by Andy Wright | Apr 14, 2020 | Calico, eBPF, Networking, Open Source
eBPF is a hot topic right now; most of the infrastructure-focused conferences and events have included talks on eBPF over the past year, which is creating a lot of interest in the technology. You might be wondering what eBPF is. eBPF stands for “extended Berkeley...
by Bikram Gupta | Apr 7, 2020 | Blog, Calico, DevOps, Kubernetes, Networking, Open Source, Project Calico, Security, Technical
Calico is an open source networking and network security solution for containers, virtual machines, and native host-based workloads. Calico supports a broad range of platforms including Kubernetes, OpenShift, Docker EE, OpenStack, and bare metal. In this blog, we will...
by Amit Gupta | Mar 10, 2020 | Blog, Calico, Calico for Windows, DevOps, Kubernetes, OpenShift
Approximately one year ago, Kubernetes 1.14 made support of Windows containers running on Microsoft Windows Server nodes generally available. This was a declaration that Windows node support was stable, well-tested, and ready for adoption, meaning the vast ecosystem...
by Vaibhav Thakur | Feb 12, 2020 | Blog, Calico, Calico Enterprise, Calico Essentials, Firewall, Kubernetes
Introduction 2019 was a big year for Kubernetes adoption, and 2020 is sure to exceed that pace. Already, we have seen a large number of organizations migrating their workloads to Kubernetes (k8s) both in public and private clouds as they embrace a hybrid cloud...
by Alex Pollitt | Sep 23, 2019 | CaaS, Calico, Kubernetes, Scaling
IBM Cloud has made a massive shift to Kubernetes. From an initial plan for a hosted Kubernetes public cloud offering it has snowballed to tens of thousands of production Kubernetes clusters running across more than 60 data centers around the globe, hosting 90% of the...
by Spike Curtis | Sep 5, 2019 | Calico, Security
AquaSec’s Daniel Sagi recently authored a blog post about DNS spoofing in Kubernetes. TLDR is that if you use default networking in Kubernetes you might be vulnerable to ARP spoofing which can allow pods to spoof (impersonate) the IP addresses of other pods. Since so...