Blog

OpenBao: Securing the Future of Open Source Secrets Management

In today's complex technological landscape, managing secrets—API keys, passwords, certificates, and other sensitive data—has become one of the most critical challenges facing organizations. Therefore, Liquid Reply supports OpenBao, an open source identity-based secrets and encryption management to secure data management in the cloud-native era.

Zum Beitrag

How openbao works 7a85d57a37b6bb53666de485aeaf7e09 1
Tools, Kubernetes, Platform Engineering

Solving Kubernetes Multi-tenancy Challenges with vCluster

Discover how vCluster resolves Kubernetes multi-tenancy limitations for Internal Developer Platforms by creating isolated virtual clusters within host environments. This technical deep dive explores how platform teams can empower users with full administrative control over their environments while maintaining proper isolation—solving the namespace-level resource limitations that typically challenge multi-tenant architectures. Learn how vCluster enables teams to deploy cluster-scoped resources like CRDs while preserving security and governance through seamless integration with host-level security tools.

Zum Beitrag

K8s multi tenancy genai

Comprehensive Guide to Trivy and Trivy-Operator: From Scanning to Monitoring with Prometheus and Grafana

Securing Kubernetes environments goes beyond scanning container images. It involves visibility, automation, and continuous monitoring. Trivy and Trivy-Operator streamline vulnerability management by integrating scanning directly into your cluster operations. In this guide, we'll walk through how to use Trivy for image and configuration scanning, deploy Trivy-Operator for Kubernetes-native insights, and connect everything to Prometheus and Grafana for real-time visibility.

Zum Beitrag

Trivy Operator Cover Image
Kubernetes, Platform Engineering

Building an eBPF based Open-Source observability platform

In today's world maintaining Observability and understanding what is happening inside your system in near real-time is a challenging task. The complexity arises due to the distributed nature of Cloud Infrastructure and especially Microservice based Software that has multiple components that need to communicate between each other. Keeping track of this communication and the processes involved is time consuming to track on its own.
Using the extended Berkeley Packet Filter (eBPF) technology helps transform Observability itself by allowing deep, safe, and efficient instrumentation of running systems.

Zum Beitrag

E BPF Observability Cover Image

Trust Nothing, Secure Everything: How to Build Zero Trust on AWS

Legacy defences just aren't cutting it anymore. According to the 2024 IBM Cost of a Data Breach Report, the global average cost of a breach has skyrocketed to $4.88 million, marking a 10% jump over last year and the highest figure on record. Even more alarming, 1 in 3 breaches involved so-called "shadow data" information that organisations didn't even know they had. The good news? By using AI and automation in security, organisations saved an average of $2.22 million per breach.

Zum Beitrag

Zero trust

Image Scanning in Action: Securing Your Software Supply Chain

Understanding and managing vulnerabilities in modern software supply chains is more critical than ever. SBOM scanning provides transparency and helps mitigate risks effectively. In this article, we explore what SBOM scanning is, its real-world benefits, and how to integrate it into your software development lifecycle. You'll also find actionable best practices and a real-world example of its use within a microservice architecture.

Zum Beitrag

Docker Image Scanning in Software Supply Chain