// How to use Dapr, Flux, Harbor, and a shared Helm chart to safely host apps built by non-technical citizen developers using LLMs on Kubernetes.
posts tagged #Security
// MCP servers like DBHub expose databases, filesystems, and code execution over HTTP with zero authentication. Learn how to deploy OAuth2-Proxy on Kubernetes to add SSO, group-based access control, and session management to any MCP server without changing a single line of code.
// Learn how to build secure, scalable multi-tenant Kubernetes platforms using Capsule for namespace-based isolation and vCluster for virtual cluster deployment. Compare architectures, explore production use cases, and implement cost-effective multi-tenancy patterns with practical examples and complete demos.
// Explore Cilium Tetragon, an eBPF-based security observability and runtime enforcement platform that provides kernel-level protection for Kubernetes workloads with minimal overhead.
// A comprehensive guide to Istio Ambient Mesh, exploring its sidecar-less architecture, performance benefits, and practical implementation steps. Learn how zTunnel and Waypoint Proxy revolutionize service mesh deployment while reducing resource overhead.
// Discover how Kubescape enhances Kubernetes security and compliance.
// Explore how minimalist containerization with tools like Scratch and Alpine can transform application deployment, enhancing efficiency and security.
// Kubernetes Admission Controllers are gatekeepers that enforce rules on API requests, with Kyverno providing flexible policy management through validation, mutation, and generation of resources.