KUBERNETES HOME LAB IN 2025: PART 1 - CNI & GITOPS
Last time, we left our Cluster in a semi-happy state: The nodes were up, the control plane was available, but we had no cluster network. Today, we will fix that, and a bit more.
Read moreKUBERNETES HOME LAB IN 2025: PART 0 - BOOTSTRAPPING THE CLUSTER
First things first, we need some nodes that make up our cluster.
Read moreKUBERNETES HOME LAB IN 2025: INTRODUCTION
The year was 2024, Cyber Monday was rolling by and my manager pointed out that I still had a budget available for training and certifications. One purchase of a Kubestronaut Certification Bundle and a few weeks later, I kinda have to face it: I need a new home lab.
Read moreGETTING STARTED WITH OPEN SOURCE: MAKING MY FIRST CONTRIBUTION TO HUGO.
Lots of people ask for advice on how to get started in open source.
Read moreTHE HIDDEN RISKS OF HIGH-QUALITY CODE
Popularized by Google[1][2], Haunted Graveyards are pieces of code that, while providing a business value, are so ancient, obtuse, or complex that no one dares enter them.
Read moreMAKE CHROME GO BRRRRRR....
Everything started with a simple question: “Why does my laptop get hot watching YouTube?”, and led to a rabbit hole of hardware acceleration, Chrome flags, and Intel iGPU monitors.
Read moreGITSIGN IN REMOTE ENVIRONMENTS
After attending SigstoreCon, I got inspired by Priya Wadhwa’s Keynote: Signing Git Commits with Gitsign, to finally set up gitsign for my dev environment. It seemed straightforward enough, right?
Read moreBRINGING FIRST-CLASS SUPPORT TO SBOMS AND ATTESTATIONS FOR CONSTELLATION CONTAINERS
In a previous post, we explored how to generate a Software Bill of Materials (SBOM) and subsequently scan them for vulnerabilities. In this post, we show you how SBOMs can be signed and then stored in the same container registry as the scanned image. This improves security & discoverability!
Read moreMY FAVORITE TOOLS TO KEEP A ZERO VULNERABILITIES POSTURE FOR CONSTELLATION
In our last post, we explored how Software Bill of Materials (SBOMs) provide us with a transparent view of all dependencies in Constellation. In this post, we explore how we can use this information to continuously monitor vulnerabilities and upgrade to patched versions as soon as they are available.
Read moreGENERATING SBOMS FOR CONFIDENTIAL KUBERNETES IS EASIER THAN YOU THINK!
Constellation is an infrastructure product and includes several different components:
Read more- 1
- 2