Sealed Secrets
Kubernetes uses a key-value object called a secret, but by default, they are not fully secure. They are kept separate from other data to allow for separate s...
Kubernetes uses a key-value object called a secret, but by default, they are not fully secure. They are kept separate from other data to allow for separate s...
In May 2021, the U.S. White House issued its Executive Order on Improving the Nation’s Cybersecurity and it has the potential to revolutionize software devel...
The use of the Kubernetes Operator pattern for purposes other than managing applications deployed on a cluster can be seen as a useful solution:
``` Scenario: User can scale a cloud native application horizontally
Conway’s Law serves as a reminder that effective communication structures are essential to successful software development. The structure of a team can enabl...