Engineering Blog

                            

Blog – 1 Column & Sidebar

BIOCAD’s Secret Sauce: Automating Docker Image Processes for Security and Efficiency

Introduction In software development, delivering quality software quickly, safely, and reliably is crucial. Docker images simplify deployment but also introduce challenges. This article, based on our work at the biotech company BIOCAD, explores automating the building, signing, and verifying of Docker images to maximize their benefits. Building Docker Images with Kaniko Building Docker images manually…

Boost Efficiency and Security: Kubermatic Kubernetes Platform Empowers You

Hey there, infrastructure enthusiasts! This blog post is here to introduce you to the latest and greatest features of the Kubermatic Kubernetes Platform (KKP). KKP empowers you to leverage the power of AI for streamlined operations and ensures seamless backup, recovery, and migration capabilities for your Kubernetes clusters. Embrace the Future: AI-Powered Infrastructure KKP takes…

Level Up Your AI Skills for Free: 10 NVIDIA Courses You Can’t Miss

Attention AI enthusiasts! NVIDIA just announced a treasure trove of FREE AI training and courses, giving you the perfect opportunity to level up your skills and delve deeper into the exciting world of Artificial Intelligence. Here are 10 courses you can’t afford to miss, covering everything from the fundamentals of neural networks to building cutting-edge…

AI

Demystifying AI’s Role in Security: A Webinar by Elastic

Security professionals are constantly bombarded with new technologies, and Artificial Intelligence (AI) is no exception. Many have questions: Can AI be trusted to handle security tasks? How much of an analyst’s workload can it realistically lighten? Join a free upcoming webinar hosted by Elastic to gain valuable insights into AI’s role in security. The session,…

Unveiling Hidden Threats: Detecting Unauthorized Access in Kubernetes with eBPF

Kubernetes reigns supreme as the container orchestration platform, but its vast power demands robust security. This blog explores eBPF (Extended Berkeley Packet Filter), a powerful tool for safeguarding your Kubernetes clusters. What is eBPF? eBPF allows you to run custom code within the Linux kernel for monitoring and control. It acts like a Swiss army…

Attacking and Defending Kubernetes Clusters: A Security Walkthrough

Introduction In today’s containerized and microservices-driven world, Kubernetes reigns supreme as the orchestration platform of choice. However, its widespread adoption has opened a new frontier for cyberattacks. Malicious actors are increasingly targeting Kubernetes clusters, seeking to exploit vulnerabilities and gain unauthorized access. This blog post will explore the attack landscape for Kubernetes clusters and provide…

PAS: The Future of Kubernetes Scheduling is Here

Platform Aware Scheduling (PAS) is revolutionizing how workloads are assigned in Kubernetes environments. By exposing platform-specific attributes to the Kubernetes scheduler, PAS enhances the scheduler’s decision-making capabilities using a modular, policy-driven approach. This innovative project comprises a core library and information for building custom scheduler extensions, as well as specific implementations that can be directly…

Effortless Kubernetes Management with the GitOps Bridge Project

The GitOps Bridge is a community-driven initiative aimed at demonstrating the best practices and patterns for seamlessly integrating the creation of Kubernetes clusters with ongoing management through GitOps. By focusing on leading tools like ArgoCD and FluxCD, both of which are CNCF-graduated projects, this project serves as a valuable resource for Kubernetes administrators and DevOps…