Docs

Curated Kubernetes content from AKS, EKS, GKE, OpenShift, Rancher/K3s and more—auto‑aggregated daily.

  • 2026-01-27
    VMware Cloud Foundation Blog

    The CFO’s Case for On-Premises DBaaS: Repatriation and Cost Control

    Enter VMware Data Services Manager: Public Cloud Experience, Private Cloud Economics Conclusion: Cloud is an Operating Model, Not a Location Discover more from VMware Cloud Foundation (VCF) Blog Related Articles The 75% Productivity Gain: Moving to Policy-Based Database Management 5 Key Principles of Modern Applications VCF Breakroom Chats Episode 73 - Next-Gen Data Services: The DBaaS Revolution with VCF 9 For years, the “cloud first” directive assumed that modernization required exiting the data center. That binary thinking is now obsolete.

    #vmware #cloud-foundation #kubernetes
  • 2026-01-27
    Redhat Blog

    Sovereign AI architecture: Scaling distributed training with Kubeflow Trainer and Feast on Red Hat OpenShift AI

    Sovereign AI architecture: Scaling distributed training with Kubeflow Trainer and Feast on Red Hat OpenShift AI User story: The dilemma of "AI independence" 3 pillars of sovereign AI Technical sovereignty (the foundation) Data sovereignty (the asset) Technical solution The open blueprint for AI sovereignty: Red Hat AI Integrated compute: Kubeflow Trainer Sovereign data: Feast Feature Store Completing the lifecycle: Sovereign model serving Architecture Wrapping up Ready to build your own sovereign AI factory? The adaptable enterprise: Why AI readiness is disruption readiness About the author Umberto Manganiello More like this Context as architecture: A practical look at retrieval-augmented generation Red Hat Enterprise Linux now available on the AWS European Sovereign Cloud Technically Speaking | Build a production-ready AI toolbox Technically Speaking | Platform engineering for AI agents Keep exploring Browse by channel Automation Artificial intelligence Open hybrid cloud Security Edge computing Infrastructure Applications Virtualization Share As AI becomes an engine of national competitiveness, the concept of sovereign AI—the capacity to operate AI systems free from external influence—is increasingly relevant, but the path to adoption is filled with challenges. A recent survey of over 900 IT leaders and AI engineers about AI adoption exposes a significant "value gap," showing that, despite high enthusiasm (72%), only 7% of Europe, the Middle East, and Africa (EMEA) organizations are delivering results.

    #kubernetes
  • 2026-01-26
    VMware Cloud Foundation Blog

    Unlock Hyper-Density: Cosmonic Wasm on vSphere Kubernetes Service

    What is Cosmonic Control? Key Benefits Why Wasm + vSphere Kubernetes Service? Use Cases: Cosmonic Control on VMware VCF Installation: Deploying Cosmonic Control on VCF 1. Prepare your VKS cluster 2.

    #vmware #cloud-foundation #kubernetes
  • 2026-01-26
    Nirmata Blog

    Centralized Application Authorization with Kyverno and Istio

    Centralized Application Authorization with Kyverno and Istio Why is Kubernetes Authorization so Complex What are the Challenges with OPA Sidecar Authorization in Kubernetes? Why Choose Centralized Kyverno for Sidecarless Authorization? Advantages: How Does Centralized JWT Authorization with Kyverno and Istio Work? Key Technologies for Kyverno-Istio Authorization Prerequisites Environment Setup Kubernetes cluster options: Step-by-Step Instructions Step 1: Create Local Kubernetes Cluster Step 2: Deploy Keycloak Identity Provider Step 3: Install Certificate Management Step 4: Install Kyverno Authorization Server Step 5: Install Istio Service Mesh Step 7: Configure Authorization Policies Step 8: Test Authorization Step 9: Advanced Policy Patterns Step 10: Production Hardening The Future of Kubernetes Authorization is Centralized Next Steps and Resources Central Authorization for Kyverno and Istiopng Securing Kubernetes API access is complex. After a user is authenticated (verifying who they are), an application’s authorization workflow determines what specific actions and data that user is permitted to access by checking their credentials against a set of predefined access rules.

    #nirmata #kubernetes
  • 2026-01-26
    CNCF

    k0s in 2025: A year of community growth, governance, and Kubernetes innovation

    Major features and releases k0s recent and upcoming highlights k0s joining the CNCF sandbox k0s CNCF incubation application Community growth and adoption Events and community activities Looking ahead: What’s on the horizon for 2026 Deeper community collaboration Enhanced operational capabilities Transparent roadmap Gratitude and invitation k0s community Posted on January 26, 2026 by Prithvi Raj, CNCF Ambassador As we begin 2026, it’s worth reflecting on the remarkable progress we made with k0s as a project and as a community during 2025. Last year brought exciting advancements, adoption, and stronger community engagement.

