Ensuring robust Kubernetes security is a shared responsibility that demands collaboration between developers and operators. By addressing vulnerabilities in container images, restricting additional privileges, and restricting visibility between components, organizations can establish a secure Kubernetes environment. Developers play a crucial role in utilizing vulnerability scans, minimizing components, and implementing authentication measures, while operators enforce policies, perform vulnerability scans, and manage network visibility. Together, they fortify the container ecosystem, protecting applications and critical business assets from potential security breaches. Discover the collaborative journey to Kubernetes security and unlock the full potential of this powerful orchestration platform.
Hacks
Multi-Stage Dockerfile: Awesome Approach To Optimize Your Container Size
Multi-Stage Dockerfile is the pattern you can use to ensure that your docker image is at an optimized size. We already have covered the importance of keeping the size of your docker image at a minimum level and what tools you could use, such as dive, to understand the size of each of your layers. […]
Helm Loops: Helm Hack #1
Introduction Discover how to add Helm Loops to your helm charts to provide more dynamic behavior to your Helm Charts. Helm Charts are becoming the default de-factor solution when you want to package your Kubernetes deployment to be able to distribute or quickly install it in your system. Defined several times as the apt for […]
3 Unusual Tools To Boost Your Developer Productivity
A non-VS Code list for software engineers This is not going to be one of those articles about tools that can help you develop code faster. If you’re interested in that, you can check out my previous articles regarding VS Code extensions, linters, and other tools that make your life as a developer easier. My […]
Shell XML Processing: How To Update value in XML file in 5 Minutes
Learn how to use xmlstarlet to update value in XML file and handle complex XML payloads efficiently in your shell scripts
Top 3 Bash Hacks To Boost Your Performance
Find the list of the bash performance hacks I use all the time and they can help you save a lot of time in your daily job. Bash hacks knowledge is one of the ways to improve your performance. We spend many hours inside of them and have been developing patterns and habits when we log […]
Using Statistics in your favor to detect bottlenecks in TIBCO BusinessWorks Container Edition
Usually, when you’re developing or running your container application you will get to a moment when something goes wrong. But not in a way you can solve with your logging system and with testing. A moment when there is some bottleneck, something that is not performing as well as you want, and you’d like to […]
Flogo Configuration: How To Master It In 5 Minutes?
Flogo Enterprise is so great platform to build your microservices and Out of the box, you’re going to reach an incredible performance number. But, even with that, we’re working in a world where each milliseconds count and each memory MB count so it is important to know the tools that we have in our hands […]
Flogo Error Handling
Introduction We’ve covered the basics of Flogo Enterprise development in the previous articles, but there is an important topic that hasn’t been discussed for now, and this is flogo error handling. We always think everything is going to work the way we plan to, and everything is going to go down the green path, but […]
Installing Flogo Extensions
In previous posts, we’ve talked about capabilities of Flogo and how to build our first Flogo application, so at this moment if you’ve read both of them you have a clear knowledge about what Flogo provides and how easy is to create applications in Flogo. But in those capabilities, we’ve spoken about that one of […]