<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=521127644762074&amp;ev=PageView&amp;noscript=1">
9 minute read
| July 12, 2022

Kubernetes Mutations with Polaris: How it Works

For the last three years, Polaris has allowed Kubernetes users to audit their clusters and Infrastructure-as-Code for best practices. It comes with over 20 built-in checks,... Read More
4 minute read
| July 12, 2022

Practical Applications for Fairwinds Polaris' Automated Remediation

The core of Fairwinds’ mission is to enable teams using Kubernetes to ship applications faster with less risk. Platform engineering leaders are at the forefront of this:... Read More
6 minute read
| July 6, 2022

Kubernetes Governance: What is OPA and Why Care?

Policy and governance are terms that often come up in the Kubernetes space, but how do we actually do this? This is where the Open Policy Agent (OPA) comes into the picture.... Read More
4 minute read
| June 22, 2022

Kubernetes Remediation at Scale: Visibility vs. Action

As I work with organizations of all sizes, one theme I run into is that visibility does not equal action. Kubernetes offers a lot of power, but also requires a lot of... Read More
5 minute read
| June 21, 2022

Fairwinds Insights Release Notes 8.6-10: Spotlight on Policies and NSA Hardening Guidance

Fairwinds Insights has been enhanced over the last month to include a number of new features and bug fixes. The Kubernetes governance platform ensures users can configure... Read More
6 minute read
| June 17, 2022

Top 12 Kubernetes Resources: Learn and Stay Up-to-Date

The cloud native community is thriving and Kubernetes has a lot to do with it. As an open source community, members are dedicated to education and support on the topic. Read More
5 minute read
| June 15, 2022

NSA Kubernetes Hardening Guide: Upgrade and Application Security

Our NSA Kubernetes Hardening Guide series has looked at pod security, network access, authentication and authorization, audit logging and threat detection. In the final... Read More
5 minute read
| June 10, 2022

NSA Kubernetes Hardening Guide: Audit Logging and Threat Detection Overview

In our series on the NSA Kubernetes Hardening Guide, we’ve looked at pod security, network access and authentication and authorization. Today we look at the audit logging and... Read More
3 minute read
| June 6, 2022

Open Source Project: NOVA 3.1.0, Not Just For Helm Users Anymore!

Up until now, Fairwinds Nova was just a tool for Helm releases. While this has been exceptionally useful for us and other users over the last several years, we recognize that... Read More
4 minute read
| June 2, 2022

What are Kubernetes Guardrails?

If you’ve ever gone bowling with small children, you’ll easily visualize a bowling lane with the bumpers up. The purpose: allow the bowling ball to reach the pins without the... Read More
5 minute read
| June 1, 2022

Kubernetes: The Blackhole of FinOps

FinOps has become another buzzword in the cloud native ecosystem of late. FinOps, as defined by the FinOps Foundation, is the: Read More