ContentPosts from @srele96..
Link
@faun shared a link, 5 months, 2 weeks ago
FAUN.dev()

Securing Kubernetes 1.33 Pods: The Impact of User Namespace Isolation

Kubernetes 1.33rolls out with a security upgrade. It flips the switch onuser namespacesby default, shoving pods into the safety zone as unprivileged users. Potential breaches? Curbed. But don't get too comfy—idmap-capable file systems and up-to-date runtimes are now your new best friends if you want.. read more  

Securing Kubernetes 1.33 Pods: The Impact of User Namespace Isolation
Link
@faun shared a link, 5 months, 2 weeks ago
FAUN.dev()

Kubernetes Observability with OpenTelemetry | A Complete Setup Guide

OpenTelemetrydelivers a full observability package for Kubernetes—traces, metrics, logs—all without handcuffs to a single vendor. Deployyour own OTEL Collectorson Minikube usingHelm charts. Dive into node and pod-level metrics and grab those can't-miss Kubernetes cluster events... read more  

Kubernetes Observability with OpenTelemetry | A Complete Setup Guide
Link
@faun shared a link, 5 months, 2 weeks ago
FAUN.dev()

Post-Quantum Cryptography in Kubernetes

Kubernetes v1.33quietly rides thepost-quantum securitywave, thanks to Go 1.24's hybrid key exchanges. Watch out for version mismatches, though—those could sneakily downgrade your defenses... read more  

Link
@faun shared a link, 5 months, 2 weeks ago
FAUN.dev()

Kubernetes Scaling Strategies

Horizontal Pod Autoscaler(HPA) cranks up pods based on CPU, memory, or custom quirks. A dream for stateless adventures, but you'll need a metrics server.Vertical Pod Autoscaler(VPA) fine-tunes CPU and memory for pods. Works like a charm for jobs where scaling out is sketchy, though it demands restar.. read more  

Kubernetes Scaling Strategies
Link
@faun shared a link, 5 months, 2 weeks ago
FAUN.dev()

Rethinking Node Drains: A Webhook Based Approach to Graceful Pod Removal

Eviction Reschedule Hooksticks its nose in Kubernetes eviction requests, letting operator-managed stateful apps wriggle their way through node drains without breaking a sweat. 🎯.. read more  

Rethinking Node Drains: A Webhook Based Approach to Graceful Pod Removal
Link
@faun shared a link, 5 months, 2 weeks ago
FAUN.dev()

Zendesk Streamlines Infrastructure Provisioning with Foundation Interface Platform

Zendeskhas tossed out the old playbook with itsFoundation Interface. Forget the guessing games of infrastructure provisioning; engineers now scribble their demands in YAML, and voilà—magic happens. Kubernetes operators step in, spinning these requests into Custom Resources. It’s self-service nirvana.. read more  

Zendesk Streamlines Infrastructure Provisioning with Foundation Interface Platform
Link
@faun shared a link, 5 months, 2 weeks ago
FAUN.dev()

OpenShift LACP bonding performance expectations

Red Hat OpenShift and NIC bonding for high availability is getting popular in data centers. Consider layer2/layer2+3 configurations for balanced traffic distribution across bonded links. Layer3+4 hashing offers highest throughput but may lead to out-of-order packets due to 802.3ad non-compliance. It.. read more  

Story
@laura_garcia shared a post, 5 months, 2 weeks ago
Software Developer, RELIANOID

🚨 Is Your Business Ready for a Cyber Crisis? 🚨

A cyberattack can strike at any time—causing operational disruption, financial loss, and reputational damage. Preparing for and effectively managing a cyber crisis is no longer optional—it's essential. At RELIANOID, we help businesses build robust cyber resilience through advanced solutions and expe..

Blog Preparing and Managing a Cyber Crisis RELIANOID
Link
@anjali shared a link, 5 months, 2 weeks ago
Customer Marketing Manager, Last9

Monitor Nginx with OpenTelemetry Tracing

Instrument NGINX with OpenTelemetry to capture traces, track latency, and connect upstream and downstream services in a single request flow.

Nginx_opentelemetry
Story
@laura_garcia shared a post, 5 months, 2 weeks ago
Software Developer, RELIANOID

🔐 Zero-Trust Micro-Segmentation in Industrial Environments

In today's connected industrial world, the convergence of IT & OT brings efficiency—but also new risks. That’s why Zero-Trust Micro-Segmentation is no longer optional. 📌 It divides your network into isolated zones, applies strict access rules, and assumes no user or device is inherently trusted. ✅ K..

Industrial Zero-Trust Micro-Segmentation