Join us

ContentUpdates and recent posts about Kata Containers..
Link
@kaptain shared a link, 1 month, 3 weeks ago
FAUN.dev()

Debugging container image creation with a Dockerfile

Docker just made debugging Dockerfiles inVS Codefeel like real development. With the latest Docker extension and Docker Desktop update, you can now set breakpoints, step through builds with F10/F11, poke at variables, and mess with the container’s file system mid-build... read more  

Debugging container image creation with a Dockerfile
Link
@kaptain shared a link, 1 month, 3 weeks ago
FAUN.dev()

Kubernetes Gateway API in action

The Kubernetes Gateway API leveled up - unifying North-South, East-West, and egress traffic with standard CRDs likeGRPCRoute,HTTPRoute, andReferenceGrant. In a Linkerd world, that means clean, declarative canary releases, granular egress control to outside APIs (say, Mistral AI), and clearer lines b.. read more  

Kubernetes Gateway API in action
Link
@kaptain shared a link, 1 month, 3 weeks ago
FAUN.dev()

Bootstrapping Rancher’s RKE2 Kubernetes Cluster on a Podman VM with Cilium CNI and MetalLB LoadBalancer

Running RKE2 with Cilium and MetalLB in a lightweight Podman VM on macOS enables experimentation with Kubernetes. Unique network challenges require SSH port forwarding for service exposure... read more  

Link
@kaptain shared a link, 1 month, 3 weeks ago
FAUN.dev()

Spotlight on Policy Working Group

The Kubernetes Policy Working Group got busy turning good intentions into real specs. They rolled out thePolicy Reports API, dropped best-practice docs worth reading, and helped steerValidatingAdmissionPolicyandMutatingAdmissionPolicytoward GA. Their work pulled inSIG Auth,SIG Security, and anyone e.. read more  

Link
@kaptain shared a link, 1 month, 3 weeks ago
FAUN.dev()

7 Common Kubernetes Pitfalls (and How I Learned to Avoid Them)

Seven ways folks trip over Kubernetes - each more avoidable than the last. Top offenses: skippingresource requests/limits, forgettinghealth probes, trustingephemeral logsthat vanish when you need them. Reusing configs across dev and prod? Still a bad idea. Pushing off observability until it’s on fir.. read more  

Link
@kaptain shared a link, 1 month, 3 weeks ago
FAUN.dev()

Exposing Kubernetes Services Without Cloud LoadBalancers: A Practical Guide

Bare-metal Kubernetes just got a cloud-style glow-up. By wiring upMetalLBin layer2 mode with theNGINX ingress controller, the setup exposesLoadBalancer-typeservices—no cloud provider in sight. MetalLB dishes out static, LAN-routable IPs. NGINX funnels external traffic to internalClusterIPservices th.. read more  

Exposing Kubernetes Services Without Cloud LoadBalancers: A Practical Guide
Link
@kaptain shared a link, 1 month, 3 weeks ago
FAUN.dev()

How to manage EKS Pod Identities at scale using Argo CD and AWS ACK

AWS shows how to wire upArgo CDwithAWS Controllers for Kubernetes (ACK)to automateEKS Pod Identityfor IAM roles - GitOps-style. The catch? The Pod Identity API has a lag. So they bolt on apre-deployment validation jobto wait-and-confirm that the IAM role's actually bound before app pods come online... read more  

Link
@kaptain shared a link, 1 month, 3 weeks ago
FAUN.dev()

Replaying massive data in a non-production environment using Pekko Streams and Kubernetes Pekko Cluster

DoubleVerify built a traffic replay tool that actually scales. It runs onPekko StreamsandPekko Cluster, pumping real production-like traffic into non-prod setups. Throttlenails the RPS with precision for functional tests.Distributed datasyncs stressful loads across cluster nodes without breaking a s.. read more  

Replaying massive data in a non-production environment using Pekko Streams and Kubernetes Pekko Cluster
Link
@kala shared a link, 1 month, 3 weeks ago
FAUN.dev()

Why open source may not survive the rise of generative AI

Generative AI is snapping the attribution chain thatcopyleft licenseslike theGNU GPLrely on. Without clear provenance, license terms get lost. Compliance? Forget it. The give-and-take that powersFOSSstops giving - or taking... read more  

Why open source may not survive the rise of generative AI
Link
@kala shared a link, 1 month, 3 weeks ago
FAUN.dev()

I regret building this $3000 Pi AI cluster

A 10-node Raspberry Pi 5 cluster built with16GB CM5 Lite modulestopped out at325 Gflops- then got lapped by an $8K x86 Framework PC cluster running4x faster. On the bright side? The Pi setup edged out in energy efficiency when pushed to thermal limits. It came with160 GB total RAM, but that didn’t h.. read more  

I regret building this $3000 Pi AI cluster
Kata Containers is a Cloud Native Computing Foundation (CNCF) project designed to close the security gap between traditional Linux containers and virtual machines. Instead of sharing a single host kernel like standard containers, Kata Containers launches each pod or container inside its own lightweight virtual machine using hardware virtualization.

This approach dramatically reduces the attack surface and prevents container escape vulnerabilities, making Kata ideal for multi-tenant, untrusted, or sensitive workloads. Despite using VMs under the hood, Kata is optimized for fast startup times and integrates seamlessly with Kubernetes through the Container Runtime Interface (CRI), allowing it to be used alongside runtimes like containerd and CRI-O.

Kata Containers is commonly used in scenarios such as multi-tenant Kubernetes clusters, confidential computing, sandboxed AI workloads, serverless platforms, and agent execution environments where strong isolation is mandatory. It supports multiple hypervisors, including QEMU, Firecracker, and Cloud Hypervisor, and continues to evolve toward faster boot times, lower memory overhead, and better hardware acceleration support.