Blog
Unlocking Secure Cloud Workloads with STACKIT Confidential Kubernetes
In an era where trust, compliance, and sovereignty are crucial for digital transformation, STACKIT Confidential Kubernetes stands out not only for its advanced security features but also for its foundation as a German cloud provider. Understanding the importance of data locality and sovereignty, STACKIT brings a unique value proposition tailored for organizations needing to comply with strict European and German regulatory frameworks.
Manage a unified LLM API Platform with LiteLLM
Identify the advantages and challenges of a multi-model provider architecture and how these challenges can be solved with an open-source software called LiteLLM. Explore the different possibilities and features of LiteLLM and how centralizing your model providers helps you to manage users, permissions, and costs. Learn how you can shorten the development time of your agentic workflows and applications while increasing their flexibility.
OpenBao: Securing the Future of Open Source Secrets Management
In today's complex technological landscape, managing secrets—API keys, passwords, certificates, and other sensitive data—has become one of the most critical challenges facing organizations. Therefore, Liquid Reply supports OpenBao, an open source identity-based secrets and encryption management to secure data management in the cloud-native era.
Solving Kubernetes Multi-tenancy Challenges with vCluster
Discover how vCluster resolves Kubernetes multi-tenancy limitations for Internal Developer Platforms by creating isolated virtual clusters within host environments. This technical deep dive explores how platform teams can empower users with full administrative control over their environments while maintaining proper isolation—solving the namespace-level resource limitations that typically challenge multi-tenant architectures. Learn how vCluster enables teams to deploy cluster-scoped resources like CRDs while preserving security and governance through seamless integration with host-level security tools.
Comprehensive Guide to Trivy and Trivy-Operator: From Scanning to Monitoring with Prometheus and Grafana
Securing Kubernetes environments goes beyond scanning container images. It involves visibility, automation, and continuous monitoring. Trivy and Trivy-Operator streamline vulnerability management by integrating scanning directly into your cluster operations. In this guide, we'll walk through how to use Trivy for image and configuration scanning, deploy Trivy-Operator for Kubernetes-native insights, and connect everything to Prometheus and Grafana for real-time visibility.
Building an eBPF based Open-Source observability platform
In today's world maintaining Observability and understanding what is happening inside your system in near real-time is a challenging task. The complexity arises due to the distributed nature of Cloud Infrastructure and especially Microservice based Software that has multiple components that need to communicate between each other. Keeping track of this communication and the processes involved is time consuming to track on its own.
Using the extended Berkeley Packet Filter (eBPF) technology helps transform Observability itself by allowing deep, safe, and efficient instrumentation of running systems.