Guides for kubernetes-security

DevSecOps in Practice: Integrating Security in the Development Lifecycle
Discover DevSecOps monitoring with Civo's tools for superior application security, ensuring robust protection throughout the development lifecycle in today's complex cybersecurity environment.

Looking Under the Hood of a Kubernetes Cluster
Master the Kubernetes API with our detailed tutorial, featuring insights from official docs and expert tips from Civo.

Rate-limiting applications with Nginx Ingress
Learn how to implement rate-limiting using the NGINX Ingress controller in a Kubernetes environment. This tutorial covers the benefits of rate-limiting and a step-by-step guide on setting up rate-limiting.

Deploy Kubernetes Dashboard through Civo Marketplace
Take a look at the Kubernetes Dashboard available on Civo Marketplace to discover how to simplify tasks such as scaling, rolling updates, and deploying new applications.

Implementing multitenancy in Kubernetes using virtual clusters
Learn how to implement multitenancy in Kubernetes using virtual clusters to improve infrastructure efficiency & reduce costs. Understand benefits, drawbacks & security risks.

Create a Kubernetes cluster using GitLab
In this article, I will show you how to create a Kubernetes cluster using GitLab. This is done using the GitLab Agent for Kubernetes, which allows you to create, update and manage your Kubernetes clusters as part of your GitLab setup.

How to enforce Kubernetes best practices using ValidKube and Kubescape
Learn how to audit your manifest files and scan clusters to ensure you're following best practice

Install KubeSphere on your Kubernetes clusters
Easily install KubeSphere on Kubernetes clusters & simplify multi-cluster management. Boost your cloud-native business with seamless integration.

How to mitigate Kubernetes runtime security threats
Learn how to secure your Kubernetes cluster and protect your applications from runtime security threats, including analyzing vulnerabilities, detecting breaches, and implementing preventive measures.

Using Twingate Connector on Kubernetes to access private services
Discover the power of Twingate to easily secure access to private resources in Kubernetes clusters. Learn to set up and access services without public exposure.

Securing a K3s cluster with Falco
This guide provides instructions to secure a K3s cluster using Falco, an open-source cloud-native runtime security project.

Secure your Kubernetes services with Let's Encrypt and cert-manager
Discover how to secure your Kubernetes services using Let's Encrypt and cert-manager. Follow our step-by-step tutorial for easy implementation.

Harden your virtual private server against attackers
Learn how to secure your Civo instance with SSH hardening, firewall setup, and automated backups. Protect your system from unauthorized access. Take control of your server's security now!

Validating K8s configuration files to prevent misconfiguration
Delve into the significance of validating Kubernetes configuration files to avoid common pitfalls and explore our practical demonstration of how to do all this using Civo's managed Kubernetes service.