Join us

ContentUpdates and recent posts about Pelagia..
Link
@kala shared a link, 3 months ago
FAUN.dev()

Securing Agents in Production (Agentic Runtime, #1)

Palantir's AIP Agentic Runtime isn't just another agent platform, it's a control plane with teeth. Think tight policy enforcement, ephemeral autoscaling with Kubernetes (Rubix), and memory stitched in from the jump viaOntology. Tool usage? Traced and locked down with provenance-based security. Every.. read more  

Securing Agents in Production (Agentic Runtime, #1)
Link
@kala shared a link, 3 months ago
FAUN.dev()

Is that allowed? Authentication and authorization in Model Context Protocol

TheModel Context Protocol (MCP) 2025-11-25spec tightens up remote agent auth. It leans intoOAuth 2.1 Authorization Code grants, PKCE required, step-up auth backed. No token passthrough allowed. What’s new: experimental extensions forclient credentialsandclient ID metadata. These smooth out agent reg.. read more  

Is that allowed? Authentication and authorization in Model Context Protocol
Link
@kala shared a link, 3 months ago
FAUN.dev()

Keeping 20,000 GPUs healthy

Modal unpacked how it keeps a 20,000+ GPU fleet sane across AWS, GCP, Azure, and OCI. Think autoscaling, yes, but with some serious moves behind the curtain. They're running instance benchmarking, enforcing machine image consistency, running boot-time checks, and tracking GPU health both passively a.. read more  

Keeping 20,000 GPUs healthy
Link
@devopslinks shared a link, 3 months ago
FAUN.dev()

CodeBreach: Supply Chain Vuln & AWS CodeBuild Misconfig

Wiz Research dropped details onCodeBreach, a serious flaw that cracked open AWS SDK GitHub repos, yes, including the popular JavaScript one. The root problem? Leakyregex filtersin CodeBuild pipelines. They missed anchors, so attackers slipped in rogue pull requests, dodged build rules, and stole hig.. read more  

CodeBreach: Supply Chain Vuln & AWS CodeBuild Misconfig
Link
@devopslinks shared a link, 3 months ago
FAUN.dev()

I Cannot SSH Into My Server Anymore (And That’s Fine)

A dev ditched their $100/month VPS for a clean, automated CoreOS setup. No SSH. No clicking around. JustIgnition,Podman Quadlets, andTerraformdoing the heavy lifting. It boots from YAML, spins up containers with systemd, and keeps itself fresh withPodman auto-updates, zero-touch, straight from the r.. read more  

I Cannot SSH Into My Server Anymore (And That’s Fine)
Link
@devopslinks shared a link, 3 months ago
FAUN.dev()

Nanoservices: Why Serverless Got Architecture Right

A fresh take onAWS Lambdaand serverless: thinknanoservices- tiny, isolated functions instead of chunky microservices. No shared state or shared runtime but clean separation, lean logic, and fewer ways to screw up scaling. Where microservices can spiral into spaghetti, nanoservices stay crisp. Each f.. read more  

Nanoservices: Why Serverless Got Architecture Right
Link
@devopslinks shared a link, 3 months ago
FAUN.dev()

Supply-chain risk of agentic AI - infecting infrastructures via skill worms

AI assistants with shell, network, or filesystem "skills" don't just help, they expose. These hooks can run commands before any human checks the model’s output. That means a bigger attack surface. More room for lateral movement. Easier persistence. In setups where tools like Claude Code run often, i.. read more  

Link
@devopslinks shared a link, 3 months ago
FAUN.dev()

Moltbot Personal Assistant Goes Viral, And So Do Your Secrets

Moltbot, the self-hosted AI agent with native hooks for Slack, Telegram, and WhatsApp, exploded from 50-ish to over 3,000 GitHub forks a day after going viral on Jan 24, 2026. It's built around a file-backed workspace and automates everything from code deploys to cloud orchestration. Cool? Definitel.. read more  

Moltbot Personal Assistant Goes Viral, And So Do Your Secrets
 Activity
News FAUN.dev() Team
@kala shared an update, 3 months ago
FAUN.dev()

OpenClaw - Former Moltbot, Former Clawdbot - Went Viral Overnight. Then Security Reality Hit.

OpenClaw

OpenClaw, an open-source AI assistant platform, has been launched, evolving from Clawdbot and Moltbot. It features new plugins, enhanced security, and support for new models, while addressing a major security vulnerability. The platform emphasizes community involvement and invites contributions for its development.

OpenClaw - Former Moltbot, Former Clawdbot - Went Viral Overnight. Then Security Reality Hit.
Pelagia is a Kubernetes controller that provides all-in-one management for Ceph clusters installed by Rook. It delivers two main features:

Aggregates all Rook Custom Resources (CRs) into a single CephDeployment resource, simplifying the management of Ceph clusters.
Provides automated lifecycle management (LCM) of Rook Ceph OSD nodes for bare-metal clusters. Automated LCM is managed by the special CephOsdRemoveTask resource.

It is designed to simplify the management of Ceph clusters in Kubernetes installed by Rook.

Being solid Rook users, we had dozens of Rook CRs to manage. Thus, one day we decided to create a single resource that would aggregate all Rook CRs and deliver a smoother LCM experience. This is how Pelagia was born.

It supports almost all Rook CRs API, including CephCluster, CephBlockPool, CephFilesystem, CephObjectStore, and others, aggregating them into a single specification. We continuously work on improving Pelagia's API, adding new features, and enhancing existing ones.

Pelagia collects Ceph cluster state and all Rook CRs statuses into single CephDeploymentHealth CR. This resource highlights of Ceph cluster and Rook APIs issues, if any.

Another important thing we implemented in Pelagia is the automated lifecycle management of Rook Ceph OSD nodes for bare-metal clusters. This feature is delivered by the CephOsdRemoveTask resource, which automates the process of removing OSD disks and nodes from the cluster. We are using this feature in our everyday day-2 operations routine.