You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/software_ready/_index.md
+9-1
Original file line number
Diff line number
Diff line change
@@ -5,4 +5,12 @@ title: Getting your software ready
5
5
### Decision Matrix
6
6
| Problem domain | Description | Reason for importance | Tool recommendation |
7
7
|:---:|:---:|:---:|:---:|
8
-
| Image Registry | A common place to store and fetch images | High availability, secure access control | Harbor |
8
+
| Image Registry | A common place to store and fetch images | High availability, secure access control ||
9
+
| Secret Management | Securely store and manage sensitive information like passwords and API keys | Prevent unauthorized access and data leaks ||
10
+
| Ingress Controller / Gateway API | Manage external access to services in the cluster | Enable routing, load balancing, and secure communication ||
11
+
| GitOps / Deployment Pipelines | Automate application deployments using Git as the source of truth | Ensure consistency, traceability, and faster deployments ||
12
+
| Monitoring Infrastructure | Observe and analyze the health and performance of the cluster and applications | Proactive issue detection and resolution ||
13
+
| Service Mesh | Manage service-to-service communication within the cluster | Enable observability, security, and traffic control ||
14
+
| Network Policies | Define rules for communication between pods and services | Enhance security by restricting unauthorized traffic ||
15
+
| Authorization Integration | Manage user and service access to cluster resources | Enforce role-based access control and compliance ||
16
+
| Container Scanning | Identify vulnerabilities in container images | Ensure secure and compliant deployments ||
0 commit comments