Join us

ContentUpdates and recent posts about Apigee..
Link
@faun shared a link, 7 months, 1 week ago
FAUN.dev()

Kubernetes right-sizing with metrics-driven GitOps automation

AWS just dropped a GitOps-native pattern for tuning EKS resources—built to runoutsidethe cluster. It’s wired up withAmazon Managed Service for Prometheus,Argo CD, andBedrockto automate resource recommendations straight into Git. Here’s the play: it maps usage metrics to templated manifests, then sp.. read more  

Kubernetes right-sizing with metrics-driven GitOps automation
Link
@faun shared a link, 7 months, 1 week ago
FAUN.dev()

Kubernetes Primer: Dynamic Resource Allocation (DRA) for GPU Workloads

Kubernetes 1.34 brings serious heat for anyone juggling GPUs or accelerators. MeetDynamic Resource Allocation (DRA)—a new way to schedule hardware like you mean it. DRA addsResourceClaims,DeviceClasses, andResourceSlices, slicing device management away from pod specs. It replaces the old device plu.. read more  

Kubernetes Primer: Dynamic Resource Allocation (DRA) for GPU Workloads
Link
@faun shared a link, 7 months, 1 week ago
FAUN.dev()

Lucidity turns spotlight onto Kubernetes storage costs

Lucidity has upgraded itsAutoScaler. It now handles persistent volumes on AWS-hosted Kubernetes, automatically scaling storage and reducing waste. The upgrade bringspod-level isolation,fault tolerance, andbulk Linux onboarding. Azure and GCP are next on the list... read more  

Lucidity turns spotlight onto Kubernetes storage costs
Link
@faun shared a link, 7 months, 1 week ago
FAUN.dev()

The Quiet Revolution in Kubernetes Security

Nigel Douglas discusses the challenges of security in Kubernetes, particularly with traditional base operating systems. Talos Linux offers a different approach with a secure-by-default, API-driven model specifically for Kubernetes. CISOs play a critical role in guiding organizations through the shif.. read more  

Link
@faun shared a link, 7 months, 1 week ago
FAUN.dev()

Kubernetes DNS Exploit Enables Git Credential Theft from ArgoCD

A new attack chain messes withKubernetes DNS resolutionandArgoCD’s certificate injectionto swipe GitHub credentials. With the right permissions, a user inside the cluster can reroute GitOps traffic to a fake internal service, sniff auth headers, and quietly walk off with tokens. What’s broken:GitOp.. read more  

Kubernetes DNS Exploit Enables Git Credential Theft from ArgoCD
Link
@faun shared a link, 7 months, 1 week ago
FAUN.dev()

Kubernetes VPA: Limitations, Best Practices, and the Future of Pod Rightsizing

Kubernetes'Vertical Pod Autoscaler (VPA)tries to be helpful by tweaking CPU and memory requests on the fly. Problem is, it needs to bounce your pods to do it. And if you're also runningHorizontal Pod Autoscaler (HPA)on the same metrics? Now they're fighting over control. VPA sees a narrow slice of .. read more  

Kubernetes VPA: Limitations, Best Practices, and the Future of Pod Rightsizing
Link
@faun shared a link, 7 months, 1 week ago
FAUN.dev()

Rethinking Efficiency for Cloud-Native AI Workloads

AI isn’t just burning compute—it's torching old-school FinOps. Reserved Instances? Idle detection? Cute, but not built for GPU bottlenecks and model-heavy pipelines. What’s actually happening:Infra teams are ditching cost-first playbooks for something smarter—business-aligned orchestrationthat chas.. read more  

Rethinking Efficiency for Cloud-Native AI Workloads
Link
@faun shared a link, 7 months, 1 week ago
FAUN.dev()

Dynamic Kubernetes request right sizing with Kubecost

Kubecost’s Amazon EKS add-on now handlesautomated container request right-sizing. That means teams can tweak CPU and memory requests based on actual usage—once or on a recurring schedule. Optimization profiles are customizable, and resizing can be baked into cluster setup using Helm. Yes, that mean.. read more  

Dynamic Kubernetes request right sizing with Kubecost
Link
@faun shared a link, 7 months, 1 week ago
FAUN.dev()

Why I Ditched Docker for Podman (And You Should Too)

Older container technologies like Docker have been prone to security vulnerabilities, such as CVE-2019-5736 and CVE-2022-0847, which allowed for potential host system compromise. Podman changes the game by eliminating the need for a persistent background service like the Docker daemon, enhancing sec.. read more  

Story
@laura_garcia shared a post, 7 months, 2 weeks ago
Software Developer, RELIANOID

🌐 NIS2 is reshaping cybersecurity compliance across Europe.

At RELIANOID, we are fully aligned and compliant with NIS2 requirements, helping organizations strengthen their security posture. 👉 Explore more: https://www.relianoid.com/security-compliances/relianoid-nis2-compliance/ #NIS2#CyberSecurity#Compliance#Regulation#EUCompliance#InfoSec#DataProtection#Go..

nis2 compliance RELIANOID
Apigee is an enterprise-grade API management platform that helps organizations build, manage, and secure APIs at scale. It provides a centralized control plane for exposing backend services as APIs while enforcing security, traffic management, and governance policies.

Apigee supports the complete API lifecycle, including design, versioning, deployment, monitoring, and monetization. It acts as an API gateway, handling concerns such as authentication, authorization, rate limiting, quotas, caching, request transformation, and threat protection without requiring changes to backend services.

The platform offers deep analytics and observability, allowing teams to track API usage, latency, error rates, and consumer behavior. These insights help improve API reliability, performance, and product decisions. Apigee also includes developer portal capabilities, enabling organizations to onboard external and internal developers, publish API documentation, and manage API keys.

Apigee integrates natively with Google Cloud services and supports hybrid and multi-cloud deployments, allowing APIs to run on-premises, in Google Cloud, or across other cloud providers. It supports modern architectures including microservices, Kubernetes-based backends, and service meshes, and is commonly used in regulated industries that require strong security and compliance controls.