Skip to main content
Ctrl+K
GuiSam Notes v0.2.5 documentation - Home GuiSam Notes v0.2.5 documentation - Home
  • 👨‍🎓 Certifications
  • 📓 Awk
    • 📑 Getting Started with awk
    • 📑 Running awk and gawk
    • 📑 Regular Expressions
    • 📑 Reading Input Files
    • 📑 Printing Output
    • 📑 Expressions
    • 📑 Patterns, Actions, and Variables
    • 📑 Arrays in awk
    • 📑 Functions
    • ♥️ Awk is awesome
  • 📓 CKA
    • 🔖 Cluster Architecture Installation and Configuration
      • 🏷️ Prepare underlying infrastructure for installing a Kubernetes cluster
      • 🏷️ Create and manage Kubernetes clusters using kubeadm
      • 🏷️ Manage the lifecycle of Kubernetes clusters
      • 🏷️ Understand extension interfaces (CNI, CSI, CRI, etc…)
      • 🏷️ Use Helm and Kustomize to install cluster components
      • 🏷️ Manage role based access control (RBAC)
      • 🏷️ Implement and configure a highly-available control plane
      • 🏷️ Understand CRDs, install and configure operators
    • 🔖 Servicing and Networking
      • 🏷️ Use ClusterIP, NodePort, LoadBalancer service types and endpoints
      • 🏷️ Understand connectivity between Pods
      • 🏷️ Understand and use CoreDNS
      • 🏷️ Know how to use Ingress controllers and Ingress resources
      • 🏷️ Use the Gateway API to manage Ingress traffic
      • 🏷️ Define and enforce Network Policies
    • 🔖 Storage
      • 🏷️ Configure volume types, access modes and reclaim policies
      • 🏷️ Manage persistent volumes and persistent volume claims
      • 🏷️ Implement storage classes and dynamic volume provisioning
    • 🔖 Workloads and Scheduling
      • 🏷️ Understand application deployments and how to perform rolling update and rollbacks
      • 🏷️ Use ConfigMaps and Secrets to configure applications
      • 🏷️ Configure Pod admission and scheduling (limits, node affinity, etc.)
      • 🏷️ Understand the primitives used to create robust, self-healing, application deployments
      • 🏷️ Configure workload autoscaling
    • 🔖 Troubleshooting
      • 🏷️ Troubleshoot cluster and nodes
      • 🏷️ Troubleshoot cluster component
      • 🏷️ Monitor cluster and application resource usage
      • 🏷️ Manage and evaluate container output streams
      • 🏷️ Troubleshoot services and networking
  • 📓 CKS
    • 🔖 Cluster Setup
      • 🏷️ Use Network security policies to restrict cluster level access
      • 🏷️ Use CIS benchmark to review the security configuration
      • 🏷️ Properly set up Ingress objects with TLS
      • 🏷️ Protect node metadata and endpoints
      • 🏷️ Verify platform binaries before deploying
    • 🔖 Cluster Hardenning
      • 🏷️ Use Role Based Access Controls to minimize exposure
      • 🏷️ Exercise caution in using service accounts
      • 🏷️ Restrict access to Kubernetes API
      • 🏷️ Upgrade Kubernetes to avoid vulnerabilities
    • 🔖 System Hardenning
      • 🏷️ Minimize host OS footprint (reduce attack surface)
      • 🏷️ Using least-privilege identity and access management
      • 🏷️ Minimize external access to the network
      • 🏷️ Appropriately use kernel hardening tools such as AppArmor, seccomp
    • 🔖 Minimize Microservice Vulnerabilities
      • 🏷️ Use appropriate pod security standards
      • 🏷️ Manage kubernetes secrets
      • 🏷️ Understand and implement isolation techniques
      • 🏷️ Implement Pod-to-Pod encryption
    • 🔖 Supply Chain Security
      • 🏷️ Minimize base image footprint
      • 🏷️ Understand your supply chain
      • 🏷️ Secure your supply chain
      • 🏷️ Perform static analysis of user workloads and container images
    • 🔖 Monitoring, Logging and Runtime Security
      • 🏷️ Perform behavioral analytics to detect malicious activities
      • 🏷️ Detect threats within physical infrastructure, apps, networks, data, users and workloads
      • 🏷️ Investigate and identify phases of attack and bad actors within the environment
      • 🏷️ Ensure immutability of containers at runtime
      • 🏷️ Use Kubernetes audit logs to monitor access
  • 📓 Desktop
    • 🎮 Batocera
    • 📘 Byobu
    • 📘 Csh History
    • 📘 Ditaa
    • 📘 Fedora Workstation
    • 📘 GNOME
    • 📘 LUKS
    • 📘 SELinux
    • 📘 Passwd Recovery
    • 📘 Vim
    • 📘 Zsh
  • 📓 Network
    • 📙 Ipset
    • 📙 Nftables
    • 📙 OPNSense
    • 📙 OSI Model
  • 📓 System
    • 📗 Ansible from scratch
    • 📗 ArgoCD
    • 📗 Argo Workflows
    • 📗 Apache Cassandra
    • 📗 Apache Tomcat
    • 📗 Docker
    • 📗 Forgejo
    • 📗 Let’s Encrypt
    • 📗 MySQL Replication
    • 📗 Nginx
    • 📗 PostgreSQL
    • 📗 Systemd
    • 📗 Terraform
  • .rst

📓 Desktop

📓 Desktop#

  • 🎮 Batocera
  • 📘 Byobu
  • 📘 Csh History
  • 📘 Ditaa
  • 📘 Fedora Workstation
  • 📘 GNOME
  • 📘 LUKS
  • 📘 SELinux
  • 📘 Passwd Recovery
  • 📘 Vim
  • 📘 Zsh

previous

🏷️ Use Kubernetes audit logs to monitor access

next

🎮 Batocera

By GuiSam

© Copyright 2026, GuiSam.