K8S Application Orchestration and Management: Job and CronJob

Continuing from the previous study on Controllers, this section will focus on the practical aspects of Job and CronJob. First, consider the following question: Can we run task processes directly through Pods? If we do this, how do we solve the following issues? How to ensure that the processes within the Pod terminate correctly? If … Read more

A Linux Intrusion Investigation

A Linux Intrusion Investigation

According to the received threat intelligence report, the hacker group IronShade has launched attacks against Linux servers in the region. To prevent attacks from this APT organization and understand their attack patterns, our team set up a honeypot, exposing weak SSH and ports. As security analysts, we need to conduct a comprehensive intrusion assessment on … Read more