<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=521127644762074&amp;ev=PageView&amp;noscript=1">
8 minute read
| November 14, 2023

Kubernetes Rightsizing: Save Money and Improve Performance

Kubernetes rightsizing is the process you use to ensure that your Kubernetes cluster has the right amount of resources to run your workloads efficiently. K8s rightsizing... Read More
7 minute read
| August 24, 2023

What Not to Monitor and What Not to Alert On in Kubernetes

Kubernetes, the de-facto container orchestrator, offers considerable flexibility and power. But monitoring every single thing in Kubernetes can become overwhelming quickly!... Read More
12 minute read
| May 11, 2023

How You Can Avoid Common Kubernetes Misconfigurations & Vulnerabilities

Securing workloads in Kubernetes is an important part of your cluster security overall. Your overall goal should be to ensure that your containers are running with minimal... Read More
7 minute read
| May 10, 2023

7 Building Blocks for a Successful Internal Developer Platform for Kubernetes

As organizations continue to adopt Kubernetes for container orchestration, the need for a robust internal developer platform has become increasingly important. According to ... Read More
19 minute read
| March 1, 2023

A Guide to Understanding your Kubernetes Liveness Probes Best Practices

Kubernetes, initially released in 2014, is an open source container orchestration system released under Apache License 2.0 and written in the programming language Go. Google... Read More
10 minute read
| November 2, 2022

Why Aren't You Following These 5 Kubernetes Best Practices?

As containers have taken hold as the standard method of developing and deploying cloud-native applications, many organizations are adopting Kubernetes as the solution they... Read More
7 minute read
| September 28, 2022

Kubernetes Best Practice: How to (Correctly) Set Resource Requests and Limits

One of my biggest pet peeves when managing Kubernetes is when there are workloads with no resource requests and limits. I was so frustrated by this that I created Goldilocks,... Read More
7 minute read
| April 29, 2022

NSA Hardening Guide: Three Ways Fairwinds Insights Can Root Out Poor Pod Security

The NSA has released a stringent set of guidelines for hardening your Kubernetes clusters. The 66-page document outlines a strong defense-in-depth approach to minimize the... Read More
4 minute read
| April 19, 2022

Don’t Forget to Check Kubernetes Pod SecurityContext for readOnlyRootFilesystem

Running secure workloads in Kubernetes can be challenging. Kubernetes enables engineers to configure the security features of containers using the securityContext field.... Read More
4 minute read
| April 11, 2022

Kubernetes DevOps Tip #5: Why Setting imagePullPolicy to Always is More Necessary Than You Think

This blog will discuss the need for better practices around the Pull Policy of a Kubernetes container, which is set using the imagePullPolicy field in a pod specification.... Read More
3 minute read
| January 15, 2022

Kubernetes DevOps Tip #7: Cost of Repair in Development vs. Production

One of the main benefits about Kubernetes is the platform’s ability to increase the speed of development. By using microservices and containers, development happens faster.... Read More
7 minute read
| September 23, 2021

How the Fairwinds Team Worked Together to Receive SOC 2 Certification

Service Organization Control, more commonly known as SOC, comes in two flavors: SOC 1 and SOC 2 reports. SOC 1 reports are for businesses that handle financial information... Read More