<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=521127644762074&amp;ev=PageView&amp;noscript=1">
15 minute read
| January 29, 2021

Kubernetes Maturity Model: Expected Business Outcomes

When you move to Kubernetes, you must show clear business advantages. The business outcomes expected will include cost savings over time as you have better infrastructure... Read More
5 minute read
| January 21, 2021

Why Kubernetes Policy Enforcement

Once you’ve overcome the hurdle of deploying Kubernetes, migrating and/or launching your app, now you have to manage Kubernetes. This is no small problem itself. With a... Read More
16 minute read
| January 13, 2021

Open Source vs Commercial Software: Why You Can’t (Always) Afford Free

When building an application, often the most important technical decisions come down to what to build yourself, and where to rely on third parties. Thanks to a vibrant open... Read More
4 minute read
| January 7, 2021

4 Kubernetes Resolutions for 2021: A Year of Transformation

Our team at Fairwinds, including Bill Ledingham, Kendall Miller, Andy Suderman, Joe Pelletier and Robert Brennan, made predictions for what we can expect in 2021. Amongst the... Read More
3 minute read
| January 6, 2021

How to Identify Docker :latest Tag in Kubernetes Clusters

As your team updates an app with new features or solves for bugs, you’ll be pushing the latest image to your Docker registry. In Kubernetes, Docker's latest tag is applied by... Read More
4 minute read
| December 22, 2020

Kubernetes How to: Ensure imagePullPolicy set to Always

Relying on cached versions of a Docker image can become a security vulnerability. By default, an image will be pulled if it isn't already cached on the node attempting to run... Read More
2 minute read
| December 21, 2020

Check Kubernetes Pod SecurityContext for readOnlyRootFilesystem

Kubernetes pod security policies enable fine-grained controls around pod creation and updates. securityContext defines a set of restraints on the runtime of a pod. Read More
4 minute read
| December 18, 2020

Why Fixing Kubernetes Configuration Inconsistencies is Critical for Multi-tenant and Multi-cluster Environments

In most cases, organizations pilot Kubernetes with a single application. Once successful, these organizations commit to Kubernetes across multiple apps, development and ops... Read More
17 minute read
| December 15, 2020

Kubernetes Clinic Spotlight on Tabitha Sable: Helping People Level Up

Talking to Tabitha Sable is like trying to stuff 20 pounds of goodness into a 5-pound bag – the whole thing overflows with insight, technical knowledge and a healthy dose of... Read More
3 minute read
| December 14, 2020

How to Identify Over Permissioned Containers

An over permissioned container has all the root capabilities of a host machine. The container can access resources which are not accessible in ordinary containers. While... Read More
3 minute read
| December 11, 2020

How to Identify Missing Readiness Probes in Kubernetes

Kubernetes offers two types of health checks: readiness probes and liveness probes. Read More
5 minute read
| December 9, 2020

Kubernetes CVE-2020-8554: Instructions to Identify if You’re Impacted

A new medium severity CVE has been discovered (CVE-2020-8554) affecting multitenant Kubernetes clusters. If a potential attacker can already create or edit services and pods,... Read More