Remove Authentication Remove Linux Remove Load Balancer Remove Network
article thumbnail

Technology Short Take 176

Scott Lowe

Networking Lee Briggs (formerly of Pulumi, now with Tailscale) shows how to use the Tailscale Operator to create “free” Kubernetes load balancers (“free” as in no additional charge above and beyond what it would normally cost to operate a Kubernetes cluster). Think Linux doesn’t have malware?

Linux 112
article thumbnail

Technology Short Take 141

Scott Lowe

Networking. Via Ivan Pepelnjak, I was pointed to Jon Langemak’s in-depth discussion of working with Linux VRFs. The first is a post on Cilium and F5 load balancer integration , while the second discusses implementing Kubernetes network policies with Cilium and Linkerd. Servers/Hardware.

Vmware 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Optimizing PCI compliance in financial institutions

CIO Business Intelligence

Furthermore, if the operating system pattern is Linux Oracle Enterprise, the architect would use that pattern first in its design unless technical constraints made the consumption of this pattern suboptimal to accomplish the solution’s goal.

Financial 104
article thumbnail

Technology Short Take #25

Scott Lowe

Networking. I think this three-part series on new network models for cloud computing ( part 1 , part 2 , and part 3 ), while almost a year old, is quite good. Erik Smith, notably known for his outstanding posts on storage and FCoE, takes a stab at describing some of the differences between SDN and network virtualization in this post.

Storage 92