Kubernetes:
- Managing many Helm Charts with Kluctl,
- Kubernetes FinOps: A Platform Engineer’s Perspective,
- From Pod Security Policies to Pod Security Standards – a Migration Guide,
- Understand the difference between Deployments and ReplicaSet,
- Kubernetes: DaemonSets,
- Blue-Green Deployment using Kubernetes,
- kcp: Kubernetes-like control plane,
- Is Cluster API Really the Future of Kubernetes Deployment?
- How To Inject Secrets in Pods To Improve Security with Hashicorp Vault in 5 Minutes,
- Shhhh… Kubernetes Secrets Are Not Really Secret!
- Installation and integration of Hashicorp Vault on Kubernetes,
- In Whom We Trust,
- An OPA Gatekeeper gotcha when enforcing policy on all resource kinds,
- etcdadm: a command-line tool for operating an etcd cluster,
- Kubernetes Removals and Major Changes In v1.27,
- Helm for Kubernetes. GitOps with Argo CD,
- Let’s talk about anonymous access to Kubernetes,
- Trivy-Operator – Improve Container Runtime Security,
- Where does the kubelet mount volumes?
- How to use Kubernetes events for effective alerting and monitoring,
- Popeye: a Kubernetes cluster resource sanitizer,
- GitOps: Multi-Tenancy with Argo CD,
- Getting Started With Falco,
- Microsoft Adds Support for Pod Sandboxing to Azure Kubernetes Service,
- Kubernetes Meets Event-Driven Ansible,
- Liveness Probes: Feel the Pulse of the App,
- Network policies are not the right abstraction (for developers),
- A container with common utilities for debugging your cluster,
- Let’s Encrypt Certificate using Cert-Manager on Kubernetes (HTTP Challenge),
- Vault with Secrets Store CSI Driver on Kubernetes,
OpenShift:
- Your guide to TAP devices in OpenShift pods,
- Your guide to VLANs based on container namespaced interfaces in OpenShift pods,
- OpenShift/Kubernetes Chaos Stories,
- Azure Red Hat OpenShift releases multi-version support, OpenShift 4.11 for ARO and more,
- Agent-based OpenShift installation,
- Openshift Essentials and Modern App Dev on Kubernetes,
- From Single Node to Multi-Node – Building a Resilient OpenShift Home Lab,
- Guide: Install OKD 4.12 using IPI on Nutanix CE 2.0,
- How to easily deploy OpenShift on Azure using a GUI, Part 1,
- How to easily deploy OpenShift on Azure via GitOps, Part 2,
- How to enable cross-cluster networking in Kubernetes with the Submariner add-on,
- New reference architecture: Deploying Ansible Automation Platform 2 on Red Hat OpenShift,
- OpenShift compared to the Sidero Platform,
- IPv6 in Kubernetes & OpenShift,
- A Guide to multi-cluster GitOps with Policy Generator and Kustomize,
- A Guide to OpenShift Compliance Operator Best Practices,
- A guide to Kubeflow, MPI and OpenFOAM with OpenShift Pipelines,
- GitOps for organizations: provisioning and configuring OpenShift clusters automatically,
- Save power with per-pod power management for latency-sensitive workloads,
- How I created a Red Hat OpenShift cluster on tiny hardware,
- How to gather baseline metrics on Kubernetes resource utilization,
Containers:
- Container security fundamentals part 2: Isolation & namespaces,
- Top 6 Threat Detection Tools for Containers,
- Container Security Checklist: From the image to the workload,
- Bit-for-bit reproducible builds with Dockerfile,
- Storing sensitive data using Podman secrets: Which method should you use?
- Hirte: A new state machine for managing systemd based services and containers on multi-node systems,
- How to create multidomain web applications with Podman and Nginx,
- Podman machine for Microsoft HyperV – Step 1,
- Build Your Own Grype Database,
- 10 tips for writing secure, maintainable Dockerfiles,
Service Mesh:
- Service Mesh — Istio vs Linkerd,
- Understanding Istio and Open Policy Agent (OPA),
- How Kiali caches Prometheus data,
- Traffic in ambient mesh: Istio CNI and node configuration,
- Traffic in ambient mesh: Redirection using iptables and GENEVE tunnels,
- Traffic in ambient mesh: Ztunnel, eBPF configuration, and waypoint proxies,
- Kiali releases 1.58 to 1.65: Features update,
RHEL:
- 4 good habits for building Ansible Automation Platform execution environments,
- How to use automation controller to install MS SQL,
- Enhancing/Maximizing your Scaling capability with Automation Controller 2.3,
- A tutorial on Middleware Automation Collections,
- Automate execution environment builds with Ansible Automation Platform,
- Red Hat Satellite 6.11.5 has been released,
- Supply chain optimization,
- The supply chain optimization imperative,
- A sysadmin’s guide to SELinux: 42 answers to the big questions,
- Red Hat Donates Kepler Tool for Tracking Power Usage to CNCF,
- Build a golden image for your RHEL homelab with Image Builder,
- Optimizing development with the time to merge tool,
- Red Hat Named a Leader in Infrastructure Automation by Industry Research Firm,
- Developing your RHEL image builder strategy,
- Red Hat Summit 2023 session catalog and agenda builder now available,
- How to back up and restore Red Hat Ansible Automation Platform,
- How to deploy RHEL in the cloud: Pay as you go vs. bring-your-own-subscription,
Certifications:
- OSCP Reborn – 2023 Exam Preparation Guide,
- Curated list of hacking environments where you can train your cyber skills legally and safely,
- Passing the CKAD: My Experience and Study Tips,
- Passing the CKS exam: My Experience and Study Tips,
- Tips for passing your next IT certification exam,
- OpenShift Interview Questions,
Miscellaneous:
- Open Policy Agent v0.50.0 release announcement,
- Kafka and Its Alternatives: A high-level comparison of Proprietary and Open-Source Solutions,
- Handle exceptions in Ansible Playbooks with block and rescue,
- How to install Fedora IoT on Raspberry Pi 4,
- How to Check SRIOV NIC Card and Map Network Interface Name which is using it?
- Announcing Fedora Linux 38 Beta,
- Fedora 38 Beta now available,
- GPT-4 overview,
- How to cache Ansible facts with MongoDB,
- Amazon Linux 2023, a Cloud-Optimized Linux Distribution with Long-Term Support,
- Announcing TypeScript 5.0,
- Endor Labs Station 9’s Top 10 Open Source Security Risks,
- You’ll Soon Be Using Vulnerability Exploitability eXchange,
- SLSA++: a Survey of Software Supply Chain Security Practices and Beliefs,
- Google Perspectives on Security Volume One: Securing Software Supply Chains,
- Linking Traces with Continuous Profiling using Pyroscope,
- Bringing Rust to the Xen Project,
- ChatGPT Now Available in Preview on Microsoft’s Azure OpenAI Service,
- Cohere vs. OpenAI in the Enterprise: Which Will CIOs Choose?
- Rust Support Is Being Built into the GNU GCC Compiler,
- Create a libvirt network with Open vSwitch,
- Providing Terraform with that Ansible Magic,
- Introducing wazero from Tetrate,
- How to investigate 7 common problems in production (nodejs),
- 7 steps for implementing security automation in your IT architecture,
- How to enable OpenTelemetry traces in React applications,
- NetworkManager: Limiting Bond Subordinate devices by MAC Address,
- Test GitHub projects with GitHub Actions and Testing Farm,
- Orange Pi 5 Is A Great & Very Fast Alternative To The Raspberry Pi 4,
- Use sysfs to restart failed PCI devices (WiFi cards, sound cards, etc.).
Recent Comments