Docs
Curated Kubernetes content from AKS, EKS, GKE, OpenShift, Rancher/K3s and more—auto‑aggregated daily.
- 2025-09-04Kubernetes Blog
PSI Metrics for Kubernetes Graduates to Beta
PSI Metrics for Kubernetes Graduates to Beta What is Pressure Stall Information (PSI)? PSI metrics in Kubernetes How to enable PSI metrics What's next? As Kubernetes clusters grow in size and complexity, understanding the health and performance of individual nodes becomes increasingly critical. We are excited to announce that as of Kubernetes v1.34, Pressure Stall Information (PSI) Metrics has graduated to Beta.
#kubernetes - 2025-09-04AWS Containers Blog (EKS)
How to run AI model inference with GPUs on Amazon EKS Auto Mode
How to run AI model inference with GPUs on Amazon EKS Auto Mode Key features that make EKS Auto Mode ideal for AI/ML workloads Walkthrough Prerequisites Set up environment variables Set up EKS Auto Mode cluster and run a model Reducing model cold start time in AI inference workloads Conclusion About the authors AI model inference using GPUs is becoming a core part of modern applications, powering real-time recommendations, intelligent assistants, content generation, and other latency-sensitive AI features. Kubernetes has become the orchestrator of choice for running inference workloads, and organizations want to use its capabilities while still maintaining a strong focus on rapid innovation and time-to-market.
#eks #aws - 2025-09-04CNCF
The Debug Trap: Why Smart Engineers Waste Hours on Trivial Problems
The Question Nobody Asks The Change Principle (It’s Not Rocket Science) The Revert Rebellion The Exotic Bug Fallacy The Debug Stack The Meta Problem Posted on September 4, 2025 by Anshul Sao, Co-Founder & CTO at Facets. cloud Last month, I watched three senior engineers burn four hours debugging a “mysterious” Kubernetes issue that turned out to be a kubectl version upgrade.
#cncf - 2025-09-03AWS Containers Blog (EKS)
Dynamic Kubernetes request right sizing with Kubecost
Dynamic Kubernetes request right sizing with Kubecost What are container requests? Kubecost savings insights Customizing recommendations Acting on Kubecost recommendations One-time resizing Scheduled right sizing Automating resizing with Helm Conclusion About the authors This post was co-written with Kai Wombacher, Founding Product Manager at Kubecost. In this post we show you how to use the Kubecost Amazon Elastic Kubernetes Service (Amazon EKS) add-on to lower infrastructure costs and boost Kubernetes efficiency.
#eks #aws - 2025-09-03Kubernetes Blog
Kubernetes v1.34: Service Account Token Integration for Image Pulls Graduates to Beta
Kubernetes v1.34: Service Account Token Integration for Image Pulls Graduates to Beta What's new in beta? Required cacheType field Isolated image pull credentials How it works Configuration Image pull flow Audience restriction Getting started with beta Prerequisites Migration from alpha Example setup What's next? Call to action How to get involved The Kubernetes community continues to advance security best practices by reducing reliance on long-lived credentials. Following the successful alpha release in Kubernetes v1.33 , Service Account Token Integration for Kubelet Credential Providers has now graduated to beta in Kubernetes v1.34, bringing us closer to eliminating long-lived image pull secrets from Kubernetes clusters.
#kubernetes - 2025-09-03CNCF
Securing the Node: A Primer on Cilium’s Host Firewall
The Node as a Blind Spot How Cilium’s Host Firewall Works Enabling Host Firewall Audit Mode Observe Network Traffic with Hubble Writing Host Network Policies Enforcing the Policy Best Practices and Troubleshooting Tips Conclusion Additional Resources: Posted on September 3, 2025 by Paul Arah, Isovalent @ Cisco When discussing Kubernetes network security, much of the attention focuses on pod-to-pod traffic, ingress controllers, and service meshes. But what about the underlying nodes themselves, the very foundation on which our workloads run? The attack surface that Kubernetes nodes expose is vast and, if left unprotected, can become a golden ticket for malicious actors.
#cncf - 2025-09-03Digital Ocean
Sharks of DigitalOcean: Archana Kamath, Senior Director, IaaS
Sharks of DigitalOcean: Archana Kamath, Senior Director, IaaS What makes DigitalOcean the right place for you? What excites you most about DOâs mission and technology? How would you describe the way innovation happens at DO? How does your team help power DOâs mission? What does customer-centricity mean at DO? How has DO grown while staying true to its values? Dive into the future with DigitalOcean About the author Try DigitalOcean for free Related Articles Sharks of DigitalOcean: Darian Wilkin, Senior Manager, Solutions Engineering Sharks of DigitalOcean: Laura Schaffer, VP, Growth Sharks of DigitalOcean: Ali Munir, Staff Technical Account Manager By Sujatha R Technical Writer Published: September 3, 2025 3 min read Archana Kamath, Senior Director of Compute and Network (IaaS), leads our compute and networking teams at DigitalOcean. Throughout her six-plus years with the company, she and her team have been a driving force behind key product milestones like expanding GPU offerings with AMD MI300X accelerators , accelerating backup and snapshot performance , and scaling compute offerings.
#kubernetes - 2025-09-03Redhat Blog
Learn about confidential clusters
Learn about confidential clusters Running Red Hat OpenShift clusters on confidential nodes How to set up OpenShift confidential clusters on Microsoft Azure How to install OpenShift with confidential nodes on Google Cloud Try confidential clusters Red Hat Product Security About the authors Nitesh Narayan Lal Meirav Dean More like this Blog post Blog post Blog post Keep exploring Browse by channel Automation Artificial intelligence Open hybrid cloud Security Edge computing Infrastructure Applications Virtualization Share The Confidential Clusters project integrates confidential computing technology into Kubernetes clusters. It's an end-to-end solution that provides data confidentiality on cloud platforms by isolating a cluster from its underlying infrastructure.
#kubernetes - 2025-09-03Redhat Blog
Security beyond the model: Introducing AI system cards
Security beyond the model: Introducing AI system cards What are AI model cards? Introducing AI system cards Looking forward Learn more Get started with AI Inference About the author Huzaifa Sidhpurwala More like this Blog post Blog post Blog post Keep exploring Browse by channel Automation Artificial intelligence Open hybrid cloud Security Edge computing Infrastructure Applications Virtualization Share AI is one of the most significant innovations to emerge in the last 5 years. Generative AI (gen AI) models are now smaller, faster, and cheaper to run.
#kubernetes - 2025-09-03Redhat Blog
Understanding AI agent types: A guide to categorizing complexity
Understanding AI agent types: A guide to categorizing complexity 1. Functional agents: Prioritizing essential functionality 2.
#kubernetes