ContentPosts from @kaptain..
Link
@kaptain shared a link, 5 days, 13 hours ago
FAUN.dev()

AWS Backup now supports Amazon EKS

AWS Backup just added support forAmazon EKS. Now you can back up cluster state and persistent volumes, no agents, no third-party hacks. It handles scheduling, retention, and immutability out of the box. Restore full clusters or drill down to specific components, even across Regions and accounts... read more  

Link
@kaptain shared a link, 5 days, 13 hours ago
FAUN.dev()

ConfigHub: Why Your Internal Developer Platform Needs It

See why GitOps often feels like a sprawl of configs, discover how to manage Configuration as Data for your Kubernetes platform, and learn how ConfigHub can help... read more  

Link
@kaptain shared a link, 5 days, 13 hours ago
FAUN.dev()

Using Komodo to Run Docker Commands from a Web Interface

Komodo drops a slick browser-based UI for wrangling Docker - containers, images, networks, and Compose stacks - through a real-time visual dashboard. Think native Docker meets one-click redeploys, host curation via agents, and reusable container configs that don’t make you hate YAML... read more  

Using Komodo to Run Docker Commands from a Web Interface
Link
@kaptain shared a link, 5 days, 13 hours ago
FAUN.dev()

KServe becomes a CNCF incubating project

KServe is upgrading.The CNCF pulled it into incubation, backing it astheKubernetes-native way to serve both generative and predictive AI. Translation: it’s not a side project anymore - it’s core infra. Version 0.15 steps up with tighter integrations across the stack:vLLM,Envoy Gateway,llm-d,Knative,.. read more  

KServe becomes a CNCF incubating project
Link
@kaptain shared a link, 5 days, 13 hours ago
FAUN.dev()

Amazon Elastic Kubernetes Service gets independent affirmation of its zero operator access design

Amazon EKS just went full Fort Knox. It now runs on azero operator accessmodel - meaning even AWS can’t peek inside your Kubernetes control or data plane. The setup leans on theNitro System’s confidential compute,guarded APIs, andmulti-party approval pipelines. NCC Group also kicked the tires and ga.. read more  

Link
@kaptain shared a link, 5 days, 13 hours ago
FAUN.dev()

Streamline Complex AI Inference on Kubernetes with NVIDIA Grove

NVIDIA releasedGrove, a Kubernetes API baked intoDynamo, to wrangle the chaos of modern AI inference. It pulls apart your big, messy model into clean, discrete chunks - prefill, decode, routing - and runs them like a single, orchestrated act. The trick?Custom hierarchical resources. They let Grove h.. read more  

Link
@kaptain shared a link, 5 days, 13 hours ago
FAUN.dev()

Prepare for the Kubernetes Administrator Certification and Pass

A tight 2-hour YouTube course built for theCKA examgrind. It's all real-world tasks: cluster setup, upgrades, troubleshooting. No fluff, just shell commands and Kubernetes in action. It walks through the gritty bits:etcdbackup and restore, node affinity, tolerations, and how to set upIngresslike som.. read more  

Prepare for the Kubernetes Administrator Certification and Pass
News FAUN.dev() Team Trending
@kaptain shared an update, 6 days, 14 hours ago
FAUN.dev()

CNCF Launches Certified Kubernetes AI Conformance Program at KubeCon

Kubernetes

The Cloud Native Computing Foundation launched the Certified Kubernetes AI Conformance Program to set standards for AI workloads on Kubernetes, ensuring reliability and consistency.

CNCF Launches Certified Kubernetes AI Conformance Program at KubeCon
News FAUN.dev() Team Trending
@kaptain shared an update, 1 week ago
FAUN.dev()

Microsoft Defender Now Blocks Pod Privilege Escalation

JFrog Artifactory Microsoft Defender for Cloud

Microsoft Defender for Cloud enhances Kubernetes security with new features, updates container vulnerability re-scan policies, and expands support for Jfrog Artifactory and Docker Hub.

Microsoft Defender Now Blocks Pod Privilege Escalation
Link
@kaptain shared a link, 1 week, 5 days ago
FAUN.dev()

LinkPro: eBPF rootkit analysis

A new stealth rootkit calledLinkProjust surfaced, taking aim at AWS-hosted Linux boxes. It blends two customeBPF programsfor deep concealment and remote activation via magic packets. The path in?CVE-2024-23897—an RCE on a public Jenkins server. From there, attackers slipped into Amazon EKS clusters,.. read more  

LinkPro: eBPF rootkit analysis