An overview into CVE-2018-1002105's root cause and a program to test if your clusters are affected
The Teleport Proxy requires a valid x509 certificate to serve content like the Web UI via HTTPS. In this post we show how to configure the Teleport Proxy to use Let's Encrypt for this.
Unabated releases of vanilla upstream Kubernetes every three months could continue forever. You have to keep up, while also paying close attention to Kubernetes API object versioning. In this article, we discuss where this pace comes from, how it's a key ingredient in Kubernetes' success and what it means for end-users
An interview about our experience running PostgreSQL on on-premises Kubernetes, covering the challenges involved, open source and commercial tools that can help and other alternatives to managing stateful applications on Kubernetes.
How do you let your employees access company AWS infrastructure using their Github credentials? How do you restrict parts of your infrastructure to certain Github teams? How do you configure SSH to use Github credentials? This blog post covers it all.
We review the Vendor Security Alliance's security questionnaire to look at the security related costs of running SaaS vs On-prem.
Going on-prem can be a handful, especially maintaining those deployments. Here's how we use Kubernetes and our own tooling to help scale those efforts.