Blog DevOps Keep in touch
Subscribe to our newsletter
How to use Renovate to maintain your project dependencies
Keeping your dependies up to date is what will sustainbaly maintain your repositories. Learn about Renovate, a tool perfect to do so!
The challenges of on-premise Kubernetes clusters and how to solve them
Kubernetes was built for the cloud, but it is very versatile. Learn how to build an on-premise cluster with load balancing and dynamic volumes.
How to schedule your pods based on GPU in a k0s Kubernetes cluster
Tutorial to schedule pods in a Kubernetes cluster based on GPU consumption using the stack k0S, NVIDIA GPU Operator, and GPU Share.
Kubernetes webhook used by attackers
How can an attacker use malicious admission controllers to settle in your Kubernetes cluster without you being aware of it?
How better management of processes in Docker can greatly improve a container’s lifecycle
Proper handling of processes in Docker, especially the PID 1, helps containers stop quickly and cleanly. Here's why, and how!
Simplify your Terraform refactoring with tfautomv
Infrastructure as code is great, but refactoring can be painful because of how Terraform works. With tfautomv, it becomes much easier.
What is a Pentest?
Pentesting is one of the main activities of the Padok SecOps team. Find out what it is and how our methodology helps us organize our week.
Beautiful Makefile help messages with awk
Prettier Makefiles are not only nice for the eyes, but also a great use case for awk.
How to use Crossplane on Kubernetes to build your cloud infrastructure
You are familiar with Kubernetes and need cloud infrastructure for your business? Check out why Crossplane might be the tool for you!
How to encrypt data at rest with a Customer Managed Key with Terraform
Find out how to create a Customer-Managed Encryption Key (CMEK) with Terraform and use it to encrypt data at rest in some GCP services.
What is Apparmor and how to add a security layer with it in Docker?
AppArmor is a Linux kernel module for security which interfaces with Docker to confine applications that run in containers.
Securely access your system from anywhere with Hashicorp Boundary
Hashicorp Boundary: discovering, evaluating and diving into its concepts from a Site Reliability Engineer perspective.
Quick introduction to ArgoCD ApplicationSet
Have you ever realized that your ArgoCD applications' manifests all look the same? But you keep managing a ton of those? Here comes the ApplicationSet!
Why you should migrate your Single Page Application frontends from GCS to GKE and how to do it
Feedback on everything you should know before migrating a single-page application frontend from GCS to GKE and why you should do it.
Understanding data sovereignty in the cloud in the EU
Digital sovereignty can be difficult to grasp, especially when data is stored in the cloud. Here's a quick overview of what's being done.
IAP based access to GCP private bastion and APIs
How can you prevent anyone to access your non production environment, while still being able to access them yourself? Find out how to do so using GCP IAP!
The most important changes in Kubernetes 1.24 and why they matter
This article is a recap on the updates that come with the release of Kubernetes 1.24, the first release of 2022: learn about the importance of the different changes.
How to securely manage your SSH keys with KeePassXC
Learn how you can securely and easily manage all of your SSH Keys by using KeePassXC to load them into your SSH Agent!