The AI & Cloud-Native Infrastructure Blog

Stay updated with the latest news and insights on AI and cloud-native infrastructure through Rafay's highly active blog site

  • All

Rafay Extends Support for Amazon EKS Anywhere with Turnkey Automation and Governance Capabilities

While the growth in cloud computing over the past decade is undeniable, many enterprises expect to continue running some applications in datacenters or colocation environments due to legal, security or regulatory reasons. Examples of such scenarios are listed below: Highly… Read More

Image for Paralus Applies to Become a CNCF Sandbox Project

Paralus Applies to Become a CNCF Sandbox Project

For organizations managing user access to numerous Kubernetes clusters at once, maintaining security while ensuring that users can access only the resources they need is a complex balancing act. Oftentimes, teams manage access to each cluster separately, sometimes using jump… Read More

Image for Streamline Network Security with Centralized and Automated Network Policy Management

Streamline Network Security with Centralized and Automated Network Policy Management

In a previous blog post, Securing Your Kubernetes Environments via Network Policies, we alluded to the value that network policies bring to Kubernetes environments in terms of isolation and reducing the lateral attack surface area, while also articulating some of… Read More

Image for Top 7 Reasons Why a Centralized Management Platform is Key to Overcoming Day 2 Kubernetes Challenges

Top 7 Reasons Why a Centralized Management Platform is Key to Overcoming Day 2 Kubernetes Challenges

Your organization has committed to modernize its software efforts, you’ve successfully deployed Kubernetes, and you have applications in production. Perhaps you’ve even established a platform team with the goal of implementing a shared services model and improving operational efficiency. While… Read More

Image for Goodbye PodSecurityPolicy, Hello OPA Gatekeeper

Goodbye PodSecurityPolicy, Hello OPA Gatekeeper

The recently released version of Kubernetes v1.25 removed the ‘PodSecurityPolicy (PSP)’ capability. The intent behind PodSecurityPolicy (PSP) was to control security-sensitive aspects of pod specifications by defining the requirements that Pods must meet. If the PSP requirements aren’t met, the… Read More

Image for IaC vs GitOps: What’s the Difference?

IaC vs GitOps: What’s the Difference?

A platform team can face significant challenges when it comes to operating a dynamic Kubernetes environment with multiple clusters spanning development, testing, and production. Frequent code deployments: In modern application environments, code changes frequently—often multiple times per day. Frequent infrastructure… Read More

Image for Webinar Follow-Up: Secure your Kubernetes Infrastructure with Zero Trust Principles

Webinar Follow-Up: Secure your Kubernetes Infrastructure with Zero Trust Principles

During this webinar, Ashish Kar, VP of Product Management at Aarali Networks, and Naveen Chakrapani, Director of Product Management at Rafay Systems, covered securing K8s environments with Zero Trust principles. You can access the recording of the webinar here. A… Read More

Image for What Makes Kubernetes Cost Management Difficult?

What Makes Kubernetes Cost Management Difficult?

Kubernetes as a platform allows teams to scale up applications at a rapid pace but this may come at a significant cost if done inefficiently. According to the 2021 CNCF survey, more than 68% of organizations reported an increase in… Read More

Image for Unlocking Four Requirements for Enterprise-Grade Kubernetes

Unlocking Four Requirements for Enterprise-Grade Kubernetes

For enterprises of all shapes and sizes, Kubernetes has become a go-to-choice for shipping software and improving delivery time, visibility, and control of CI/CD workflows. With more organizations enjoying the benefits of Kubernetes, it is all the more crucial to… Read More

Image for Securing Your Kubernetes Environments via Network Policies

Securing Your Kubernetes Environments via Network Policies

Today, one of the most significant benefits of Kubernetes is the ability to quickly deploy and connect applications, whether across namespaces in a cluster or across different cloud environments. By default, a pod/application running in a Kubernetes cluster has the… Read More

Image for Kubernetes Security: Top 5 Best Practices for Securing Kubernetes Clusters

Kubernetes Security: Top 5 Best Practices for Securing Kubernetes Clusters

As more and more of your business-critical applications run in Kubernetes, securing Kubernetes becomes increasingly critical. The ability to operate and secure clusters in a standardized fashion is essential in a rapidly growing Kubernetes environment. If your team has been… Read More

Image for Unified Management of Multi-OS Kubernetes Clusters

Unified Management of Multi-OS Kubernetes Clusters

One of the most common enterprise scenarios that engineers deal with today is managing multi-OS platforms or applications. This requires teams to run separate environments for each workload type based on the operating system (OS) and system architectures leading to… Read More