Engineering Blog

                            
Avatar

Konika Sitoula

Demystifying AI’s Role in Security: A Webinar by Elastic
AI

Demystifying AI’s Role in Security: A Webinar by Elastic

Security professionals are constantly bombarded with new technologies, and Artificial Intelligence (AI) is no exception. Many have questions: Can AI be trusted to handle security tasks? How much of an analyst’s workload can it realistically lighten? Join a free upcoming webinar hosted by Elastic to gain valuable insights into AI’s role in security. The session,…

Unveiling Hidden Threats: Detecting Unauthorized Access in Kubernetes with eBPF

Unveiling Hidden Threats: Detecting Unauthorized Access in Kubernetes with eBPF

Kubernetes reigns supreme as the container orchestration platform, but its vast power demands robust security. This blog explores eBPF (Extended Berkeley Packet Filter), a powerful tool for safeguarding your Kubernetes clusters. What is eBPF? eBPF allows you to run custom code within the Linux kernel for monitoring and control. It acts like a Swiss army…

Attacking and Defending Kubernetes Clusters: A Security Walkthrough

Attacking and Defending Kubernetes Clusters: A Security Walkthrough

Introduction In today’s containerized and microservices-driven world, Kubernetes reigns supreme as the orchestration platform of choice. However, its widespread adoption has opened a new frontier for cyberattacks. Malicious actors are increasingly targeting Kubernetes clusters, seeking to exploit vulnerabilities and gain unauthorized access. This blog post will explore the attack landscape for Kubernetes clusters and provide…

From Code to Cloud: Building a Secure Path with Jenkins

From Code to Cloud: Building a Secure Path with Jenkins

Are you concerned about security vulnerabilities lurking in your Jenkins environment? Do you want to ensure your deployments are not only fast but also secure and compliant? This blog post highlights a free webinar aimed at helping you achieve just that! We’ll delve into the importance of integrating security throughout your entire CI/CD (Continuous Integration/Continuous…

Fortress Kubernetes: Building a Secure Foundation for Your Supply Chain

Fortress Kubernetes: Building a Secure Foundation for Your Supply Chain

Have you ever worried about a security breach stemming from your Kubernetes environment? In this episode of KubeFM, Yakir and Assaf from Aqua Security unpack the critical issue of exposed Kubernetes secrets and how a robust strategy can defuse this ticking time bomb. Why are Exposed Secrets a Threat? Kubernetes secrets store sensitive information like…

Kubernetes: Steering the Course for New Horizons in the Second Decade – A Google Podcast

Kubernetes: Steering the Course for New Horizons in the Second Decade – A Google Podcast

Kubernetes, the container orchestration platform, has become a cornerstone of modern cloud infrastructure. As it enters its second decade, Google’s podcast explores the project’s leadership and the future with key figures: Nikita Raghunath, Nabarun Pal, and Paco Xu. Insights and Advice for the Kubernetes Community This podcast delves into their journeys within Kubernetes leadership, exploring…

Platform Aware Scheduling: Making Smarter Kubernetes Decisions

Platform Aware Scheduling: Making Smarter Kubernetes Decisions

Platform Aware Scheduling (PAS) is a powerful tool for optimizing workload placement in Kubernetes clusters. It empowers the Kubernetes scheduler to make intelligent decisions by incorporating platform-specific attributes. What is Platform Aware Scheduling? PAS is a collection of projects designed to expose platform data to the Kubernetes scheduler. This data can then be used to…

Streamline Operations: Powerful Kubernetes Logging Strategies for Improved Visibility

Streamline Operations: Powerful Kubernetes Logging Strategies for Improved Visibility

Introduction In the realm of microservices and containerized applications, efficient management and monitoring of application health and performance are paramount. Kubernetes, an open-source system for automating deployment, scaling, and management of containerized applications, has emerged as the go-to solution for businesses seeking agility and resilience. However, managing logs in Kubernetes remains a significant hurdle due…

Scale Without Limits: Unveiling ScyllaDB’s New Tablets Architecture

Scale Without Limits: Unveiling ScyllaDB’s New Tablets Architecture

REGISTER NOW for the webinar on June 27th! Are you struggling to manage unpredictable traffic spikes in your database? Do you crave a more operationally simple and efficient solution? Then you won’t want to miss ScyllaDB’s upcoming webinar, ScyllaDB Fast Forward: True Elastic Scale. What You’ll Learn: This webinar will delve into ScyllaDB’s latest innovation:…

Unlocking the Power of Kubernetes Backups with K8up

Kubernetes has become the go-to platform for deploying containerized applications. As its usage grows, the need for robust backup solutions becomes even more critical. This guide introduces K8up, a Kubernetes Operator designed to streamline backups for Persistent Volumes (PVCs) and applications. We’ll delve into K8up’s architecture, installation, and explore its functionalities through code examples. K8up’s…