-
Notifications
You must be signed in to change notification settings - Fork 2
/
Copy path_config.yml
58 lines (50 loc) · 1.94 KB
/
_config.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
# Configuration file for GitHub Pages
# Build settings
markdown: kramdown
remote_theme: pmarsceill/just-the-docs
plugins:
- jekyll-remote-theme
- jekyll-feed
color_scheme: dark
# Site settings
title: KodeKloud CKS Challenge
description: The challenge series test the skills and understanding of Kubernetes security concepts. The challenges in this series cover a broad range of Kubernetes security topics, including network policies, RBAC, seccomp, AppArmor, and others.
url: https://krishanthisera.github.io/
baseurl: /CKS-Challenges/
# GitHub Pages settings
repository: krishanthisera/CKS-Challenges
# Navigation links
navbar:
title: KodeKloud CKS Challenge
links:
- title: Introduction
url: /
description: "Challenge 01: Focused on Trivy and AppArmor"
- title: Challenge 01
url: /challenge-01/
description: "Challenge 01: Focused on Trivy and AppArmor"
- title: Challenge 02
url: /challenge-02/
description: "Challenge 02: Focused on securing Docker image and kubernetes manifests"
- title: Challenge 03
url: /challenge-03/
description: "Challenge 03: Focused on kube-bench and CIS benchmark"
- title: Challenge 04
url: /challenge-04/
description: "Challenge 04: Focused on how to analysis/audit suspicious behaviors using, using Falco and Kubernetes auditing."
# Sidebar links
sidebar:
- title: Challenges
children:
- title: Challenge 01
url: /challenge-01/
description: "Challenge 01: Focused on Trivy and AppArmor"
- title: Challenge 02
url: /challenge-02/
description: "Challenge 02: Focused on securing Docker image and kubernetes manifests"
- title: Challenge 03
url: /challenge-03/
description: "Challenge 03: Focused on kube-bench and CIS benchmark"
- title: Challenge 04
url: /challenge-04/
description: "Challenge 04: Focused on how to analysis/audit suspicious behaviors using, using Falco and Kubernetes auditing"