Join us

ContentUpdates and recent posts about Kata Containers..
Link
@varbear shared a link, 1 month ago
FAUN.dev()

A new chapter for the Nix language, courtesy of WebAssembly

Determinate Nix introduces experimental WebAssembly host calls. It lets Nix invoke Wasm modules, pass and return complex Nix values, and support Rust, C++, and Zig toolchains. It runs on Wasmtime/Cranelift and slashes runtime and memory: Fibonacci test 0.33s vs 79.33s, 30MB vs 4.5GB. Per-call instan.. read more  

A new chapter for the Nix language, courtesy of WebAssembly
Link
@varbear shared a link, 1 month ago
FAUN.dev()

Using Rust and Postgres for everything: patterns learned over the years

Rust and PostgreSQL are considered the best tools in the software world due to their performance and reliability. Rewriting a backend service from Go to Rust led to significant improvements in processing speed and memory usage. Using sqlx for database operations and leveraging PostgreSQL features li.. read more  

Link
@varbear shared a link, 1 month ago
FAUN.dev()

I built a programming language using Claude Code

Cutlet usesClaude Code. The LLM emits every line. Source, build steps, and examples live on GitHub. It runs on macOS and Linux and ships aREPL. It supports arrays, strings, double numbers, a vectorizingmeta-operator, zip/filter indexing, prototypal inheritance, and a mark-and-sweepGC. Development ra.. read more  

Link
@varbear shared a link, 1 month ago
FAUN.dev()

Why value streams and capability maps are your new governance control plane

The piece flips enterprise AI fromgenerativetoagentic. Agents getstructured autonomyto perceive, plan, and execute across systems. It turnsvalue streammaps into a control plane withautonomy zones,halt-on-exceptiongates, cryptographicflight recorders, andpolicy-as-code. Result: less hallucination and.. read more  

Why value streams and capability maps are your new governance control plane
Link
@varbear shared a link, 1 month ago
FAUN.dev()

Cracking the Python Monorepo

Outlines a Python monorepo setup that pairsuvworkspaces withDaggerandBuildKitcaching. Builds container stages programmatically. Keeps things cache-friendly and predictable. Parsespyproject.tomland extracts the workspace graph. Copies required local packages into intermediate stages. Installs them in.. read more  

Link
@kaptain shared a link, 1 month ago
FAUN.dev()

Running Agents on Kubernetes with Agent Sandbox

Agent Sandbox unveils the Sandbox CRD to map long-lived, singleton AI agents onto Kubernetes. It adds stable identity and lifecycle primitives. It supports runtimes like gVisor and Kata Containers. It enables zero-scale resume. It includes SandboxWarmPool with SandboxClaim and SandboxTemplate to kil.. read more  

Link
@kaptain shared a link, 1 month ago
FAUN.dev()

Securing Production Debugging in Kubernetes

The post prescribes an on-demand SSH gateway pod. It usesshort-lived, identity-bound credentialsandKubernetes RBACto grant scoped, auditable debug sessions. It recommends anaccess brokerthat binds Roles to groups, issues ephemeral certs and OpenSSH user certificates, rotates CAs, enforces command-le.. read more  

Link
@kaptain shared a link, 1 month ago
FAUN.dev()

The Invisible Rewrite: Modernizing the Image Promoter

SIG Release rewrote theimage promotercore. It cut 20% of the code. It added apipeline engine,cosignsigning, andSLSAattestations. Signing now sits separate fromsignature replication. Registry reads run in parallel - plan time dropped ~20m → ~2m. Per-request timeouts, retries, and HTTP connection reus.. read more  

Link
@kaptain shared a link, 1 month ago
FAUN.dev()

Kubernetes v1.36 - Sneak Peek

Kubernetes v1.36 (Apr 22, 2026) enablesHPAScaleToZeroby default. That lets theHPAuseminReplicas: 0and read only controller-owned pod metrics. The release swaps long-lived image-pull secrets forephemeral KSA tokens. It deprecatesIPVS, retiresIngress NGINX, and aligns withcontainerd 2.x. The release f.. read more  

Link
@kala shared a link, 1 month ago
FAUN.dev()

OpenAI to acquire Astral

OpenAI will acquire Astral, pending regulatory close. It will fold Astral's open-source Python tools —uv,Ruff, andty— intoCodex. Teams will integrate the tools.Codexwill plan changes, modify codebases, run linters and formatters, and verify results acrossPythonworkflows. System shift:This injects pr.. read more  

OpenAI to acquire Astral
Kata Containers is a Cloud Native Computing Foundation (CNCF) project designed to close the security gap between traditional Linux containers and virtual machines. Instead of sharing a single host kernel like standard containers, Kata Containers launches each pod or container inside its own lightweight virtual machine using hardware virtualization.

This approach dramatically reduces the attack surface and prevents container escape vulnerabilities, making Kata ideal for multi-tenant, untrusted, or sensitive workloads. Despite using VMs under the hood, Kata is optimized for fast startup times and integrates seamlessly with Kubernetes through the Container Runtime Interface (CRI), allowing it to be used alongside runtimes like containerd and CRI-O.

Kata Containers is commonly used in scenarios such as multi-tenant Kubernetes clusters, confidential computing, sandboxed AI workloads, serverless platforms, and agent execution environments where strong isolation is mandatory. It supports multiple hypervisors, including QEMU, Firecracker, and Cloud Hypervisor, and continues to evolve toward faster boot times, lower memory overhead, and better hardware acceleration support.