
Ingress-nginx CVE 2025-1974 Patch and Mitigation Guide
Today, ingress-nginx maintainers released patches for CVE-2025-1974. Learn impact, mitigation, upgrade steps to secure your Kubernetes cluster.

KMS provider encryption in Kubernetes
Configure Kubernetes API server to use a gRPC-based KMS v2 plugin. Learn setup, config file format, caching, plugin lifecycle, and event-driven use-cases.

Example: Local Kubernetes cluster with Cluster-level PodSecurity admission set to baseline
Learn to create a local kind Kubernetes cluster with cluster-level PodSecurity admission enforcing the baseline profile by default.

Change the Reclaim Policy of a PersistentVolume in Kubernetes
Reclaim policy determines what happens to a PersistentVolume after its PersistentVolumeClaim is deleted. This article shows how to change reclaim policy from Delete to Retain or Recycle.

What Are Projected Volumes In Kubernetes
Explore Kubernetes projected volumes. Learn to merge secrets, ConfigMaps, Downward API, and tokens into a single Pod directory with YAML examples.

kubeadm upgrade – v1.32.x to v1.33.x
Step-by-step guide to upgrade Kubernetes clusters created with kubeadm from version 1.32.x to 1.33.x and beyond, including volume considerations, CSI, security, quotas, and event-driven workflows.

Verify Signed Artifacts in Kubernetes
Use cosign for keyless verification of Kubernetes binaries, tarballs, SPDX metadata and container images. Step-by-step guide with commands, diagrams and best practices.

How to Override the CMD in a Docker Run Command
What CMD does, why you might want to override it, and how to do so effectively using the docker run command.

How I Monitor Commands in Redis Instance with Minimal Effort
Peek under the hood for monitoring the commands your Redis instance is receiving to debug an application or analyze performance.