Blog DevOps Keep in touch

Subscribe to our newsletter

How to use Renovate to maintain your project dependencies

How to use Renovate to maintain your project dependencies

Keeping your dependies up to date is what will sustainbaly maintain your repositories. Learn about Renovate, a tool perfect to do so!

The challenges of on-premise Kubernetes clusters and how to solve them

The challenges of on-premise Kubernetes clusters and how to solve them

Kubernetes was built for the cloud, but it is very versatile. Learn how to build an on-premise cluster with load balancing and dynamic volumes.

How to schedule your pods based on GPU in a k0s Kubernetes cluster

How to schedule your pods based on GPU in a k0s Kubernetes cluster

Tutorial to schedule pods in a Kubernetes cluster based on GPU consumption using the stack k0S, NVIDIA GPU Operator, and GPU Share.

Kubernetes webhook used by attackers

Kubernetes webhook used by attackers

How can an attacker use malicious admission controllers to settle in your Kubernetes cluster without you being aware of it?

How better management of processes in Docker can greatly improve a container’s lifecycle

How better management of processes in Docker can greatly improve a container’s lifecycle

Proper handling of processes in Docker, especially the PID 1, helps containers stop quickly and cleanly. Here's why, and how!

Simplify your Terraform refactoring with tfautomv

Simplify your Terraform refactoring with tfautomv

Infrastructure as code is great, but refactoring can be painful because of how Terraform works. With tfautomv, it becomes much easier.

What is a Pentest?

What is a Pentest?

Pentesting is one of the main activities of the Padok SecOps team. Find out what it is and how our methodology helps us organize our week.

Beautiful Makefile help messages with awk

Beautiful Makefile help messages with awk

Prettier Makefiles are not only nice for the eyes, but also a great use case for awk.

How to use Crossplane on Kubernetes to build your cloud infrastructure

How to use Crossplane on Kubernetes to build your cloud infrastructure

You are familiar with Kubernetes and need cloud infrastructure for your business? Check out why Crossplane might be the tool for you!

How to encrypt data at rest with a Customer Managed Key with Terraform

How to encrypt data at rest with a Customer Managed Key with Terraform

Find out how to create a Customer-Managed Encryption Key (CMEK) with Terraform and use it to encrypt data at rest in some GCP services.

What is Apparmor and how to add a security layer with it in Docker?

What is Apparmor and how to add a security layer with it in Docker?

AppArmor is a Linux kernel module for security which interfaces with Docker to confine applications that run in containers.

Securely access your system from anywhere with Hashicorp Boundary

Securely access your system from anywhere with Hashicorp Boundary

Hashicorp Boundary: discovering, evaluating and diving into its concepts from a Site Reliability Engineer perspective.

Quick introduction to ArgoCD ApplicationSet

Quick introduction to ArgoCD ApplicationSet

Have you ever realized that your ArgoCD applications' manifests all look the same? But you keep managing a ton of those? Here comes the ApplicationSet!

Why you should migrate your Single Page Application frontends from GCS to GKE and how to do it

Why you should migrate your Single Page Application frontends from GCS to GKE and how to do it

Feedback on everything you should know before migrating a single-page application frontend from GCS to GKE and why you should do it.

Understanding data sovereignty in the cloud in the EU

Understanding data sovereignty in the cloud in the EU

Digital sovereignty can be difficult to grasp, especially when data is stored in the cloud. Here's a quick overview of what's being done.

IAP based access to GCP private bastion and APIs

IAP based access to GCP private bastion and APIs

How can you prevent anyone to access your non production environment, while still being able to access them yourself? Find out how to do so using GCP IAP!

The most important changes in Kubernetes 1.24 and why they matter

The most important changes in Kubernetes 1.24 and why they matter

This article is a recap on the updates that come with the release of Kubernetes 1.24, the first release of 2022: learn about the importance of the different changes.

How to securely manage your SSH keys with KeePassXC

How to securely manage your SSH keys with KeePassXC

Learn how you can securely and easily manage all of your SSH Keys by using KeePassXC to load them into your SSH Agent!