Mr.PlanBBGP vs. Layer 2 in Kubernetes: What’s the Big Deal?If you’ve ever set up a Kubernetes cluster, you know networking is one of those areas that can quickly turn into a rabbit hole. Between…Jan 16Jan 16
InBuilding Real-World, Real-Time AIbyDataStaxA Guide to Agentic AI ArchitectureBy Brian GodseyDec 2, 20247Dec 2, 20247
Aslanov JavidMonitoring Inter-Pod Traffic at the AZ Level with eBPF based tool RetinaIntroductionAug 25, 20241Aug 25, 20241
Chen CohenI Own Your “Cloud Shell”: Taking over “Azure Cloud Shell” Kubernetes Cluster Through Unsecured…“Azure Cloud Shell is a browser-based shell experience to manage and develop Azure resources.Feb 15, 2021Feb 15, 2021
InITNEXTbyPawel WoltschkowDeep Dive into .NET Hosted ServicesUncovering Internal Mechanics of Hosted ServicesNov 23, 20244Nov 23, 20244
Anvesh Muppeda⎈ A Hands-On Guide to Kubernetes: Network Policy 🛠️⇢ Understanding Kubernetes Network Policy with Practical ExamplesJul 22, 2024Jul 22, 2024
Jashanpreet Singh🌟 Day 3: Installing Wazuh on DigitalOcean 🚀Welcome back to Day 3 of building out your SOC Automation Lab! 👨💻 In Day 1, we set the foundation by outlining the lab structure, and in…Oct 18, 2024Oct 18, 2024
Jashanpreet SinghDay 1: Building Your SOC Automation Lab: An Introduction and Overview📢In this 10-day journey, you’ll create a fully functional SOC (Security Operations Center) Automation Lab, equipping yourself with hands-on…Oct 15, 20243Oct 15, 20243
InAWS in Plain EnglishbyRahul Sharma7 AWS VPC Best Practices Every Cloud Engineer Should KnowTransform Your AWS VPC Setup with these seven stepsNov 11, 20243Nov 11, 20243
Guillem RieraThe most performant Docker setup on macOS (Apple Silicon M1, M2, M3) for x64 / amd64 compatibility.In the past years I have been using mostly Podman as a Docker replacement for most of my workflows. I wrote about it in several posts:Mar 8, 20248Mar 8, 20248
InCubedbyMichael Wood100% Accurate AI Claimed by Acurai — OpenAI and Anthropic Confirm Acurai’s DiscoveriesAcurai’s audacious claims to have discovered how LLMs operate are now confirmed by studies conducted by OpenAI and Anthropic.Aug 26, 202421Aug 26, 202421
Namrata DHow to pass the CKS exam tips and tricks with examples (Part I)The Certified Kubernetes Security Specialist (CKS) exam is a certification that validates one’s ability to design and implement secure…Jul 14, 20232Jul 14, 20232
InLevel Up CodingbyMd ShamimAccess Kubernetes Objects Data From /Proc DirectoryAn overview of the “proc” directory and some use casesDec 23, 2022Dec 23, 2022
InITNEXTbyTylerK8sGPT + LocalAI: Unlock Kubernetes superpowers for free!As we all know, LLMs are trending like crazy and the hype is not unjustified. Tons of cool projects leveraging LLM-based text generation…Apr 26, 20233Apr 26, 20233
InCodeXbyRocky ChenCilium NetworkPolicy with AWS Security Group rulesCilium is a powerful network policy and security enforcement solution that is designed to work with Kubernetes and other container…Apr 27, 2023Apr 27, 2023
Benoit MOUQUETCilium CNI on EKS using secondary CIDR and prefix delegationWe are currently working on a Kubernetes shared cluster to host various applications on my current company. Deploy multiple applications on…Oct 4, 20223Oct 4, 20223
Jason FehrInspecting Kubernetes Client to API Server Network TrafficPeering into the closed box that is Kubernetes client-server communication.Jun 27, 2022Jun 27, 2022
InPareturebyNick GibbonKubernetes Bound Projected Service Account Token Volumes Might Surprise YouImportant differences to understand and remember with default Service Account Projection and Bound Service Account Token Volumes in the…Apr 18, 2022Apr 18, 2022
Ankush ChavanCreating Multi-Cloud Kubernetes Cluster on AWS, Azure, and GCP cloudNowadays, most applications are using Kubernetes for their deployments. Kubernetes cluster is generally deployed on the Clouds like AWS or…Apr 26, 20212Apr 26, 20212