Tag: Kubernetes
-
Are separate Kubernetes clusters secure? Why sprawl increases risk
Posted on March 21, 2026, Level beginner Resource Length medium
This article challenges the conventional wisdom of using separate Kubernetes clusters for enhanced security. As organizations scale, cluster sprawl can lead to inconsistent configurations, increased vulnerabilities, and operational overhead. The article argues for a more nuanced approach to tenancy, using virtual clusters to enforce consistent security policies and reduce the complexity of managing multiple clusters. By vcluster.com.
Tags kubernetes infosec management cio devops
-
Kubernetes logging best practices
Posted on March 6, 2026, Level intermediate Resource Length medium
Gain operational clarity in dynamic Kubernetes environments by implementing robust logging strategies for application health, security, and efficient troubleshooting. By Jeff Darrington.
Tags kubernetes devops containers app-development distributed
-
Automating stateful apps with Kubernetes Operators
Posted on December 5, 2025, Level intermediate Resource Length medium
Automating stateful apps with Kubernetes Operators simplifies management of complex workloads by handling critical tasks like scaling, backup and failover automatically. This reduces downtime and human errors that are common in manual deployment processes. By Keval Bhogayata.
Tags kubernetes devops cicd app-development
-
Rate limiting for Django websites
Posted on September 4, 2025, Level intermediate Resource Length long
Rate limiting restricts the number of requests a client can make to your Django website within a specific timeframe. It's especially useful for blocking malicious bots, crawlers, or brute-force attacks that overwhelm server resources. By Aidas Bendoraitis.
Tags nginx devops infosec devops kubernetes
-
Securing Kubernetes resources without a VPN
Posted on September 4, 2025, Level intermediate Resource Length long
Securing kubernetes resources that you want to expose to only some users externally is often done through IP allowlisting and a VPN. While this is a tried and true method, there are some drawbacks. By Brian Sizemore.
Tags nginx app-development infosec devops kubernetes
-
In 2026, 70% of Kubernetes clusters are just waiting to be forgotten
Posted on August 3, 2025, Level beginner Resource Length medium
New research reveals 70% of Kubernetes clusters become neglected within 18 months of deployment - a $9.2B cloud waste problem annually. Paradoxically, Kubernetes adoption continues growing (92% enterprise usage in 2025), with companies like Apple and OpenAI running massive node clusters. By dev engineer.
Tags microservices devops kubernetes containers monitoring
-
The cost of Kubernetes cluster sprawl and how to manage it
Posted on July 27, 2025, Level beginner Resource Length medium
Kubernetes cluster sprawl occurs when organizations create numerous clusters without proper governance, undermining the platform's core benefits of automated deployment, scaling, and self-healing. This uncontrolled proliferation stems from Kubernetes' deployment simplicity combined with governance gaps, innovation pressure, and infrastructure complexity in multi-cloud environments. The resulting sprawl creates operational inefficiencies, security vulnerabilities through inconsistent configurations, and resource waste from abandoned clusters - ultimately leading to loss of visibility across the Kubernetes ecosystem. By Damon Garn, Cogspinner Coaction.
Tags kubernetes containers devops cio management
-
How much observability is enough?
Posted on May 17, 2025, Level beginner Resource Length medium
Observability is the process of watching what your systems do at every layer so that you can build a comprehensive picture of how it does what it does. By Dotan Horovits and Jujhar Singh.
Tags devops cloud kubernetes cio containers
-
How Kubernetes requests and limits really work
Posted on November 5, 2024, Level intermediate Resource Length medium
Kubernetes is inarguably an elegant, refined, well-designed edifice of open source enterprise software. It is known. Even so, the internal machinations of this mighty platform tool are shrouded in mystery. Friendly abstractions, like "resource requests" for CPU and memory, hide from view a host of interrelated processes — precise and polished scheduling algorithms, clever transformations of friendly abstractions into arcane kernel features, a perhaps unsurprising amount of math — all conjoining to produce the working manifestations of a user's expressed intent. By Reid Vandewiele.
Tags devops agile cicd app-development kubernetes containers
-
Securing Kafka communication channels on Kubernetes with TLS/mTLS
Posted on May 1, 2024, Level intermediate Resource Length medium
The article covers a guide on setting up TLS/Mutual TLS (mTLS) for securing communication between Kafka clients and servers, specifically in a Kubernetes environment, thus mitigating potential threats such as man-in-the-middle attacks and unauthorized access to data. We'll be starting off by diving into a bunch of topics that'll help you understand why we're doing what we're doing for our setup. By Aranya Chauhan.
Tags devops app-development infosec kubernetes ssl
-
2024 K8s benchmark report: The latest trends in workload reliability
Posted on March 11, 2024, Level intermediate Resource Length medium
According to Gartner, cloud computing will become an essential component of maintaining business competitiveness by 2028. Indeed, in 2024 spending on public cloud services is projected to reach $679 billion. While cloud spend is complex and costs originate from a number of sources, it is undeniable that many organizations are moving apps and services to the cloud and using Kubernetes to manage containers effectively and ensure workload reliability. By Joe Pelletier.
Tags kubernetes containers devops performance
-
Using containerisation
Posted on February 18, 2024, Level beginner Resource Length long
Guidance on how to build and use containerised applications securely. Containers are a common approach for packaging and deploying applications, standardised by the Open Container Initiative (OCI). By National Cyber Security Centre.
Tags devops web-development app-development containers infosec kubernetes