Engineering Blog

                            

Cloud Native

Unveiling Hidden Threats: Detecting Unauthorized Access in Kubernetes with eBPF

Unveiling Hidden Threats: Detecting Unauthorized Access in Kubernetes with eBPF

Kubernetes reigns supreme as the container orchestration platform, but its vast power demands robust security. This blog explores eBPF (Extended Berkeley Packet Filter), a powerful tool for safeguarding your Kubernetes clusters. What is eBPF? eBPF allows you to run custom code within the Linux kernel for monitoring and control. It acts like a Swiss army…

Attacking and Defending Kubernetes Clusters: A Security Walkthrough

Attacking and Defending Kubernetes Clusters: A Security Walkthrough

Introduction In today’s containerized and microservices-driven world, Kubernetes reigns supreme as the orchestration platform of choice. However, its widespread adoption has opened a new frontier for cyberattacks. Malicious actors are increasingly targeting Kubernetes clusters, seeking to exploit vulnerabilities and gain unauthorized access. This blog post will explore the attack landscape for Kubernetes clusters and provide…

PAS: The Future of Kubernetes Scheduling is Here

PAS: The Future of Kubernetes Scheduling is Here

Platform Aware Scheduling (PAS) is revolutionizing how workloads are assigned in Kubernetes environments. By exposing platform-specific attributes to the Kubernetes scheduler, PAS enhances the scheduler’s decision-making capabilities using a modular, policy-driven approach. This innovative project comprises a core library and information for building custom scheduler extensions, as well as specific implementations that can be directly…

Fortress Kubernetes: Building a Secure Foundation for Your Supply Chain

Fortress Kubernetes: Building a Secure Foundation for Your Supply Chain

Have you ever worried about a security breach stemming from your Kubernetes environment? In this episode of KubeFM, Yakir and Assaf from Aqua Security unpack the critical issue of exposed Kubernetes secrets and how a robust strategy can defuse this ticking time bomb. Why are Exposed Secrets a Threat? Kubernetes secrets store sensitive information like…

Kubernetes: Steering the Course for New Horizons in the Second Decade – A Google Podcast

Kubernetes: Steering the Course for New Horizons in the Second Decade – A Google Podcast

Kubernetes, the container orchestration platform, has become a cornerstone of modern cloud infrastructure. As it enters its second decade, Google’s podcast explores the project’s leadership and the future with key figures: Nikita Raghunath, Nabarun Pal, and Paco Xu. Insights and Advice for the Kubernetes Community This podcast delves into their journeys within Kubernetes leadership, exploring…

Platform Aware Scheduling: Making Smarter Kubernetes Decisions

Platform Aware Scheduling: Making Smarter Kubernetes Decisions

Platform Aware Scheduling (PAS) is a powerful tool for optimizing workload placement in Kubernetes clusters. It empowers the Kubernetes scheduler to make intelligent decisions by incorporating platform-specific attributes. What is Platform Aware Scheduling? PAS is a collection of projects designed to expose platform data to the Kubernetes scheduler. This data can then be used to…

Streamline Operations: Powerful Kubernetes Logging Strategies for Improved Visibility

Streamline Operations: Powerful Kubernetes Logging Strategies for Improved Visibility

Introduction In the realm of microservices and containerized applications, efficient management and monitoring of application health and performance are paramount. Kubernetes, an open-source system for automating deployment, scaling, and management of containerized applications, has emerged as the go-to solution for businesses seeking agility and resilience. However, managing logs in Kubernetes remains a significant hurdle due…

The Path Ahead: Leveraging KEDA for Performance Transformation

The Path Ahead: Leveraging KEDA for Performance Transformation

Introduction: Embracing Innovation in IT In today’s ever-evolving IT landscape, staying ahead of the curve is essential for driving operational excellence and delivering exceptional user experiences. As technology continues to advance at a rapid pace, businesses are increasingly seeking innovative solutions to optimize their data processing infrastructure. In this pursuit, the integration of Kubernetes Event-Driven…

Don’t Let Your Users Disconnect! Achieve True Zero-Downtime with Kubernetes

Don’t Let Your Users Disconnect! Achieve True Zero-Downtime with Kubernetes

This article dives into achieving true zero-downtime deployments in Kubernetes, specifically focusing on avoiding disruptions during rolling updates that can lead to broken client connections. The Challenge: Rolling Updates and Downtime While Kubernetes offers rolling updates for seamless application upgrades, these updates can introduce brief downtime windows. This downtime, measured in microseconds to seconds, might…

HashiCorp Unveils ILM Blueprint for Asia & Australia: Automate Cloud Infrastructure for Efficiency

HashiCorp Unveils ILM Blueprint for Asia & Australia: Automate Cloud Infrastructure for Efficiency

Cut cloud costs and gain infrastructure control with HashiCorp’s Infrastructure Lifecycle Management (ILM) solutions. This blog post dives into a recent webinar focused on helping operations teams in Asia and Australia leverage HashiCorp’s ILM offerings within The Infrastructure Cloud. HashiCorp Infrastructure Cloud: The Event Details The ILM Challenge: Building, Deploying, and Managing Efficient Cloud Infrastructure…