A hands-on reflection on deploying Kubernetes clusters outside the data centre—from factory floors to retail stores—covering benefits like low latency and reliability, security considerations and trends shaping edge computing in 2025.
Introduction Keeping container-based applications secure is crucial in modern DevOps workflows. Automated scanning of Docker images during CI/CD pipelines can prevent vulnerabilities from reaching production environments, saving considerable time, effort, and potentially, significant damage. In this guide, I’ll take you step-by-step through integrating automated image scanning into your GitHub Actions workflow using Trivy, a popular…
Introduction GitHub Actions is an automation tool that helps developers design their workflows by automating tasks, allowing the implementation of CI/CD directly from within the Github repositories. Security is essential when managing production applications to protect data, prevent unauthorized access, and maintain the application integrity, integrating image scanning into the CI/CD process is not just…
Introduction With the rise of Kubernetes, managing applications and its dependencies become a thing, to help users and developers to handle these dependencies and components and keep the relationship on each of them is when the package management comes to the table. While there are several packaging system like the CNAB, Operators or Helm, there…
eBPF Overview Cilium is an open-source solution providing security, observability and networking for cloud-native workloads. Cilium uses Kernel eBPF, it basically allows to run sandbox on operating systems which can be used by developers to create and run eBFP-based programs to cover a various gaps about observability and tracing, network isolation and security as never…
Introduction Image signature verification is an important step if you want to deploy applications securely on Kubernetes clusters. It allows customers to ensure no unexpected or malicious changes affect the images along the entire CI/CD flow. Images stored in a registry can be signed using several tools like the Notary Server and the Cosign/Sigstore, both…