ExplanationΒΆ
- Application modelling
- About charming history
- Charms vs. Kubernetes operators
- Juju security
- TLS-encrypted communication
- User authentication
- Role-based access
- Agent authentication
- Rate limiting
- Database authentication
- No plaintext passwords in the database
- High availability
- Filesystem permissions
- Regular backups
- Time-limited tokens
- Secrets and secret backends
- No sensitive information in logs
- Auditing and logging
- Guided, tested, and maintained operations code
- Regular updates and patches
- Kubernetes in Juju
- Performance with Juju