Contributed Content
The Questions Every Team Asks About Docker Sandboxes
Docker Sandboxes launched in March 2026. Since then, I’ve heard the same questions at meetups, on Slack, and during Docker Captain briefings. Instead of writing another overview piece, I want to answer ...
Architecting Enterprise GitOps: Scaling Argo CD on OKE
The industry is shifting to pull-based GitOps with Argo CD to solve configuration drift across Kubernetes fleets ...
Pavan Madduri | | App-of-Apps Pattern, ApplicationSets, Argo CD, automation, Cloud Controller Manager (CCM), Configuration Drift, continuous deployment, Enterprise Cloud-Native., External Secrets Operator (ESO), GitOps, IAM Policies, Infrastructure as Code (IaC), Kubernetes Secret Management, multi-cluster orchestration, OCI Flexible Load Balancer, OCI Vault, OCIR, OIDC, OKE, Oracle Kubernetes Engine, Private VCN, Pull-based CI/CD, workload identity, Zero-Trust Architecture
Deploying Docker AI Agents on OCI and OKE
This guide details the architectural transition of AI agents from experimental scripts to "first-class production workloads" using Oracle Cloud Infrastructure (OCI) and Oracle Kubernetes Engine (OKE). It emphasizes a zero-trust, scalable approach ...
Pavan Madduri | | Agentic Architecture, AI, AI agents, containerization, Data Minimization, docker, Event-Driven Autoscaling, GitOps, infrastructure as code, kagent, KEDA, Kubernetes CRD, Kyverno, LLM Inference, MCP server, Model Context Protocol, oci, OCI Generative AI, OCI Vault, OCIR, OKE, OpenTelemetry, Oracle Kubernetes Engine, Production Workloads., Terraform, Virtual Nodes, Zero-Trust Security
Kubernetes in Production: Where Platform Decisions Break Down
Kubernetes is often described as “free,” but that assumption falls apart in production. What looks like a complete platform is only a foundation. Everything required to run real workloads reliably sits outside ...
Where DevOps Pipelines Break: Real Attack Paths in Cloud-Native CI/CD
While traditional security focuses on perimeters, modern attackers are moving upstream to the CI/CD pipeline. By compromising the build process rather than the final product, they can inject malicious code into trusted ...
Java Code Isn’t the Problem – The Container Is
Learn how integrating Docker Scout into Java CI pipelines shifts container security left, replacing manual reviews with automated gates to secure base images and dependencies ...
How Kthena Router Supports Gateway API and Inference Extension
Learn how Kthena Router leverages the Kubernetes Gateway API and Gateway API Inference Extension to provide standardized, model-aware routing for AI/ML workloads, resolving model name conflicts and enabling multi-tenant isolation ...
Why Longer Kubernetes Release Cycles Are Critical for Private Cloud Adoption
Organizations are shifting to private clouds to escape skyrocketing costs and aggressive Kubernetes update cycles. Learn how "geopatriation" and support windows drive this change ...
OWASP Has Adopted DockSec and the Cloud Security Community Is Taking Notice
With more than 13,000 downloads across more than 40 countries, DockSec has earned its place as an OWASP Incubator Project by doing something most container security tools have not managed: closing the ...
Cloud Sustainability at Scale: Why Open Source Will Define the Next Era of Green Computing
Cloud sustainability is becoming critical as AI drives energy demand. Open source tools and carbon accounting help teams measure and reduce impact ...

