
Where are we going with the Giant Swarm API?
In the coming months we are going to take a new direction with our API. In this blogpost we share the reasoning behind this shift.

Applying Best Practice Security Controls to a Kubernetes Cluster
This is the penultimate article in a series entitled Securing Kubernetes for Cloud Native Applications, and follows our discussion about securing the …

Securing the Configuration of Kubernetes Cluster Components
In the previous article of this series Securing Kubernetes for Cloud Native Applications, we discussed what needs to be considered when securing the i …

Securing the Base Infrastructure of a Kubernetes Cluster
The first article in this series Securing Kubernetes for Cloud Native Applications, provided a discussion on why it’s difficult to secure Kubernetes, …

Why Is Securing Kubernetes so Difficult?
If you’re already familiar with Kubernetes, the question in the title will probably resonate deep within your very being. And if you’re only just gett …

Why You Should Not Neglect Your Developer’s Kubernetes Clusters
So you’ve finally succeeded in convincing your organization to use Kubernetes and you’ve even gotten first services in production. Congratulations!

How Giant Swarm Enables a New Workflow
By now we all know that Amazon AWS changed computing forever and it actually started as an internal service. The reason for the existence of AWS is pr …

Logging Best Practices for Kubernetes using Elasticsearch, Fluent Bit and Kibana
Logging is one of the most powerful tools we have as developers. It’s no accident that when things go wrong in production, one of a developer’s first …

Giant Swarm vs OpenShift
At Giant Swarm, we’ve often been asked to compare our infrastructure with that of Red Hat OpenShift. We’d like to shed some light on this subject and …