open cloud infrastructure covers the cloud native industry space from the perspective of a newbie. Every two weeks, we take the mystery out of cloud-native and build the things that make up modern, secure infrastructure. In every episode, we take a concept or a part of production infrastructure and implement it using cloud native technology. From dedicated servers, virtual machines and containers to server-less, from cats to cattle.
Join us and hear from the teams and individuals that create the systems and products that build secure cloud native businesses that grow and become more efficient.
All content for open cloud infrastructure is the property of Sascha Siekmann and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
open cloud infrastructure covers the cloud native industry space from the perspective of a newbie. Every two weeks, we take the mystery out of cloud-native and build the things that make up modern, secure infrastructure. In every episode, we take a concept or a part of production infrastructure and implement it using cloud native technology. From dedicated servers, virtual machines and containers to server-less, from cats to cattle.
Join us and hear from the teams and individuals that create the systems and products that build secure cloud native businesses that grow and become more efficient.
Episode 14 – K8 misconfiguration exposes Fortune 500s’ data, The Reluctant Sysadmin’s Guide to Securing a Linux Server, John maddog Hall’s take on RHELs license changes
open cloud infrastructure
10 minutes 55 seconds
2 years ago
Episode 14 – K8 misconfiguration exposes Fortune 500s’ data, The Reluctant Sysadmin’s Guide to Securing a Linux Server, John maddog Hall’s take on RHELs license changes
Professionally, I work in the security space, and because of that, I’m always interested in hearing about security issues, risks, attacks, or anything really going on in that space. So right now my Infosec exchange feed is full of people traveling to Vegas, of course and a lot of activities directed towards finding and reporting on security issues. One of the most forward companies in the K8 security space is Aqua Security.
The Reluctant Sysadmin’s Guide to Securing a Linux Server
Since we’re talking about security already, why not cover the basics in case you’re someone using a Linux server or workstation somewhere in your network. I am a huge fan of revisiting basics over and over again, just to make sure everyone is getting the same message, consistently and frequently. It deepens and freshens knowledge of any topic. Some call it wax on, wax off or sharpening the saw.I recently came across The Reluctant Sysadmin’s Guide to Securing a Linux Server and I think it has some great information and is very useful.
John maddog Hall’s take on RHELs license changes
Lots and lots has been written about Red Hat’s changes in releasing source code for RHEL and I talked about it in the last show or two. As with everything, people are calming down after a frenzy of discussion and disagreements and the waters are calming a little bit. The distros competing with RHEL have made their business decisions and are moving on with their lives.
open cloud infrastructure covers the cloud native industry space from the perspective of a newbie. Every two weeks, we take the mystery out of cloud-native and build the things that make up modern, secure infrastructure. In every episode, we take a concept or a part of production infrastructure and implement it using cloud native technology. From dedicated servers, virtual machines and containers to server-less, from cats to cattle.
Join us and hear from the teams and individuals that create the systems and products that build secure cloud native businesses that grow and become more efficient.