Join us

ContentUpdates and recent posts about ForgeMT..
Link
@faun shared a link, 1 week, 4 days ago

v1.34: Pods Report DRA Resource Health

Kubernetes v1.34 lands with an alpha upgrade to **[KEP-4680](https://github.com/kubernetes/enhancements/tree/master/keps/sig-node/4680-add-resource-health-to-pod-status)**, pushing **Dynamic Resource Allocation (DRA)** into smarter territory: health-aware Pods. DRA drivers can now stream device heal..

Link
@faun shared a link, 1 week, 4 days ago

v1.34: Decoupled Taint Manager Is Now Stable

Kubernetes 1.34 graduates the taint eviction controller to GA. Now, the node lifecycle controller only applies taints, while a dedicated taint eviction controller manages pod eviction. First split in 1.29, now stable in 1.34...

Link
@faun shared a link, 1 week, 4 days ago

v1.34: Recovery From Volume Expansion Failure (GA)

Kubernetes v1.34 bumps **automated recovery from botched PVC expansions** to GA. Users can now fix bad volume size requests—no admin, no drama. It cleans up unused quota, slows down retry spam, and surfaces progress with new PVC status fields...

Link
@faun shared a link, 1 week, 4 days ago

Kubernetes Security: Best Practices to Protect Your Cluster

A new JetBrains IDE plugin throws Kubernetes security best practices straight into your deployment manifests—right where they belong. Think: checks for `runAsRoot`, privileged mode, `hostPath`, host ports, and sketchy sysctls. No hand-waving. It enforces stuff like: - Default `runAsNonRoot` - Drop ..

Kubernetes Security: Best Practices to Protect Your Cluster
 Activity
@gforceauto started using tool Blazor , 1 week, 6 days ago.
 Activity
@gforceauto started using tool All in One SEO Pack , 1 week, 6 days ago.
Story Trending
@laura_garcia shared a post, 2 weeks ago
Software Developer, RELIANOID

Secure Boot Advanced Targeting (SBAT): Scaling Boot Security 🔐

Discover how SBAT enhances Secure Boot by introducing a smarter way to handle vulnerabilities, reducing overhead, and ensuring your system's boot process stays secure. Learn how it works, how it addresses scalability, and why it's a game-changer for modern boot security across Linux and Windows envi..

KB-Secure Boot Advanced Targeting
 Activity
@cristofepascale started using tool AWS EKS , 2 weeks ago.
 Activity
@3duardo_4ndrad3 started using tool Zabbix , 2 weeks, 1 day ago.
 Activity
@3duardo_4ndrad3 started using tool AWS EKS , 2 weeks, 1 day ago.
ForgeMT is an open-source, production-grade platform designed to solve the complexity of running GitHub Actions runners at scale. Instead of teams managing their own fragile and duplicated CI runner setups, ForgeMT centralizes orchestration into a single, multi-tenant system built for scalability, security, and cost efficiency.

The platform provisions ephemeral runners on both EC2 and Kubernetes (EKS) using Terraform and Terragrunt, ensuring workloads scale up instantly and tear down to zero when idle, reducing costs. It enforces strong tenant isolation with AWS IAM, OIDC integration, and network segmentation, giving each team a secure boundary without requiring separate infrastructure.

ForgeMT integrates seamlessly with GitHub via a GitHub App and webhook events, automatically spinning up the right type of runner when jobs start. It supports advanced autoscaling strategies with Karpenter, spot instance optimization, and observability through centralized logging and monitoring.

By removing operational overhead, ForgeMT helps organizations accelerate delivery, cut cloud costs, and meet security requirements — all while giving developers fast, ephemeral CI runners that just work.