Sign in

Written By: Kendall Miller

Rightsizing and Optimizing

Written By: Andy Suderman

Goldilocks and Setting Resource Configurations

Written By: Dakoda Wogan

Fairwinds Insights 5.4.0 Release

Fixed Action Items Bug

Written By: Bill Ledingham

Written By: Andrew Suderman

Why Set Resource Configurations?

Written By: Rachel Sweeney

  1. Scan containers and Pods for vulnerabilities or misconfigurations.
  2. Run containers and Pods with the least privileges possible.
  3. Use network separation to control the amount of damage a compromise can cause.
  4. Use firewalls to limit unneeded network connectivity and encryption to protect confidentiality.
  5. Use strong authentication and authorization to limit user and…

Written By: Robert Brennan

  • For security issues, including over permissioned containers and Common Vulnerabilities and Exposures (CVEs)
  • For efficiency issues, such as not setting CPU limits or requesting excessive amounts of memory
  • For reliability issues, for example, not setting liveness and readiness probes

Written By: Danielle Cook

1) Are there any good tools for estimating or measuring reasonable resource limits in Kubernetes?

Written By: Danielle Cook

  1. Phase one of the maturity…

Written By: Dakoda Wogan

Fairwinds Insights 5.0.0 Release

SAML Capabilities — Beta


Fairwinds — The Kubernetes Enablement Company | Editor of uptime 99

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store