Interesting Kubernetes Interview Questions and Answers<\/a>
\n<\/span><\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"Vulnerability scanning in Kubernetes refers to the systematic scanning of images for finding any possible susceptibilities in a Kubernetes environment. It should include the software dependencies of a component and scan for vulnerabilities from the containers in order to find out the known vulnerabilities that could potentially leave such instances open to exploit. Using Kubernetes […]<\/p>\n","protected":false},"author":5,"featured_media":228924,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/www.devsecops.ltd\/wp-json\/wp\/v2\/posts\/228923"}],"collection":[{"href":"https:\/\/www.devsecops.ltd\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.devsecops.ltd\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.devsecops.ltd\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.devsecops.ltd\/wp-json\/wp\/v2\/comments?post=228923"}],"version-history":[{"count":9,"href":"https:\/\/www.devsecops.ltd\/wp-json\/wp\/v2\/posts\/228923\/revisions"}],"predecessor-version":[{"id":242232,"href":"https:\/\/www.devsecops.ltd\/wp-json\/wp\/v2\/posts\/228923\/revisions\/242232"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.devsecops.ltd\/wp-json\/wp\/v2\/media\/228924"}],"wp:attachment":[{"href":"https:\/\/www.devsecops.ltd\/wp-json\/wp\/v2\/media?parent=228923"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.devsecops.ltd\/wp-json\/wp\/v2\/categories?post=228923"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.devsecops.ltd\/wp-json\/wp\/v2\/tags?post=228923"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}