About Me

Site Reliability Architect, Supply Chain Security Advocate, System Whisperer, Tech Enthusiast, Open-Source Contributor, Trail Trekker, Speaker, etc.
secure-k8s-cluster

Unlocking RHACS (Part 1): Vulnerability Management and Workload Hardening Policies

Recently, I have been working on Red Hat Advanced Cluster Security (RHACS) to identify security vulnerabilities and implementing cluster hardening rules within OpenShift clusters. Inspired by my experiences, I decided to share my insights through this blog post. Join me as we delve into the world of RHACS and explore its functionality. Introduction to RHACS Red Hat Advanced Cluster Security (RHACS) is the downstream project for the upstream Stackrox project. In other words, enhancements to the source code are initially made in Stackrox, and then they undergo testing and packaging to become part of RHACS....

March 14, 2024 路 5 min 路 Rahul Bajaj
mend-renovate

Enhancing Security: Using Renovate in Gitlab Pipelines for Automated Dependency Updates

Open Source Software (OSS) projects have been distributed in packages for decades. Using packages allows developers to focus on new feature implementation. Major software distributions, such as Fedora, Debian, etc, typically consist of thousands of packages. These packages depend on each other to perform tasks efficiently by avoiding code duplication. The inter-dependence amongst the packages creates a software supply chain. Examples of software security principles such as using software binaries that are signed by the software vendor, keeping binaries regularly updated, and constantly monitoring software behaviour are general to any software system....

December 21, 2023 路 4 min 路 Rahul Bajaj
Container Build Images

Slimming Down Containers: The Art of Minimizing Image Bloat

Need for slimming down containers OpenShift, an enterprise-ready Kubernetes platform, offers a multitude of benefits. One such advantage is the Source-to-Image (S2I) build strategy, that simplifies the process of converting source code into deployable container images. This strategy enables developers to build container images without the need to define a container file explicitly. OpenShift clones the application鈥檚 source code into a builder image that utilizes builder scripts, ultimately generating a container image deployable within the cluster....

October 28, 2023 路 4 min 路 Rahul Bajaj
Systemd

Managing Containers with Systemd

Containers are inherently ephemeral, making them more difficult to manage than traditional programmes operating on virtual or bare metal servers. Container monitoring, on the other hand, is a critical capability for applications based on current microservices architectures in order to achieve maximum performance. Containerized applications frequently necessitate monitoring. Performing health-checks is one technique to keep these containers up and running at all times. The usage of the curl command to verify if the application within the container is still up and running is one of the approaches I鈥檝e come across for doing health-checks....

July 18, 2023 路 3 min 路 Rahul Bajaj
ossna

Diving into the Open Source Ocean: A Recap of the Summit's Key Moments

From May 10th to 12th, the Vancouver Convention Center came alive with the Open Source Summit North America, a three-day event that brought together open source software enthusiasts from around the world. With a focus on exploring the newest trends and embracing opportunities in the ever-changing field of open source technology, this premier conference drew over two thousand attendees. In this blog post, we鈥檒l dive into my own presentation and its key points, share some highlights from the inspiring talks I attended, and take a closer look at the exciting conversations and new discoveries that unfolded at the Red Hat booth....

May 19, 2023 路 8 min 路 Rahul Bajaj