Wajid.Pro
Wajid.Pro
AboutContact
Kubernetes

Kubernetes

Helm
Helm
Intro
Intro
YAML Definition File
YAML Definition File
Labels, Selectors and Annotations
Labels, Selectors and Annotations
Networking in Kubernetes
Networking in Kubernetes
Kubectl Commands
Kubectl Commands
Pocket Guide
Pocket Guide
Node
Node
Pod
Pod
Namespaces
Namespaces
ReplicaSet
ReplicaSet
Deployment
Deployment
StatefulSets
StatefulSets
DaemonSet
DaemonSet
Service
Service
Secret
Secret
ConfigMap
ConfigMap
NetworkPolicies
NetworkPolicies
Resource Quotas
Resource Quotas
Ingress Resource
Ingress Resource
Volume
Volume
Storage Classes
Storage Classes
Jobs
Jobs
Cron Jobs
Cron Jobs
Service Account
Service Account
Multi Container Pod
Multi Container Pod
Custom Resource Definition (CRD)
Custom Resource Definition (CRD)
Static Pods
Static Pods
Operators
Operators

Concepts

Taints and Tolerations
Taints and Tolerations
Node Selector
Node Selector
Node_Affinity
Node_Affinity
Blue-Green and Canary Deployments
Blue-Green and Canary Deployments
Environment Variables
Environment Variables
Security Context
Security Context
Taints & Tolerations and Node Affinity
Taints & Tolerations and Node Affinity
Controllers
Controllers
Deploying a Production grade Application
Deploying a Production grade Application
Kubernetes Networking
Kubernetes Networking
DNS in Kubernetes
DNS in Kubernetes
Private Container Registry
Private Container Registry
Multiple Schedulers
Multiple Schedulers

Extras

Tips
Tips
Internal Workings
Internal Workings
How declarative commands work?
How declarative commands work?
CKA
CKA
Misc
Misc
Rancher
Rancher
OS Upgrades
OS Upgrades
Cluster Setup
Cluster Setup
Cluster Design
Cluster Design
Unhealthy Nodes
Unhealthy Nodes

Observability

Readiness Probes
Readiness Probes
Liveness Probes
Liveness Probes
Pod Status and Conditions
Pod Status and Conditions
Monitoring
Monitoring
Logging
Logging

Control Plane Components

KubeAPI Server
KubeAPI Server
ETCD
ETCD
Kube Controller Manager
Kube Controller Manager
Kube Scheduler
Kube Scheduler
Kubelet
Kubelet
Kube Proxy
Kube Proxy
 
 
 

Security

RBAC
RBAC
KubeConfig
KubeConfig
Kube Rest API
Kube Rest API
Securing Nodes and Cluster
Securing Nodes and Cluster
Authentication
Authentication
Authorization
Authorization
Cluster-wide RBAC
Cluster-wide RBAC
How Auth in K8s works
How Auth in K8s works
Admission Controllers
Admission Controllers
TLS in Kubernetes
TLS in Kubernetes

Admin

Upgrading EKS
Upgrading EKS
Employees access to EKS
Employees access to EKS
HPA
HPA
VPA
VPA
Backup and Restore
Backup and Restore
Cluster Version Upgrade
Cluster Version Upgrade
Kubeadm
Kubeadm
RDS connect EKS
RDS connect EKS
Best Security Practices
Best Security Practices
 
Copyright 2025 Wajid Shaikh