MOTOSHARE 🚗🏍️
Turning Idle Vehicles into Shared Rides & Earnings
From Idle to Income. From Parked to Purpose.
Earn by Sharing, Ride by Renting.
Where Owners Earn, Riders Move.
Owners Earn. Riders Move. Motoshare Connects.
With Motoshare, every parked vehicle finds a purpose.
Owners earn. Renters ride.
🚀 Everyone wins.
- Top 10 k8 API Resources which is being by Kubernetes Admin
kubectl config get-contexts
kubectl cluster-info
kubernetes-admin@kubernetes
kubectl explain
kubectl delete
kubectl get
kubectl api-resources -o wide
kubectl api-resources –sort-by=name
kubectl api-resources –namespaced=true
kubectl api-resources –api-group=extensions
2.Top 10 kubectl commands to troubleshoot Kubernetes
describe
logs
attach
exec
port-forward
proxy
cp
auth
debug
- Top 15 commands which is being used by Kubernetes Administrator
kubeadm token list
Kubectl
certificate
cluster-info
top
cordon
uncordon
drain
taint
Kubeadm
init
certs
completion
config
help
join
kubeconfig
reset
token
upgrade
version
Linux :
sudo -s
echo $PATH
wget
curl
rm
tar
vi
export
4.Top Tools for Monitoring, Logging and Tracing Kubernetes & Apps
jaeger
Newrelic
Datadog
Dynatrace
AppDynamics
Splunk APM
Elastic APM
Grafana APM
logstash
5.Top 10 Practices for Securing Kubernetes
- Secure application code.
- Secure container images and workloads.
- Secure Kubernetes clusters.
- Secure Kubernetes infrastructure in the cloud.
- A multi-layered approach to securing Kubernetes applications.
- Audit logging
- forward your audit logs to Datadog SIEM, which provides detection rules that help you automatically flag potential threats
- Limit access to the Kubernetes API9
- role-based access control (RBAC)
- Use key management service (KMS)