Upgrade & Secure Your Future with DevOps, SRE, DevSecOps, MLOps!
We spend hours on Instagram and YouTube and waste money on coffee and fast food, but won’t spend 30 minutes a day learning skills to boost our careers.
Master in DevOps, SRE, DevSecOps & MLOps!
Learn from Guru Rajesh Kumar and double your salary in just one year.
- Top 10 k8 API Resources which is being by Kubernetes Admin
kubectl config get-contexts
kubectl cluster-info
kubernetes-admin@kubernetes
kubectl explain
kubectl delete
kubectl get
kubectl api-resources -o wide
kubectl api-resources –sort-by=name
kubectl api-resources –namespaced=true
kubectl api-resources –api-group=extensions
2.Top 10 kubectl commands to troubleshoot Kubernetes
describe
logs
attach
exec
port-forward
proxy
cp
auth
debug
- Top 15 commands which is being used by Kubernetes Administrator
kubeadm token list
Kubectl
certificate
cluster-info
top
cordon
uncordon
drain
taint
Kubeadm
init
certs
completion
config
help
join
kubeconfig
reset
token
upgrade
version
Linux :
sudo -s
echo $PATH
wget
curl
rm
tar
vi
export
4.Top Tools for Monitoring, Logging and Tracing Kubernetes & Apps
jaeger
Newrelic
Datadog
Dynatrace
AppDynamics
Splunk APM
Elastic APM
Grafana APM
logstash
5.Top 10 Practices for Securing Kubernetes
- Secure application code.
- Secure container images and workloads.
- Secure Kubernetes clusters.
- Secure Kubernetes infrastructure in the cloud.
- A multi-layered approach to securing Kubernetes applications.
- Audit logging
- forward your audit logs to Datadog SIEM, which provides detection rules that help you automatically flag potential threats
- Limit access to the Kubernetes API9
- role-based access control (RBAC)
- Use key management service (KMS)