    #cncf
  • 2026-01-26
    Redhat Blog

    End-to-end security for AI: Integrating AltaStata Storage with Red Hat OpenShift confidential containers

    End-to-end security for AI: Integrating AltaStata Storage with Red Hat OpenShift confidential containers The challenge: Storage in confidential computing AI-specific storage security challenges A. Training: Dataset poisoning attack B.

    #kubernetes
  • 2026-01-26
    Redhat Blog

    How DTCC uses GitOps to accelerate customer value and security

    How DTCC uses GitOps to accelerate customer value and security Facing a tight 10-month window Managing complex network policies with Red Hat Advanced Cluster Management Start your own GitOps journey Red Hat OpenShift Container Platform | Product Trial About the author Debbie Margulies More like this Northrop Grumman scales enterprise Kubernetes for AI and hybrid cloud with Red Hat OpenShift Dell Technologies modernizes the developer experience with Red Hat OpenShift Dev Spaces The Infrastructure Effect | Command Line Heroes Bad Bosses | Compiler: Tales From The Database Keep exploring Browse by channel Automation Artificial intelligence Open hybrid cloud Security Edge computing Infrastructure Applications Virtualization Share At the recent OpenShift Commons gathering in Atlanta, we had the opportunity to hear from Brian Cook, (director, Kubernetes site reliability engineer & Kubernetes security posture management), about how Depository Trust & Clearing Corporation (DTCC) is navigating a massive shift in how they operate. As the global heart of trading activities, DTCC faces intense global regulations and a critical need for velocity without compromising security.

    #kubernetes
  • 2026-01-26
    Redhat Blog

    Red Hat Enterprise Linux now available on the AWS European Sovereign Cloud

    Red Hat Enterprise Linux now available on the AWS European Sovereign Cloud What is the AWS European Sovereign Cloud? A trusted foundation for sovereign innovation Get started today About the author Ron Pacheco More like this Sovereign AI architecture: Scaling distributed training with Kubeflow Trainer and Feast on Red Hat OpenShift AI Revolutionizing learning: How Ford's Kubernetes community sparks technological innovation OS Wars_part 1 | Command Line Heroes You Can’t Automate Collaboration | Code Comments Keep exploring Browse by channel Automation Artificial intelligence Open hybrid cloud Security Edge computing Infrastructure Applications Virtualization Share European organizations in highly regulated sectors, such as finance, healthcare, and the public sector, have faced the persistent challenge of balancing rapid innovation with strict digital sovereignty. To help address these needs, Red Hat is pleased to announce support for the AWS European Sovereign Cloud, with Red Hat Enterprise Linux (RHEL) available as a foundational platform for sovereign workloads.

    #kubernetes
  • 2026-01-23
    Nirmata Blog

    What Is Policy as Code in Kubernetes?

    What Is Policy as Code in Kubernetes? Policy as Code in Kubernetes: Simple Definition Why Policy as Code Matters in Kubernetes Key challenges without Policy as Code: Policy as Code solves this by: How Policy as Code Works in Kubernetes Typical enforcement points: Common policy targets: Popular Policy as Code Tools for Kubernetes 1. Open Policy Agent (OPA) + Gatekeeper 2.

    #nirmata #kubernetes
  • 2026-01-23
    VMware Cloud Foundation Blog

    VMware Cloud on AWS: SDDC Version 1.26 Release

    Next-Generation Storage: vSAN Express Storage Architecture Bring Your Own Keys (BYOK): VMC Now Includes VM Encryption Expanded Hardware Capabilities: VM Hardware Version 21 VM Hardware Version Comparison: Version 21 vs Version 20 Operational Excellence: VMware Tools 12.5.4 What This Means for Your Organization Discover more from VMware Cloud Foundation (VCF) Blog Related Articles VCF Breakroom Chats Episode 82 – Beyond DevOps: What is Platform Engineering? Better Together: Modernizing Access Management with Symantec SiteMinder and VMware vSphere Kubernetes Service The CFO’s Case for On-Premises DBaaS: Repatriation and Cost Control Updated: 1/23/2026 The VMware Cloud on AWS SDDC version 1.26 release marks a significant milestone in VMC’s cloud infrastructure evolution, bringing together a modern storage architecture, enhanced compliance capabilities, and improved operational stability. This release focuses on what matters most to enterprise customers: maintaining secure, efficient, and reliable cloud environments while providing flexibility for modern workloads.

    #vmware #cloud-foundation #kubernetes