Are you team API endpoint or API schema first? Join the debate on Thursday, April 24th. Register now

Blog

The latest posts and insights about Ambassador - our products, our ecosystem, as well as voices from across our community.

Cluster Tracking with Prometheus

Kubernetes API Gateway

Kubernetes Monitoring: Effective Cluster Tracking with Prometheus

Let's say you have a production system or cluster up and running. Your resources are limited, so you would want your pods to take up only what is required in terms of Kubernetes resources Unfortunately, a particular app in your cluster might take up a lot of resources, leading to fewer overall resources. Subsequently, other apps fail. If you had not set up monitoring, you'd have to face this issue during production, causing your app to experience downtime. We wouldn't want that. Of course, we can always be reactive and fix the issue after it has occurred, but do you know what's better? Being proactive! By setting up monitoring beforehand, you can detect when a certain pod or node is low on resources or when there's an internal error. With this information, you could set up actions such as notifications when a pod's CPU usage reaches a threshold or when a certain pod crashes. A well maintained monitoring system adds a safety basket for your production setting, creates a better developer experience for the developers on your team, and ensures end-users aren't negatively impacted. This article explains how to monitor a Kubernetes cluster effectively using Prometheus.

December 28, 2023 | 11 min read
Kubernetes Deployment Strategies

Kubernetes API Gateway

5 Essential Kubernetes Deployment Strategies for Optimal Performance

5 Essential Kubernetes Deployment Strategies for Optimal Performance Kubernetes is entirely designed for large-scale deployments, allowing engineers to orchestrate containerized applications across clusters of machines, automatically handling the management, scaling, and operations of these deployments. Deployment strategies in Kubernetes encompass the methods and practices used to update applications running in a Kubernetes environment. These strategies play a crucial role in application lifecycle management, directly influencing application availability, service continuity, and the capacity to adapt to new requirements.

December 21, 2023 | 20 min read

Kubernetes

5 Essential Kubernetes Deployment Strategies for Optimal Performance Kubernetes is entirely designed for large-scale deployments, allowing engineers to orchestrate containerized applications across clusters of machines, automatically handling the management, scaling, and operations of these deployments. Deployment strategies in Kubernetes encompass the methods and practices used to update applications running in a Kubernetes environment. These strategies play a crucial role in application lifecycle management, directly influencing application availability, service continuity, and the capacity to adapt to new requirements.

December 21, 2023 | 20 min read
multi cloud networking vendors

Kubernetes API Gateway

Efficient Multi Cloud Networking Solutions

​​In the modern cloud era, as businesses and organizations use multiple cloud resources, which entails private and public cloud services and their providers such as Amazon web services, Google cloud platforms, etc, their compute needs expand across private cloud, public cloud, colocation, and software as a service (SaaS) /platform as a service (PaaS). They also have needs for disaster recovery and contingency plans (for small or medium businesses), etc. Multi cloud networking is the answer to these needs, and it also arises as a way to deal with the connectivity challenges. It creates a secure mesh by manifesting as a multi cloud middleware that simplifies operating across multiple environments and locations. ​​By utilizing multiple cloud services and networking, businesses can enjoy a host of benefits, including increased agility, improved efficiency, and enhanced disaster recovery. ​​This article is a comprehensive study about multi cloud networking and the essential details you need to know.

December 14, 2023 | 25 min read
Kubernetes Security Tools

Kubernetes API Gateway

Kubernetes Security Tools, The Risks, and Best Practices

Kubernetes has become the dominant orchestration platform for deploying containerized applications due to its powerful capabilities for automation, scaling, and management of container workloads. However, the dynamic nature of Kubernetes environments also introduces unique security risks that require specific defensive strategies and tools. As more organizations adopt Kubernetes for mission-critical deployments, properly safeguarding the infrastructure and workloads running within it becomes crucial. Securing Kubernetes is a nuanced topic, given its modular architecture and shifting topology. Care must be taken to implement security in a way that does not inhibit the agility and velocity benefits Kubernetes offers. With the right set of tools and practices, you can strike the right balance between security and productivity within your Kubernetes infrastructure. This Kubernetes security tools article aims to explore practical methods for protecting containers and clusters without compromising the key benefits of Kubernetes test environment. Main Security Risks and Challenges

December 12, 2023 | 17 min read
API Security Testing

API Development

A Guide to API Security Testing

In January, when X was still Twitter, they disclosed that an API vulnerability had led to the leak of “235 million unique records of Twitter users, complete with their email addresses and phone numbers.” That is a lot of data about a lot of people and confirms a growing fear within tech—APIs are under threat. APIs are prime attack surfaces, presenting numerous opportunities for exploitation if not adequately secured. This incident underscores the criticality of vigilant API security practices in an era where data breaches can have far-reaching consequences. By their very nature, APIs offer gateways to sensitive information and systems functionalities, making them attractive targets for bad actors. Therefore, effective API security testing and management are not just technical requirements but fundamental aspects of risk management and data protection strategies in any technology-driven organization.

December 11, 2023 | 17 min read
1...2829
30
3132...53