![](/wp-content/uploads/2023/07/d2859ad6739b0ff3e4e479e6fab18d9c-300x166.png)
AWS EKS – Part 20 – Authentication and Authorization with Access Entries
Access Entries is a new Authentication and Authorization method in EKS service introduced in late 2023 by AWS to allow...
![](/wp-content/uploads/2024/03/96dd09c3c3f74816d5a215e7ff2eec88-1-300x162.png)
PlatformCon 2024 – The #1 FREE Platform engineering virtual conference live across the globe
PlatformCon 2024 is the world’s largest Platform Engineering event and brings together the most influential minds in the platform and...
![](/wp-content/uploads/2023/07/d2859ad6739b0ff3e4e479e6fab18d9c-300x166.png)
AWS EKS – Part 19 – Kubernetes Authentication with IAM Roles
In the previous article, you learned how to set up Kubernetes Authentication using IAM users, but as mentioned, adding IAM...
![](/wp-content/uploads/2023/07/d2859ad6739b0ff3e4e479e6fab18d9c-300x166.png)
AWS EKS – Part 18 – Kubernetes Authentication with IAM Users
In this lesson, you will learn how to add additional IAM users to EKS clusters to allow your engineers to...
![](/wp-content/uploads/2023/07/d2859ad6739b0ff3e4e479e6fab18d9c-300x166.png)
AWS EKS – Part 17 – Enable Cluster Logging with CloudWatch
Infrastructure logging is an essential topic for any system, and when it comes to AWS, especially EKS, we face different...
![](/wp-content/uploads/2023/07/d2859ad6739b0ff3e4e479e6fab18d9c-300x166.png)
AWS EKS – Part 16 – Enable Secrets Encryption at Rest with AWS KMS Service
Encryption At Rest, EAR, is a term referred to as encrypting data when they are stored on disk. In Kubernetes,...
![](/wp-content/uploads/2023/07/d2859ad6739b0ff3e4e479e6fab18d9c-300x166.png)
AWS EKS – Part 15 – Restrict Node IMDS to Secure AWS Account Access
Instance Metadata Service, IMDS, is an AWS service allowing EC2 instances to retrieve information about themselves for automation, telemetry, etc....
![](/wp-content/uploads/2023/07/d2859ad6739b0ff3e4e479e6fab18d9c-300x166.png)
AWS EKS – Part 14 – Setup EKS Pod Identities to Access AWS Resources
In late 2023, AWS introduced a new EKS feature called Pod Identities, a successor of IAM Role for Service Accounts...
![](/wp-content/uploads/2023/07/d2859ad6739b0ff3e4e479e6fab18d9c-300x166.png)
AWS EKS – Part 13 – Setup IAM Roles for Service Accounts (IRSA)
IAM Roles for Service Accounts, for short IRSA, is an authentication method to authenticate to AWS to access cloud resources....
![](/wp-content/uploads/2023/07/d2859ad6739b0ff3e4e479e6fab18d9c-300x166.png)
AWS EKS – Part 12 – Deploy Fully Air-gapped Cluster without Internet
Some industries, like health, pharmacology, military, air force, space, government systems, etc., may be forced to run their infrastructures in...
![](/wp-content/uploads/2024/01/48978992f2ef10d06e07126c21e7e3da-300x169.png)
Why you get rejected in Kubernetes interviews
Today, I want to talk about something non-technical that caused you not to get your life-changer opportunities in your technical...
![](/wp-content/uploads/2023/07/d2859ad6739b0ff3e4e479e6fab18d9c-300x166.png)
AWS EKS – Part 11 – Deploy Workers in Private Subnets behind NAT Gateway
In previous articles, we deployed our cluster and worker nodes in public subnets, but in the real world, we deploy...