PinnedTransitioning back to an individual contributor roleAs they say- Change is the only constant in life.Mar 14, 20221Mar 14, 20221
Simplifying Confidential Computing: Sealed Secrets in ActionUsing CoCo sealed secrets to make it easier to adopt confidential computing for your Kubernetes workloadsDec 28, 2024Dec 28, 2024
Published inITNEXTSecuring Secrets in Confidential Containers: Usage patterns to avoidHow to Ensure Your Sensitive Data Remains Protected in MemoryAug 21, 2024Aug 21, 2024
Confidential Containers Attestation ImplementationFor developer’s eyes only :-)Jul 30, 20242Jul 30, 20242
Published inITNEXTHow your confidential containers can securely retrieve secrets?Handling secrets in confidential containersJul 5, 2024Jul 5, 2024
Published inITNEXTSecuring Kubernetes Workloads: A Practical Approach to Signed and Encrypted Container ImagesPodman — one tool to rule them allFeb 19, 20244Feb 19, 20244
Published inITNEXTUsing encrypted container images in a confidential VMRun your sensitive container workload in any third-party environmentNov 20, 2023Nov 20, 2023
Published inITNEXTA Hands-on Tekton CI/CD Pipeline Troubleshooting JourneyThis blog shares my experiences debugging a Tekton CI/CD pipeline issue when working with Kata containers runtime.Nov 14, 2023Nov 14, 2023
Published inITNEXTA Hands-on Kubernetes Network Troubleshooting JourneyFrom frustration to nirvana when dealing with Kubernetes networking issues.Oct 20, 20232Oct 20, 20232