Join us

ContentUpdates and recent posts about Tor..
Link
@faun shared a link, 8 months ago
FAUN.dev()

Container Logs in Kubernetes: How to View and Collect Them

This guide shows how to wrangle container logs in Kubernetes—usingkubectl, shell tools, structured logging, and the Kubernetes Dashboard. It covers the basics and dives into how to scale up log collection and make observability less painful across clusters... read more  

Container Logs in Kubernetes: How to View and Collect Them
Link
@faun shared a link, 8 months ago
FAUN.dev()

CNCF Elevates Metal3.io to Incubating Status for Bare-Metal Kubernetes

The CNCF just bumpedMetal3.ioup to incubating status. That’s a clear nod to rising demand forKubernetes-native bare-metal management. Metal3.io wires up physical servers as Kubernetes resources—no VMs in sight. It leans onIronicand theBare Metal Operatorto handle provisioning and lifecycle tasks lik.. read more  

Link
@faun shared a link, 8 months ago
FAUN.dev()

v1.34: PSI Metrics for Graduates to Beta

Kubernetes v1.34 bumpsPressure Stall Information (PSI) metricsto Beta. Now kubelets expose kernel-level resource pressure—CPU, memory, and I/O—through the Summary API and Prometheus. Instead of just tracking how much a resource gets used, PSI shows how often workloads get throttled or blocked. That .. read more  

Link
@faun shared a link, 8 months ago
FAUN.dev()

Reduce Cloud Cross-Zone Data Transfer Costs with Kubernetes 1.33 trafficDistribution

Kubernetes 1.33 drops a new traffic policy that addszone-local routing. With it, kube-proxy now prefers endpoints in the same availability zone. Translation: less cross-AZ chatter, fewer surprise charges. On AWS, that can chop the usual $0.02/GB cross-AZ fee by up to 85%—especially in EKS clusters j.. read more  

Reduce Cloud Cross-Zone Data Transfer Costs with Kubernetes 1.33 trafficDistribution
Link
@faun shared a link, 8 months ago
FAUN.dev()

Scaling Kubernetes the Right Way: In-Depth Comparison of HPA, VPA, CA, Karpenter, and KEDA

A hands-on breakdown of Kubernetes autoscalers—HPA,VPA,Cluster Autoscaler,Karpenter, andKEDA—maps how each scales pods, nodes, and events. The hot pairing lately?Karpenterfor fast node spin-up, teamed withCloudPilot AIto wrangle Spot instances across 800+ compute types without melting costs... read more  

Scaling Kubernetes the Right Way: In-Depth Comparison of HPA, VPA, CA, Karpenter, and KEDA
Link
@faun shared a link, 8 months ago
FAUN.dev()

v1.34: Pod Replacement Policy for Jobs Goes GA

ThePod replacement policyin Kubernetes v1.34 just hit GA. Jobs can now hold off on spinning up new Pods until the old ones arefullygone. No more duplicates per index. No more blowing through quotas or stalling schedulers—big win for workloads like ML training. System shift:This rewires how Jobs hand.. read more  

Link
@anjali shared a link, 8 months ago
Customer Marketing Manager, Last9

Kubernetes Monitoring Metrics That Improve Cluster Reliability

Understand Kubernetes monitoring metrics that help detect issues early, improve reliability, and keep your cluster performing at its best.

kubernetes_metrics
Story
@laura_garcia shared a post, 8 months ago
Software Developer, RELIANOID

🚀 Strengthening Europe’s Cybersecurity in Space

Just in case you missed it last month: The European Space Agency (ESA) has launched its brand-new Cybersecurity Operations Center (C-SOC) to safeguard satellites, mission control systems, and digital assets against growing cyber threats. 🌍 In today’s space-driven world, initiatives like this — suppo..

ESA_Cybersecurity Operations Center
Story
@laura_garcia shared a post, 8 months ago
Software Developer, RELIANOID

🔐 Cybersecurity Fundamentals: Defensive, Offensive & Hybrid Approaches 🔐

Cybersecurity isn’t just about deploying tools — it’s about knowing how and when to use the right strategies. Defensive security focuses on prevention with technologies like firewalls, antivirus, access control, and system hardening to reduce exposure. Offensive security takes the attacker’s perspec..

Cibersecurity concepts diagram RELIANOID
Link
@anjali shared a link, 8 months ago
Customer Marketing Manager, Last9

What is APM Tracing?

Understand APM tracing to see how a request moves through services, helping you spot delays, errors, and bottlenecks quickly.

apm tracing
Tor (The Onion Router) is an open-source network and software suite designed to protect user privacy and enable anonymous communication on the internet. It works by routing network traffic through a distributed, volunteer-run network of relays, encrypting data in multiple layers so that no single relay knows both the source and destination of the traffic. Tor is widely used to defend against traffic analysis, surveillance, and censorship. By obscuring IP addresses and routing paths, it helps users browse the web anonymously, publish information safely, and access services without revealing their location or identity. The network supports standard web traffic as well as specialized .onion services, which allow websites and services to operate anonymously without exposing their physical hosting location. Beyond web browsing, Tor is used as a foundational privacy layer for secure messaging, whistleblowing platforms, journalism, activism, academic research, and secure system administration. It is also integrated into many privacy-focused operating systems and tools. While Tor can reduce traceability, it does not make users invulnerable and must be used with proper operational security to avoid deanonymization risks. Tor is developed and maintained by the Tor Project, a nonprofit organization dedicated to advancing digital privacy and freedom worldwide