Happy Halloween!! 🍬🍬🍬🍬

giphy (2)

Hey there,

Since today is Halloween, We’re sticking with the scary vibe and giving you a scary good deal on Magalix PRO.

For new users, you will receive 30 days free trial instead of 14 and for existing users, you will receive 2 free months when you upgrade to Magalix pro. (offer valid till 11/4 11:59pm PST)

All you need to do is respond to this email and say SPOOKYK8S

And we will look up your email in our systems and add the additional days! 

Happy Halloween Y'all!


From Our Blog


Kubernetes Patterns  The Init Container Pattern

Kubernetes Patterns: The Init Container Pattern


In Kubernetes, an init container is the one that starts and executes before other containers in the same Pod. It’s meant to perform initialization logic for the main application hosted on the Pod.
What's inside:
  • The Initialization Pattern.
  • What are Init Containers?
  • Init Containers Design Considerations.
  • Init Containers “Requests” And “Limits” Behavior.
  • What Would Have Happened If We Hadn’t Used Init Containers?
Kubernetes Patterns  The Reflection Pattern

Kubernetes Patterns: The Reflection Pattern

Reflection is a concept that is available in most (if not all) programming languages. It simply refers to the ability of an object of some type to reveal important information about itself. In Cloud and DevOps arenas, the same concept holds.
What's inside:
  • What is “Reflection”?
  • Why Do We Need an Object’s Reflection?
  • The FieldRef Parameter.
  • The ResourceFieldRef Parameter.
  • Getting Pod Metadata After They’ve Been Modified


From the Community

Top 10 Container and Kubernetes Security Questions to Ask Your Team

Container and Kubernetes security can be difficult. It can be daunting to try and monitor and protect a container ecosystem of hundreds or thousands of containers spread across a dynamic hybrid or multi-cloud environment. Ultimately, though getting the desired cybersecurity outcome is often a function of making sure you ask the right questions in the first place. With the right questions, you can determine where your containers or Kubernetes are exposed to risk and what your options are to mitigate that risk and provide the best possible protection.

Read More....


The Power of Kubernetes — Done the Right Way

At the Dell EMC HPC and AI Innovation Lab in Austin, we’re focused heavily on the development, training and optimization of deep learning models that run in high performance computing environments. These models invariably come with a complex software stack that makes them difficult to deploy on individual servers, let alone dozens or hundreds of server nodes. This is why we use containers with Kubernetes orchestration to distribute and manage our applications.



Hello MicroK8s: A simpler Kubernetes

Kubernetes is rapidly becoming the de facto platform for container-based applications. Kubernetes automates the deployment and scaling of containerized applications and simplifies maintenance tasks such as updates and upgrades. The technology has been an incredible success story since Google open sourced it in 2014.

Read More....


How to Create a Security Risk Assessment for Containers in 5 Steps

When adopting containers, organizations need to create a risk profile for the types of threats and vulnerabilities they expect to experience. This type of analysis is especially important with containers, since the attack surface increases significantly, while the level of security visibility across hosts, containers, and the infrastructure control plane decreases.


If there is something you want us to include in a newsletter please send it to weekly@magalix.com

For more details about magalix agent:

Azure GCP marketplace

Magalix agent repo github_PNG58