Shift-left security with image scanning. Trivy, policy gates, and runtime integration.
Catching vulnerabilities in images before they run in production is a security best practice. Here’s how to do it.
trivy image --exit-code 1 --severity CRITICAL,HIGH myimage:tag
Image scanning is one part of defense in depth; combine with minimal images and supply chain signing.
Get the latest tutorials, guides, and insights on AI, DevOps, Cloud, and Infrastructure delivered directly to your inbox.
Docker Image Hardening for Production. Practical guidance for reliable, scalable platform operations.
Concrete systemd unit patterns that reduced flakiness: restart policies, resource limits, and structured logs.
Explore more articles in this category
Every hook on this list caught a bug or a security issue in the last twelve months. The configs are short. The savings have been considerable.
We've been running the OTel Collector at the edge of every cluster for 18 months. The config patterns that lasted, the ones we ripped out, and a few processors that quietly saved us money.
Blue/green is easy for stateless services. We did it for our primary Postgres cluster with 3.2TB of data and ~8k connections. Here's exactly how — and what almost went wrong.