In this second article on our "how to" series on External Secrets we’re looking at the Google Cloud Secret Manager. We are going to configure External Secrets to use a Secret Manager instance as a sec...
As I consult with clients to help change the way they work, I struggle to explain that their attack on problems may not be appropriate to the situation I was hired to help with. They might be a start-...
Moldable Development is a way of programming in which we construct custom tools for every software development problem. This introduces a new feedback loop that helps you steer your software system mo...
WTF is eBPF? What’s the deal with eBPF? Why has it got our engineers so damn excited? What does it mean for security? Why are we hosting sessions on it? And where can you learn more about it?
I recently came across a fun and interesting challenge. In the latest project I joined, a team wanted to do a "lift & shift to the cloud". As a Cloud Native engineer I've seen this pattern fairly ...
Cloud Native has become synonymous with open source, partly because organisations such as the Cloud Native Computing Foundation and the Continuous Delivery Foundation offer a vendor-neutral home for m...
If the tech industry has a diversity, equity and inclusion problem, then the open source world has a catastrophe on its hands. While women make up a still shameful 20 to 23% of the tech industry, wome...
As you may already have seen, the team at Container Solutions have recently announced The birth of the external secrets community, where multiple people and organizations are joining efforts to create...
If I bumped into Zuck’s avatar at the virtual water cooler I’d quit on the spot. But the recent name change at Facebook, Microsoft’s enthusiasm, Nvidia’s Omniverse and broader industry support mean we...