Open in app

Sign In

Write

Sign In

Pradipta Banerjee
Pradipta Banerjee

133 Followers

Home

About

Nov 11, 2022

Confidential Computing Solution: How far have we come?

A few months back, I wrote about the building blocks of a confidential computing solution and how you can start deciphering the different pieces of the solution. You can read more about it here. Many months have passed since I wrote the above article, and I wanted to share a…

Confidential Computing

2 min read

Confidential Computing: How far have we come?
Confidential Computing: How far have we come?
Confidential Computing

2 min read


Sep 22, 2022

Understanding Remote Attestation by taking Azure example

I wrote about remote attestation in confidential computing and what we are doing for confidential containers in the following blog. In this blog, I will take you through an example attestation workflow from Azure. …

Confidential Computing

4 min read

Understanding Remote Attestation by taking Azure example
Understanding Remote Attestation by taking Azure example
Confidential Computing

4 min read


Aug 12, 2022

Understanding Attestation Process in a Confidential Computing Solution

In my previous blog, I touched up the subject of understanding a confidential computing solution. In this blog, I’ll dive deeper into the attestation process. …

Confidential Computing

4 min read

Understanding Attestation Process in a Confidential Computing Solution
Understanding Attestation Process in a Confidential Computing Solution
Confidential Computing

4 min read


Jul 14, 2022

Understanding a Confidential Computing Solution

If you are following the latest IT trends, you would have come across the mention of “confidential computing”. With the release of product offerings in this space from Intel, AMD, IBM, Microsoft, Google and many others, this promising technology is making way to real users. In this blog, we’ll look…

Confidential Computing

4 min read

Understanding a Confidential Computing Solution
Understanding a Confidential Computing Solution
Confidential Computing

4 min read


Jun 16, 2022

How about container runtimes as a potential security guardrail for your CI/CD pipelines?

When we discuss security guardrails, it’s primarily about automated policies and monitoring, among other things. But have you ever thought about container runtimes as a potential security guardrail? Every container runtime has its pros and cons. When choosing container runtimes, we typically consider the use-cases. However, we shouldn’t rule out…

Container Security

4 min read

How about container runtimes as a potential security guardrail for your CI/CD pipelines?
How about container runtimes as a potential security guardrail for your CI/CD pipelines?
Container Security

4 min read


May 26, 2022

Different ways to debug your Kubernetes apps

This article will briefly discuss what I typically use for debugging Kubernetes apps. I hope you will find it helpful. Using plain old “exec” $ kubectl exec -it -c <container> <pod-name> -- /bin/sh This approach will not work for the environments where “exec” is disabled or for container images without a shell. Let’s look…

Kubernetes

2 min read

Kubernetes

2 min read


May 21, 2022

Kcli — the only tool you will need to create Kubernetes and OpenShift cluster for test and development

I often create disposable Kubernetes and OpenShift clusters in my day-to-day development work. Mostly it’s on my bare metal server. However, sometimes I use public cloud providers as well. Creating disposable clusters improved my productivity compared to my earlier approach of cleaning up and reusing existing clusters. I have used…

Dev Ops

3 min read

Kcli — the only tool you will need to create Kubernetes and OpenShift cluster for test and…
Kcli — the only tool you will need to create Kubernetes and OpenShift cluster for test and…
Dev Ops

3 min read


Apr 28, 2022

Case Study in Security hardening of a Red Hat OpenShift Operator

Applying the principle of least privileges when developing Operators Let me start by asking you a few questions. Are you developing Operators for Kubernetes? Are you the kind of person who yearns for a safe environment to run everything as a privileged user (‘root’) during development? Is bypassing security checks…

Openshift

6 min read

Openshift

6 min read


Published in DevOps Learners

·Apr 14, 2022

Health Checkups for your OpenShift Cluster

If you are responsible for managing Red Hat OpenShift clusters, then there is a nifty opensource project (aptly named openshift-checks) that could be a good addition to your toolkit. The openshift-checks project is a collection of health-check scripts for an OpenShift cluster. Take a look at the project description and…

Openshift

3 min read

Health Checkups for your OpenShift Cluster
Health Checkups for your OpenShift Cluster
Openshift

3 min read


Published in DevOps Learners

·Mar 16, 2022

Different Container Runtimes and Configurations in the same Kubernetes Cluster

When transitioning workloads to Kubernetes, some of the following questions often cross our minds: How to satisfy conflicting workload requirements on the same Kubernetes cluster? Is it possible to lift and shift a few existing workloads to run on Kubernetes with phase-wise modernization? What kind of flexibility can be provided…

Kubernetes

3 min read

Different Container Runtimes and Configurations in the same Kubernetes Cluster
Different Container Runtimes and Configurations in the same Kubernetes Cluster
Kubernetes

3 min read

Pradipta Banerjee

Pradipta Banerjee

133 Followers

Writes about technology | Startup advisor & mentor. www.linkedin.com/in/bpradipt

Following
  • Tim Denning

    Tim Denning

  • Ayodeji Awosika

    Ayodeji Awosika

  • Niharikaa Kaur Sodhi

    Niharikaa Kaur Sodhi

  • Michael Whittle

    Michael Whittle

  • Mark Suster

    Mark Suster

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech