ContentPosts from @mnowak-devops..
Link
@faun shared a link, 5 months, 3 weeks ago
FAUN.dev()

NSEnter and Kubernetes

nsenteris your backstage pass to aKubernetesnode. It plays with Linux namespaces, crashing through isolation walls for a direct look inside. Summon it withPID1 and proper permissions, and you're deep in the node's core. No middleman required... read more  

NSEnter and Kubernetes
Link
@faun shared a link, 5 months, 3 weeks ago
FAUN.dev()

Changes to Kubernetes Slack

The Kubernetes gang will cling to their premium Slack status a while longer. But come 2025, free Slack will beckon. Discord’s got its eye on the scene too, whispering sweet promises of GitHub sync and other shiny toys... read more  

Link
@faun shared a link, 5 months, 3 weeks ago
FAUN.dev()

Interesting Kubernetes application demos

Kubeappsis your backstage pass to deploying and controllingK8sapps with style. Dive into a treasure chest ofHelmcharts ready to roll. For those looking to jazz up a demo, unleashKubedoomorKubevaders. Obliteratepodsfor stress-testing, or just because you can. Craving some retro-futuristic fun? Check .. read more  

Link
@faun shared a link, 5 months, 3 weeks ago
FAUN.dev()

F5 Unleashes Innovation with Powerful New AI Capabilities on BIG-IP Next for Kubernetes on NVIDIA BlueField-3 DPUs

TheModel Context Protocol (MCP)just crashed the party, turning heads and flipping tables with its focus on tailor-made AI setups. EnterAI factoriesandNeoclouds—souped-up cloud havens crafted to power-hungry AI demands. Handle with care, because these bad boys redefine what's possible... read more  

F5 Unleashes Innovation with Powerful New AI Capabilities on BIG-IP Next for Kubernetes on NVIDIA BlueField-3 DPUs
Link
@faun shared a link, 5 months, 3 weeks ago
FAUN.dev()

What Would a Kubernetes 2.0 Look Like

Kubernetesrewrites the rulebook on infrastructure. Suddenly, scaling isn't a headache—it's an art. But then there'sYAML. With its peculiar quirks and knack for screwing up, it feels more like a punchline than a solution. EnterHelmand its template circus, juggling dependencies with all the grace of a.. read more  

What Would a Kubernetes 2.0 Look Like
Link
@faun shared a link, 5 months, 3 weeks ago
FAUN.dev()

F5, Inc Announces New Capabilities for F5 BIG-IP Next for Kubernetes

F5, Inc. announced new capabilities for F5 BIG-IP Next for Kubernetes in collaboration with NVIDIA Corporation. The F5 BIG-IP Next for Kubernetes will be accelerated with NVIDIA’s BlueField-3 DPUs and the NVIDIA DOCA software framework... read more  

Link
@faun shared a link, 5 months, 3 weeks ago
FAUN.dev()

AWS’ EKS Kubernetes ‘Critical Security’ Flaw Exposes Credentials, Says Trend Micro

Trend Microblows the lid off Amazon's EKS snafu—misconfigured Kubernetes containers brazenly leaking AWS credentials. Cue privilege escalation chaos. AWS shrugs, hiding behind the "Shared Responsibility" mantra. Trend Micro, undeterred, sounds the alarm: secure those configurations, and embrace the .. read more  

AWS’ EKS Kubernetes ‘Critical Security’ Flaw Exposes Credentials, Says Trend Micro
Link
@faun shared a link, 5 months, 3 weeks ago
FAUN.dev()

Why Chose OCI Artifacts for AI Model Packaging

Docker Model Runner injects LLMs into OCI artifacts, seamlessly marrying model delivery with container rituals. No need to invent custom toolchains. Think uncompressed "layers"—they're the secret sauce for faster, sharper, more efficient Model-Runner magic. It's not just a change; it's a quantum lea.. read more  

Link
@anjali shared a link, 5 months, 3 weeks ago
Customer Marketing Manager, Last9

11 Best Log Monitoring Tools for Developers in 2025

A technical comparison of 11 log monitoring tools developers use in 2025—features, trade-offs, pricing, and platform compatibility

Microservices logging
Story
@laura_garcia shared a post, 5 months, 3 weeks ago
Software Developer, RELIANOID

🚨 Industrial Cybersecurity: Are You Ready?

📘 We’ve published a Technical Guide to ISA/IEC 62443 Standards – your 5-minute roadmap to securing Industrial Automation and Control Systems (IACS). 🔐 ISA/IEC 62443 is the gold standard for industrial cybersecurity. From zones and conduits to secure development lifecycles, it addresses the full spec..

Knowledge base ISAIEC-62443 Industrial Cybersecurity Standards RELIANOID