|
You are here |
golangbot.com | ||
| | | | |
zaries.wordpress.com
|
|
| | | | | There are thousands of articles and entries in stackexchange but none of them worked for me out of the box. So after hours of battling with this issue here is my short recipe. Create the Root Key: openssl genrsa -out rootCA.key 2048 Self-sign this root certificate: openssl req -x509 -new -nodes -key rootCA.key -sha256 -days... | |
| | | | |
ghvsted.com
|
|
| | | | | Before a request is sent to the Kube-API server, some sort of client-side validation occurs. During this client-side validation, Kubectl validates requests and ensures that bad requests[ bad resource names, malformed image names, etc] do not go through to the API server. After the client-side validation, requests to the server are then authenticated. The authentication aims to ensure that the user making the request has the right to access that cluster. | |
| | | | |
vadosware.io
|
|
| | | | | How I went about setting up a HTTP application on Kubernetes, with Ingress | |
| | | | |
www.hardenize.com
|
|
| | | Our most recent Hardenize release adds support for the Expect-CT HTTP response header, which site operators can use to monitor their certificate transparency compliance status in real-time. | ||