Kubernetes:
- Kube-scout: An alerting tool for Kubernetes clusters issues of all types, in real time, with intelligent redundancy, and easily extendable api,
- Kubernetes Security — Control pod to pod communications with Cilium network policies,
- ActiveMQ Artemis with Spring Boot on Kubernetes,
- Performance Testing Your Kubernetes Kafka Cluster,
- The 2 minute test for Kubernetes Pod Security,
- From dev to admin: an easy Kubernetes privilege escalation you should be aware of,
- Kubernetes OWASP Top 10: Intro,
- Power of PriorityClass in Kubernetes,
- Why Solr master-slave rocks on Kubernetes,
- Tasty: yum like utility to interact with olm operators,
- Kubernetes: export a clean yaml manifest that can be re-imported,
- Dynamic Configuration Operator: an operator that automatically updates deployment when an upstream ConfigMap or Secret is updated,
- Kubernetes Policy Management Whitepaper,
- Create Kubernetes Controller using Rego and MetaController,
- Hosting Your Own Helm Chart on GitHub with Chart Releaser,
- Kubernetes jobs market trends for 2022 Q2,
- Prometheus vs. OpenTelemetry Metrics: A Complete Guide,
- Migrate Your PSPs To Kubewarden Policies!
- The Complete Guide on GitOps: What Is It and How Can You Use It?
OpenShift:
- You’ve written a Kubernetes-native Application? Here is how OpenShift helps you to run, develop, build and deliver it – securely! (1/4),
- SaaS security in Kubernetes environments: A layered approach,
- OpenShift Latency & Bandwidth Testing for Edge,
- Delivering High-precision Clock Synchronization for Low-latency 5G Networks with OpenShift – Part 1,
- Quarkus for Architects who Sometimes Write Code – Introduction,
- Bootstrapping Cluster Configuration with RHACM and OpenShift GitOps,
- Additional OCP Networks,
- Automated dynamic application security testing with RapiDAST and cross-team collaboration,
- GitOps-based installation of operators made easy,
- OpenShift Data Foundation – the Hard Way,
- How to configure Helm charts using JKube, part 2,
- How to Create Automatically Updating Boot Source Images,
- OpenShift GitOps 1.6 Now Available,
- How to manage secrets in OpenShift/Kubernetes using Vault and External Secrets,
- A Guide to Azure Red Hat OpenShift’s Built-in Security Features,
- How to pull from secure docker registry which is using self signed certificate,
- Quick Java application setup using Kafka messaging,
- How to customize OpenShift roles for RBAC permissions,
Containers:
- Containerize .NET applications without writing Dockerfiles,
- How to manage pods in Podman with the REST API,
- How to limit container privilege with socket activation,
- How to restrict network access in Podman with systemd,
Service Mesh:
- Debugging k8s Issues: Intermittent Outbound TLS Issues with Linkerd,
- Learn Istio – How to Manage, Monitor, and Secure Microservices,
- Chaos Engineering With Service Mesh (Istio),
- Anthos Service Mesh — exposing service mesh application through GKE ingress,
- eBPF and Sidecars – Getting the Most Performance and Resiliency out of the Service Mesh,
RHEL:
- How to generate a Red Hat Enterprise Linux 9 image with MicroShift,
- Enhancing RHEL Security: Understanding SHA-1 deprecation on RHEL 9,
- Red Hat Satellite 6.11.1 has been released,
- Peeling back the layers and understanding automation mesh,
- Creating an Ansible controller config as code pipeline,
- Using hosted image builder via its API,
- NVIDIA Releases CUDA 11.7 U1 With Support For RHEL 9.0,
- Introducing a framework for measuring supply chain security maturity,
- Running a Debuginfod server alongside pulp,
Certifications:
- Vim Tips & Tricks for the Kubernetes CKA exam,
- CKA Exam Study Guide (Certified Kubernetes Administrator),
- Inside a Red Hat Certification Exam: What you need to know (8 min),
Miscellaneous:
- How to hide PID listings from non-root users in Linux,
- Virtio-net failover: An introduction,
- Linux tool alternatives: 6 replacements for traditional favorites,
- Cilium 1.12 – Ingress, Multi-Cluster, Service Mesh, External Workloads, and much more,
- 7 benefits of using design review in your agile architecture practices,
- A ‘Worst Nightmare’ Cyberattack: The Untold Story Of The SolarWinds Hack,
- Raise the bar with an SBAR,
- Go 1.19 is released!
- Fedora 37 To Offer Official Support On Raspberry Pi 4 Devices,
- Recipes and Tricks for Effective Structural Pattern Matching in Python,
- Add custom windows to GDB: Programming the TUI in Python,
- Linux 6.0 Adding Run-Time Verification For Running On Safety Critical Systems,
- Display dynamic content from GDB in a custom window,
- Kafka Monthly Digest: July 2022,
- 10 nonfunctional requirements to consider in your enterprise architecture.
Recent Comments