<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">

Want to master Kubernetes access control? 🚀 Join our upcoming webinar!

Search
Close icon
Search bar icon
strongDM logo

blog

What Are Microservices in Kubernetes? Architecture, Example & More

What Are Microservices in Kubernetes? Architecture, Example & More

Microservices make applications more scalable and resilient, and Kubernetes is the backbone that keeps them running smoothly. By orchestrating
How to Create a Cron Job in Linux: Set Up, Examples & More

How to Create a Cron Job in Linux: Set Up, Examples & More

Managing routine Linux tasks like backups and service restarts can be overwhelming. Cron jobs automate these processes, keeping your system running
What Is Kubernetes Observability? Best Practices, Tools & More
What Is Kubernetes Observability? Best Practices, Tools & More
Kubernetes observability is the practice of monitoring and analyzing a Kubernetes environment through metrics, logs, and traces to gain visibility into system performance and health. It enables teams to detect and resolve issues proactively, optimize resource utilization, and maintain cluster reliability through real-time insights and automated monitoring tools.
What Is Kubernetes Ingress? Guide to K8s Traffic Management
What Is Kubernetes Ingress? Guide to K8s Traffic Management
This article breaks down Kubernetes Ingress, explaining how it manages external access to services, routing configurations, and best practices. You’ll learn how Ingress differs from Load Balancers, how controllers enforce routing rules, and how to choose the right setup for your needs.
Kubernetes Secrets: Create, Manage, and Secure k8s Secrets
Kubernetes Secrets: Create, Manage, and Secure k8s Secrets
In this article, we explore everything you need to know about Kubernetes Secrets and how to manage sensitive information in your Kubernetes clusters. You'll learn how to create different types of secrets, understand the various creation methods using kubectl, and discover best practices for using secrets in your applications. By the end of this article, you'll have a comprehensive understanding of how to securely handle credentials, API keys, certificates, and other sensitive data within your
How To List Users in PostgreSQL (psql command & GUI tools)
How To List Users in PostgreSQL (psql command & GUI tools)
Up to 80% of data breaches in the U.S. start with unauthorized access. Without insights into who’s accessing your database, their login privileges, and the duration of each session, it can be difficult to prevent potential security threats. Fortunately, PostgreSQL is a powerful open-source relational database management system you can use to manage access control. Known for its advanced support, complex queries, and rich features, PostgreSQL can list users in your database for security audits,
How To Delete/Remove Users in Linux (userdel, deluser & Manually)
How To Delete/Remove Users in Linux (userdel, deluser & Manually)
As a system administrator, a time will come when you’ll need to delete or remove users in your organization’s Linux system. It could be due to security reasons, routine account management, or organizational changes that require you to remove inactive accounts or offboard employees. Whatever the reason, it's important to do this properly to avoid problems like broken processes, orphaned files, and security vulnerabilities.
Top 9 Cloud Databases for 2025 (Free & Paid)
Top 9 Cloud Databases for 2025 (Free & Paid)
This guide breaks down the top cloud database solutions reshaping how organizations store, manage, and scale data. From relational databases to NoSQL options, we’ll cover what matters most when choosing the right solution for your needs. By the end, you’ll understand how modern cloud databases drive scalability and performance—and which one is the best fit for your organization.
How to Add a User to Sudoers & Sudo Group in Ubuntu Securely
How to Add a User to Sudoers & Sudo Group in Ubuntu Securely
Security best practices recommend that you manage privileged access for Linux distributions like Ubuntu, just as with any other operating system. That’s why most Linux systems have the root user or superuser and regular users. At some point, you may need to elevate a regular user’s privileges so they can execute root-level tasks, such as modifying system configurations and settings. In this case, leveraging sudo can be helpful.
NIST Password Guidelines: 2025 Updates & Best Practices
NIST Password Guidelines: 2025 Updates & Best Practices
The latest updates in NIST Special Publication shift focus from complexity to usability. Key changes include: 1. Prioritizing password length over complexity. 2. Mandating compromised credential screening. 3. Encouraging passwordless authentication methods. 4. Eliminating forced password resets unless compromise is suspected.
Falling Out of Love with Your PAM Solution?
Falling Out of Love with Your PAM Solution?
StrongDM fixes what legacy PAM vendors get wrong. Before you start swiping for a better solution, see why security teams are breaking up with their old PAM—and how StrongDM is helping them fall in love with security again.
new-strongdm-desktop-app-ui
Want to learn more?
See StrongDM in action. đź‘€