Remove Load Balancer Remove Open Source Remove Policies Remove Security
article thumbnail

Technology Short Take 143

Scott Lowe

Here’s a quick look at using Envoy as a load balancer in Kubernetes. I saw this blog post about Curiefense , an open source Envoy extension to add WAF (web application firewall) functionality to Envoy. I really enjoy these AWS open source news and updates posts. Networking. Servers/Hardware.

article thumbnail

Technology Short Take 151

Scott Lowe

Aidan Steele examines how VPC sharing could potentially improve security and reduce cost. Nick Schmidt talks about using GitOps with the NSX Advanced Load Balancer. The story of a developer deliberately polluting their open source projects—as outlined here for the “colors.js” Servers/Hardware.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Changing the calculus of containers in the cloud

All Things Distributed

They are an important, but incremental, step on the journey of being able to write code and have it run in the right place, with the right scale, with the right connections to other bits of code, and the right security and access controls. Container orchestration has always seemed to me to be very not cloud native.

Cloud 149
article thumbnail

Technology Short Take 143

Scott Lowe

Here’s a quick look at using Envoy as a load balancer in Kubernetes. I saw this blog post about Curiefense , an open source Envoy extension to add WAF (web application firewall) functionality to Envoy. I really enjoy these AWS open source news and updates posts. Networking. Servers/Hardware.

article thumbnail

Weekly Update 5-20-2019

Linux Academy

Improved security. For the Red Hat Certified Specialist in Security Prep course , we have the following hands-on labs: Configuring Audit Settings on Red Hat. Create a Custom Scan Policy with OpenSCAP. Configure an Account Lockout Policy. Configure a Password Complexity Policy. Red Hat Enterprise 8.

Linux 60
article thumbnail

Technology Short Take 141

Scott Lowe

The first is a post on Cilium and F5 load balancer integration , while the second discusses implementing Kubernetes network policies with Cilium and Linkerd. John Gruber’s post on “Secure Intent” on Apple devices was, for me at least, an informative read. Operating Systems/Applications. Programming.

Vmware 60
article thumbnail

Lift-and-shift: Why does it undermine BSS-on-cloud transformation?

TM Forum

The first and most important ones are security and privacy. For example, not all on premise applications will perform well on the cloud, including policy and charging rules function (PCRF) and network provisioning. Why lift-and-shift doesn't work. CSPs also need to consider performance challenges. That's not all.

Cloud 130