Join us

ContentUpdates from The Open Source Security Foundation (OpenSSF) is a...
Link
@varbear shared a link, 1 month ago
FAUN.dev()

14x Faster Faceted Search in PostgreSQL with ParadeDB

ParadeDB brings Elasticsearch-stylefacetingtoPostgreSQL, ranked search results and filter counts, all in one shot. No extra passes. It pulls this off with a customwindow function, planner hooks, andTantivy's columnar index under the hood. That's how they’re squeezing out10×+ speedupson hefty dataset.. read more  

14x Faster Faceted Search in PostgreSQL with ParadeDB
Link
@kaptain shared a link, 1 month ago
FAUN.dev()

Why Kubernetes Won: Perfect Timing & Developer Culture

Kubernetes won big because the stars aligned, DevOps took off, Docker exploded, and enterprises finally stopped side-eyeing open source. Then came the institutional tailwind: CNCF pushed hard, GCP bet big, and the rest followed. Kubernetes isn't just tech. It's a new operating model, built in the op.. read more  

Link
@kaptain shared a link, 1 month ago
FAUN.dev()

An In-Depth Look at Istio Ambient Mode with Calico

Tigera just wiredIstio Ambient Modeinto Calico. That means you getsidecarless service mesh, think mTLS, L4/L7 policy, and observability, without stuffing every pod with a sidecar. It’s all handled by lean zTunnel and Waypoint proxies. Ports stay visible, soCalico and Istio policiesplay nice. No rewr.. read more  

Link
@kaptain shared a link, 1 month ago
FAUN.dev()

Kubernetes Made Simple: A Guide for JVM Developers

A sharp walkthrough for JVM devs shipping aKotlin Spring Boot app on Kubernetes. It covers the full deployment arc, packaging with Docker, wiring upDeploymentandServicemanifests, and managing config withConfigMapsandSecrets. There's a cleanPostgreSQLintegration baked in. It even gets intoheader-base.. read more  

Kubernetes Made Simple: A Guide for JVM Developers
Link
@kaptain shared a link, 1 month ago
FAUN.dev()

Kubernetes 1.35 - New security features

Kubernetes 1.35 is done with legacy baggage. cgroups v1? Deprecated. Image pull credentials? Now re-verified by default—no more freeloading. kubectl SPDY API upgrades? Locked down. You’ll needcreatepermissions just to speak the protocol. Expect breakage if your workflows leaned on old assumptions. U.. read more  

Kubernetes 1.35 - New security features
Link
@kaptain shared a link, 1 month ago
FAUN.dev()

How to Troubleshoot Common Kubernetes Errors

A fresh Kubernetes troubleshooting guide lays out real-world tactics for tracking down 12 common cluster headaches. Think:kubectlsleuthing, poking through system logs, scraping observability metrics, and jumping intodebug containers. The guide breaks down howAIOpsis stepping in, digesting event data.. read more  

How to Troubleshoot Common Kubernetes Errors
Link
@kaptain shared a link, 1 month ago
FAUN.dev()

Compose to Kubernetes to Cloud With Kanvas

Docker just droppedKanvas, a new visual toy for building multi-cloud Kubernetes setups, without drowning in YAML. It bolts onto Docker Desktop and runs onMeshery. Drag and drop services into a topology, then bring them to life across AWS, GCP, or Azure. Mix inpolicy-driven validationandreal-time mut.. read more  

Compose to Kubernetes to Cloud With Kanvas
Link
@kaptain shared a link, 1 month ago
FAUN.dev()

The “Inception” of Kubernetes: A Deep Dive into vCluster Architecture and Benefits

vCluster, a CNCF sandbox project, spins up real-deal Kubernetes control planes inside pods. Each lives in its own namespace but behaves like a full cluster, admin access, CRDs, Helm, the works. It reuses the host’s worker nodes using a syncer that routes vCluster workloads onto the real thing... read more  

The “Inception” of Kubernetes: A Deep Dive into vCluster Architecture and Benefits
Link
@kaptain shared a link, 1 month ago
FAUN.dev()

How to Add MCP Servers to ChatGPT

ChatGPT leveled up with fullModel Context Protocol (MCP)support. It can now run real developer tasks, scraping, writing to a database, even making GitHub commits, through secure, containerized tools in Docker. TheDocker MCP Toolkitconnects ChatGPT’s language smarts to production-safe tools like Stri.. read more  

How to Add MCP Servers to ChatGPT
Link
@kaptain shared a link, 1 month ago
FAUN.dev()

A Deep Dive into Kubernetes Headless Service

Headless Serviceis a powerfulKubernetesfeature enabling direct pod-to-pod communication forstateful applicationsand preciseservice discoverywithout traditional load balancing.No automatic load balancing, pod IP changes, andspecial use casesmake it ideal for specific scenarios, not general workloads... read more  

The Open Source Security Foundation (OpenSSF) is an industry-backed foundation focused on strengthening the security of the global open source software ecosystem. It brings together major technology companies, cloud providers, open source communities, and security experts to address systemic security challenges that affect how software is built, distributed, and consumed.

OpenSSF was launched in 2021 and operates under the Linux Foundation, combining efforts from earlier initiatives such as the Core Infrastructure Initiative (CII) and industry-led supply chain security programs. Its mission is to make open source software more trustworthy, resilient, and secure by default, without placing unrealistic burdens on maintainers.

The foundation works across several key areas:

- Supply chain security: Developing frameworks, best practices, and tools to secure the software lifecycle from source to deployment. This includes stewardship of projects like sigstore and leadership on SLSA (Supply-chain Levels for Software Artifacts).

- Security tooling: Supporting and incubating open source tools that help developers detect, prevent, and remediate vulnerabilities at scale.

- Vulnerability management: Improving how vulnerabilities are discovered, disclosed, scored, and fixed across open source projects.

- Education and best practices: Publishing guidance, training, and maturity models such as the OpenSSF Best Practices Badge Program, which helps projects assess and improve their security posture.

- Metrics and research: Advancing data-driven approaches to understanding open source security risks and ecosystem health.

OpenSSF operates through working groups and special interest groups (SIGs) that focus on specific problem areas like securing builds, improving dependency management, or automating provenance generation. This structure allows practitioners to collaborate on concrete, actionable solutions rather than high-level policy alone.

By aligning maintainers, enterprises, and security teams, OpenSSF plays a central role in reducing large-scale risks such as dependency confusion, compromised build systems, and malicious package injection. Its work underpins many modern DevSecOps and cloud-native security practices and is increasingly referenced by governments and enterprises as a baseline for secure software development.