Join us

ContentUpdates from Resourcely...
Link
@faun shared a link, 2 months, 3 weeks ago

Upcoming changes to the Bitnami catalog

Bitnamiclears out the virtual cobwebs by tucking its oldDebian-based imagesinto a digital time capsule, also known as theLegacy repository. It throws a friendly nudge to devs: get with the times and swap to the "latest" images. In production-ville, serious users should hitch a ride on theBitnami Sec..

Link
@faun shared a link, 2 months, 3 weeks ago

Post-Quantum Cryptography in Kubernetes

Kubernetes v1.33quietly rides thepost-quantum securitywave, thanks to Go 1.24's hybrid key exchanges. Watch out for version mismatches, though—those could sneakily downgrade your defenses...

Link
@faun shared a link, 2 months, 3 weeks ago

Securing Kubernetes 1.33 Pods: The Impact of User Namespace Isolation

Kubernetes 1.33rolls out with a security upgrade. It flips the switch onuser namespacesby default, shoving pods into the safety zone as unprivileged users. Potential breaches? Curbed. But don't get too comfy—idmap-capable file systems and up-to-date runtimes are now your new best friends if you want..

Securing Kubernetes 1.33 Pods: The Impact of User Namespace Isolation
Link
@faun shared a link, 2 months, 3 weeks ago

Automated Kubernetes Threat Detection with Tetragon and Azure Sentinel

Kubernetes security tools usually drop the ball. Enter the dynamic duo:Tetragonwielding eBPF magic for deep observability, and smart notifications for sniper-precise alerts.Fluent Bitpairs withAzure Logic Appsin an automated setup so you can hunt down threats in real-time. Not a drop of sweat needed..

Automated Kubernetes Threat Detection with Tetragon and Azure Sentinel
Link
@faun shared a link, 2 months, 3 weeks ago

Rethinking Node Drains: A Webhook Based Approach to Graceful Pod Removal

Eviction Reschedule Hooksticks its nose in Kubernetes eviction requests, letting operator-managed stateful apps wriggle their way through node drains without breaking a sweat. 🎯..

Rethinking Node Drains: A Webhook Based Approach to Graceful Pod Removal
Link
@faun shared a link, 2 months, 3 weeks ago

Setting up Prometheus Stack on Kubernetes

Devtronis Kubernetes monitoring on overdrive. It ropes inPrometheusandGrafana, automates the pesky setup, and shoots real-time insights straight into a slick UI. Effort? Minimal. Results? Maximal...

Setting up Prometheus Stack on Kubernetes
Story
@laura_garcia shared a post, 2 months, 3 weeks ago
Software Developer, RELIANOID

🚨 Is Your Business Ready for a Cyber Crisis? 🚨

A cyberattack can strike at any time—causing operational disruption, financial loss, and reputational damage. Preparing for and effectively managing a cyber crisis is no longer optional—it's essential. At RELIANOID, we help businesses build robust cyber resilience through advanced solutions and expe..

Blog Preparing and Managing a Cyber Crisis RELIANOID
Link
@anjali shared a link, 2 months, 3 weeks ago
Customer Marketing Manager, Last9

Monitor Nginx with OpenTelemetry Tracing

Instrument NGINX with OpenTelemetry to capture traces, track latency, and connect upstream and downstream services in a single request flow.

Nginx_opentelemetry
 Activity
@sprigstack created an organization sprigstack , 2 months, 3 weeks ago.
Story
@laura_garcia shared a post, 2 months, 3 weeks ago
Software Developer, RELIANOID

🔐 Zero-Trust Micro-Segmentation in Industrial Environments

In today's connected industrial world, the convergence of IT & OT brings efficiency—but also new risks. That’s why Zero-Trust Micro-Segmentation is no longer optional. 📌 It divides your network into isolated zones, applies strict access rules, and assumes no user or device is inherently trusted. ✅ K..

Industrial Zero-Trust Micro-Segmentation
Resourcely is a configuration engine that helps developers move faster and lets companies mitigate risk while minimizing incidents. Resourcely is a paved road for infrastructure, meaning it guides you through creating secure and compliant cloud infrastructure without the need to understand the vast amount of configuration options. With Resourcely you can:

Leverage secure-by-default resource templates to prevent misconfiguration from the start

Block resource provision requests that don't adhere to configured guardrails

Make infrastructure management easy, allowing developers to focus more on development and less on cloud complexity

Track the creators and statuses of resource pull requests from one interface, reducing context switching and supporting audit requirements