Join us

ContentUpdates and recent posts about Sigstore..
News FAUN.dev() Team Trending
@kaptain shared an update, 4 weeks, 1 day ago
FAUN.dev()

Google Breaks Kubernetes Limits Again: Inside the 130,000-Node GKE Cluster

Google Kubernetes Engine (GKE) kueue

Google successfully operates a 130,000-node Kubernetes cluster to enhance GKE's scalability for AI workloads.

Control plane throughput: Sustaining up to 1,000 operations per second for both Pod creation and Pod binding during intense scheduling phases.
 Activity
@kaptain added a new tool kueue , 4 weeks, 1 day ago.
News FAUN.dev() Team
@devopslinks shared an update, 4 weeks, 1 day ago
FAUN.dev()

Inside Cloudflare's Worst Outage Since 2019: How a Single Config File Broke the Internet

Cloudflare Cloudflare Workers

A database permissions change led to a Cloudflare outage by creating an oversized feature file, causing network failures initially mistaken for a DDoS attack.

Inside Cloudflare's Worst Outage Since 2019: How a Single Config File Broke the Internet
News FAUN.dev() Team
@devopslinks shared an update, 4 weeks, 1 day ago
FAUN.dev()

Valkey 9.0 Released: Faster Clusters, New TTL Controls, and Big Networking Gains

Valkey

Valkey 9.0 debuts with atomic slot migrations, hash field expiration, and improved cluster mode support, enhancing data management and scalability.

Valkey 9.0 Released: Faster Clusters, New TTL Controls, and Big Networking Gains
 Activity
@devopslinks added a new tool Valkey , 4 weeks, 1 day ago.
News FAUN.dev() Team Trending
@devopslinks shared an update, 4 weeks, 1 day ago
FAUN.dev()

Grafana 12.3 Lands With New Learning Tools, Better Logs, and a Critical Security Fix

Grafana

Grafana 12.3 enhances user experience with interactive learning, improved logs visualization, and a critical security fix, alongside new features like dashboard image export and expanded data source support.

Grafana 12.3 Lands With New Learning Tools, Better Logs, and a Critical Security Fix
News FAUN.dev() Team
@kala shared an update, 4 weeks, 1 day ago
FAUN.dev()

Google Unveils Antigravity: An Agentic IDE Built for Autonomous Coding

Google Antigravity

Google introduces Antigravity, an AI-driven platform enhancing IDEs with autonomous coding capabilities, now in public preview.

Google Unveils Antigravity: An Agentic IDE Built for Autonomous Coding
 Activity
@kala added a new tool Google Antigravity , 4 weeks, 1 day ago.
News FAUN.dev() Team
@kala shared an update, 4 weeks, 1 day ago
FAUN.dev()

Finally: AI Image Generation That Handles Text Correctly - Meet Nano Banana Pro

Nano Banana Pro

Google DeepMind introduces Nano Banana Pro, an advanced image generation and editing model, enhancing creative capabilities and available globally in the Gemini app.

Finally: AI Image Generation That Handles Text Correctly - Meet Nano Banana Pro
 Activity
@kala added a new tool Nano Banana Pro , 4 weeks, 1 day ago.
Sigstore is an open source initiative designed to make software artifact signing and verification simple, automatic, and widely accessible. Its primary goal is to improve software supply chain security by enabling developers and organizations to cryptographically prove the origin and integrity of the software they build and distribute.

At its core, sigstore removes many of the traditional barriers associated with code signing. Instead of managing long-lived private keys manually, sigstore supports keyless signing, where identities are issued dynamically using OpenID Connect (OIDC) providers such as GitHub Actions, Google, or Microsoft. This dramatically lowers operational complexity and reduces the risk of key compromise.

The sigstore ecosystem is composed of several key components:

- Cosign: A tool for signing, verifying, and storing signatures for container images and other artifacts. Signatures are stored alongside artifacts in OCI registries, rather than embedded in them.

- Fulcio: A certificate authority that issues short-lived X.509 certificates based on OIDC identities, enabling keyless signing.

- Rekor: A transparency log that records signing events in an append-only, tamper-evident ledger. This provides public auditability and detection of suspicious or malicious signing activity.

Together, these components allow anyone to verify who built an artifact, when it was built, and whether it has been tampered with, using publicly verifiable cryptographic proofs. This aligns closely with modern supply chain security practices such as SLSA (Supply-chain Levels for Software Artifacts).

sigstore is widely adopted in the cloud-native ecosystem and integrates with tools like Kubernetes, container registries, CI/CD pipelines, and package managers. It is commonly used to sign container images, Helm charts, binaries, and SBOMs, and is increasingly becoming a baseline security requirement for production software delivery.

The project is governed by the OpenSSF (Open Source Security Foundation) and supported by major industry players.