
Announcing Fairwinds’ Extended Support for Kubernetes Cost Rightsizing
We are excited to announce a major expansion of Fairwinds Insights that shifts container rightsizing functionality left. That means that developers can now get accurate and actionable resource recommendations at the time of pull request. This extended support makes it far easier to eliminate wasted Kubernetes compute before it reaches ... Read More

Kubernetes Governance & the Top 5 Best Practices of K8s Deployment
The widespread adoption of containerized applications has fundamentally changed how organizations develop, deploy, and manage their software infrastructure. Kubernetes is fundamental to this change, because it makes it possible to manage containerized workloads and services at scale. One of the cornerstones of its effective operation is Kubernetes governance, the policies ... Read More

Explore K8s Cost Allocation and Right-sizing at FinOps X
FinOps X is an excellent event for those looking to discuss FinOps, improve on current practices, and explore the complex intersection of FinOps and Kubernetes. Kubernetes, with its capability for managing containerized applications and increasing dominance in the cloud-native world, and FinOps, with its role establishing financial responsibility in cloud ... Read More

SOC 2 Compliance for Kubernetes with Fairwinds Insights
As the pace of digital transformation accelerates, many organizations are adopting Kubernetes for managing their containerized workloads. While Kubernetes brings scalability and reliability, it also introduces new challenges in security and compliance. One essential standard SaaS companies, cloud services, and all organizations dealing with sensitive information must adhere to is ... Read More

How You Can Avoid Common Kubernetes Misconfigurations & Vulnerabilities
Securing workloads in Kubernetes is an important part of your cluster security overall. Your overall goal should be to ensure that your containers are running with minimal privileges (as much as possible). Configuring Kubernetes workloads for ease of use, unfortunately, can create time consuming and costly security vulnerabilities. To minimize ... Read More

How to Meet FedRAMP’s Requirements for Container Vulnerability Scanning
The federal government continues to work to increase cybersecurity efforts in the United States, including, of course, in cloud environments. Specifically focused on cloud products and services, FedRAMP (the Federal Risk and Authorization Management Program) provides a standardized approach to security assessments, authorization, and continuous monitoring. The vulnerability scanning requirements ... Read More

How You Can Scale Kubernetes Without Leaving Security and Operational Excellence Behind
Techstrong Research polled its community in 2022, asking DevOps, cloud-native cybersecurity, and digital transformation readers and viewers about their Kubernetes environments. We recently joined Mike Rothman, Chief Strategy Officer of Techstrong Group and General Manager of Techstrong Research, to talk through the results. One thing is crystal clear: the use ... Read More

What is Kubernetes Governance?
Kubernetes governance is the set of policies and procedures organizations adopt to define how Kubernetes is managed and maintained, and it is an essential part of how enterprises become production-ready at scale. Kubernetes governance includes management of Kubernetes resources, scheduling, upgrades, and role-based access control. It also includes the process ... Read More

CVE-2022-3602 and CVE-2022-3786 OpenSSL Vulnerabilities: Scanning Container Images
On November 1st, 2022, OpenSSL announced a pair of High Severity vulnerabilities in version 3.0.0-3.0.6 of OpenSSL. The vulnerability is a buffer overflow that requires a very specific set of circumstances to be exploited. In some cases there is a possibility of remote code execution. However, it is important to ... Read More

Kubernetes Cost Allocation: Updates to Fairwinds Insights
Kubernetes workload cost allocation is hard. To illustrate it, let’s just take a simplistic view of the problem. ... Read More