Kubernetes cluster, pods share the same node and therefore have the same level of access to the host system. This can lead to potential security risks,…
-
AKS | Pricing Tiers
Read more: AKS | Pricing TiersHi! Azure Kubernetes Service (AKS) is now offering two pricing tiers for cluster management: the Free tier and the Standard tier. Free tier Standard tier When to use • You want to experiment…