About Kubernetes security. Part 2. Looking for vulnerabilities and defending ourselves

In the previous article , we looked at the architecture of Kubernetes and…


About Kubernetes security. Part 1. About threats

Containerization technologies have become widespread in recent years, and…


Disaster recovery and cloud backup

Disaster Recovery solutions restore IT infrastructure to health after a failure…


Setting up a LEMP server with docker for simple projects. Part Three: docker-compose, Dockerfile

We continue the cycle of training articles for novice system administrators. In…


Things to keep in mind when creating multi-cluster services in Kubernetes

Application deployment in a Kubernetes multi-cluster environment is one of the…


Running containers in the cloud Part 2 Elastic Kubernetes Service

In the first part of the article, we looked at various options for running…


Create your own DevSecOps process matrix

In one of the projects, we faced the non-trivial task of describing modern…


Docker Swarm for the little ones

This article is about setting up and working with Docker Swarm. Swarm is a…