{"version":"1.0","provider_name":"Urolime Blogs","provider_url":"https:\/\/www.urolime.com\/blogs\/uk","author_name":"Urolime Technologies","author_url":"https:\/\/www.urolime.com\/blogs\/uk\/author\/blogadmin\/","title":"Kubernetes Security Challenges; Top Tools Available - Urolime Blogs","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Yyb1IPCPJ6\"><a href=\"https:\/\/www.urolime.com\/blogs\/uk\/kubernetes-security-challenges-top-tools-available\/\">Kubernetes Security Challenges; Top Tools Available<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.urolime.com\/blogs\/uk\/kubernetes-security-challenges-top-tools-available\/embed\/#?secret=Yyb1IPCPJ6\" width=\"600\" height=\"338\" title=\"&#8220;Kubernetes Security Challenges; Top Tools Available&#8221; &#8212; Urolime Blogs\" data-secret=\"Yyb1IPCPJ6\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.urolime.com\/blogs\/uk\/wp-content\/uploads\/sites\/3\/2019\/09\/kubernetes-security-challenges-tools.png","thumbnail_width":768,"thumbnail_height":432,"description":"Kubernetes automates most of all the tasks required to run a containerized application at a scale which includes the deployment of the container, intercommunication between containers, load balancing across the nodes or the clusters of host servers, etc. Handling the containers manually using the command line is a messy job since it requires maximum concentration [&hellip;]"}