Articles

CKS #1: 4 C's of Cloud Native Security

Threat actors frequently find opportunities in complex software systems, and cloud-native systems are no exception. Defense-in-depth methodology, used by cloud-native security, separates the system into four tiers. The four Cs of cloud-native security are: Cloud, Cluster, Container and Code

Delete Kubernetes namespace stuck in terminating status

If you have encountered or are stuck with a namespace stuck in Terminating stage, you can remove it easily using kubectl

GCP: About Encryption

GCP uses AES-256 encryption by default when data is at-rest in Google Cloud Storage, and data-in-transit is encrypted with TLS by default. When encrypting data on the Cloud, GCP utilizes DEKs and KEKs, which are used and stored with Google’s Key Management Service (KMS) API.

India's internet privacy and how it doesn't actually exist

If you are in India, you must have heard about debates that went on for VPN and Personal data protection(PDP) bill. With VPNs being controlled and no data protection law in sight, the right to privacy for internet anonymity is being erased.

Kubernetes: Scheduling notes

In Kubernetes, scheduling refers to making sure that Pods are matched to Nodes so that Kubelet can run them. A scheduler watches for newly created Pods that have no Node assigned. For every Pod that the scheduler discovers, the scheduler becomes responsible for finding the best Node for that Pod to …

GCP: Get Organization Hierarchy Chart

This tool, called gcpohv (for GCP org hierarchy viewer), displays an organization structure in your CLI, and also includes IDs for easy reference. It starts from a node in the hierarchy–either an organization or a folder.