Remove Events Remove Linux Remove Load Balancer Remove Security
article thumbnail

Technology Short Take 153

Scott Lowe

Xavier Avrillier walks readers through using Antrea (a Kubernetes CNI built on top of Open vSwitch—a topic I’ve touched on a time or two) to provide on-premise load balancing in Kubernetes. What happens to submarine cables when there are massive events, like a volcanic eruption? Servers/Hardware.

Linux 74
article thumbnail

Vendor-Side DevOps Practices Can Still Deliver Better Value While Client-Side Government Processes Catch Up

CTOvision

I heard a lot of questions targeted to this exact area at a recent event I attended in Washington, D.C., We must approve and deploy in an environment with significant cultural, regulatory and security guardrails. where I was on an expert panel regarding accelerating application delivery in the government.

Devops 150
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 141

Scott Lowe

Via Ivan Pepelnjak, I was pointed to Jon Langemak’s in-depth discussion of working with Linux VRFs. The first is a post on Cilium and F5 load balancer integration , while the second discusses implementing Kubernetes network policies with Cilium and Linkerd. Networking. Here you go.

Vmware 60
article thumbnail

Technology Short Take 103

Scott Lowe

Scott McCarty explains sVirt and how it’s used to isolate Linux containers. Andrew Martin has a write-up with security recommendations for your Kubernetes clusters. Check out these articles talking about IPVS-based in-cluster load balancing , CoreDNS , dynamic kubelet configuration , and resizing persistent volumes in Kubernetes.

article thumbnail

Technology Short Take #56

Scott Lowe

In this post, I’ve collected a few links on various data center technologies, news, events, and trends. The security posture of Docker containers is, rightfully so, starting to see more focus. Major Hayden has an article on using Ansible to secure OpenStack hosts. Welcome to Technology Short Take #56! Networking.

Vmware 60
article thumbnail

The Definitive Guide to Achieve AWS Cloud Certification

Linux Academy

Domain 2: Security . Define AWS Cloud security and compliance concepts. Identify resources for security support . The basic security and compliance aspects of the AWS platform and the shared security model. IAM, Trusted Advisor – security, why it’s important, differences between users /groups/roles.

Cloud 16
article thumbnail

Liveblog: DockerCon 2015 Day 2 General Session

Scott Lowe

Additionally, Docker is working to improve the security of Docker Hub (this is probably a reflection of the recent study pointing out the number of images that have security flaws) through a variety of mechanisms. Decrease time for security review. On-premise registry. Networking. Directory integration. million downloads).