PinnedTransitioning back to an individual contributor roleAs they say- Change is the only constant in life.Mar 14, 20221Mar 14, 20221
Published inITNEXTSecuring Secrets in Confidential Containers: Usage patterns to avoidHow to Ensure Your Sensitive Data Remains Protected in MemoryAug 21Aug 21
Published inITNEXTHow your confidential containers can securely retrieve secrets?Handling secrets in confidential containersJul 5Jul 5
Published inITNEXTSecuring Kubernetes Workloads: A Practical Approach to Signed and Encrypted Container ImagesPodman — one tool to rule them allFeb 194Feb 194
Published inITNEXTUsing encrypted container images in a confidential VMRun your sensitive container workload in any third-party environmentNov 20, 2023Nov 20, 2023
Published inITNEXTA Hands-on Tekton CI/CD Pipeline Troubleshooting JourneyThis blog shares my experiences debugging a Tekton CI/CD pipeline issue when working with Kata containers runtime.Nov 14, 2023Nov 14, 2023
Published inITNEXTA Hands-on Kubernetes Network Troubleshooting JourneyFrom frustration to nirvana when dealing with Kubernetes networking issues.Oct 20, 20232Oct 20, 20232