Articles by topic programming
- Dec 21, 2021By Ben ArentHow to leverage TLS extensions to more efficiently route traffic and reduce port requirements in Teleport.
- Dec 15, 2021By Ben ArentAn overview Teleport Desktop Access providing securing access to Windows Fleets.
- Jul 12, 2021By Shuo YangWhen talking about application authorizations, we often encounter two concepts RBAC (role-based access control) and ABAC (attribute-based access control).
- Jun 30, 2021By Sakshyam ShahMySQL brands itself as the world's most popular open source database. It has a corpus of tools and tutorials to automate MySQL, SQL injection and a notorious list of past vulnerabilities; as popular as MySQL database is among developers and SQL enthusiasts, it is equally popular among hackers.
- Jun 23, 2021By Shuo YangIn this post, we briefly talk about accessing AWS resources using Cognito Identity Pool and how you use it combination with AWS STS (Security Token Service) to provide temporary credentials.
Additional articles
- Jun 16, 2021By Shuo YangIn this post, we briefly talk about leveraging the right type of AWS IAM policy mechanisms to build the responsibility separation between the “central” team and the individual “development” team.
- Jan 25, 2021By Ev KontsevoyWhat is a microservice? What is Kubernetes for? In this post, we try to explain microservices, containers and Kubernetes in 10 minutes
- Dec 3, 2020By Alexander KlizhentasExplore edge-cases in which programming language runtimes fail to provide fair resource scheduling that leads to outages.
- Oct 8, 2019By Alexander KlizhentasIn this article we explain how Teleport approaches hiring systems engineers
- Mar 13, 2019By Russell JonesHow to restrict SSH sessions to specific commands? How to have a restricted shell for some users? In this article we cover some common ways to answer these questions.
- Feb 26, 2019By Russell JonesAn overview of Teleport's SSH certificate authority pinning capability and discussion of how HTTP public key pinning (HPKP) can be used to improve SSH CA user experience.
- Feb 21, 2019By Abraham IngersollThe universe of serverless-wielding software architects and Kubernetes cluster operators has started to collide and, yet again, Google is in the driver's seat. In this article we'll wander down the CNCF's Serverless Landscape in chronological order, quickly discovering that Knative is the sweet mamba jamba of open source lambda competitors.
- Jan 29, 2019By Abraham IngersollIn this post we'll explore K8s community decision making process by looking underneath the hood of the 'kerfluffe' of Google LLC being called out by Samsung SDS engineers for skipping 'graduation criteria' while merging the new 'kustomize' subcommand into upstream 'kubectl'.
- Oct 3, 2018By Emanuele CaloGKE requires users to have Google Cloud Tools (gcloud) installed. In this post show how to use authenticate with GKE using generic kubeconfig without having to install anything.
- Jul 3, 2018By Kevin NisbetProud new Kubernetes cluster owners are often lulled into a false sense of operational confidence by its consensus database’s glorious simplicity. In this Q&A, we dig into the challenges of in-place upgrades of etcd beneath autonomous Kubernetes clusters running within air-gapped environments.
- May 24, 2018By Russell JonesThis post is the first of an ongoing series about interesting issues and bugs that the Teleport team has worked on. This post, about missing SIGINTs and SSH, should be interesting for developers who leverage signal handling in terminal-based applications written in Go.
- Apr 30, 2018By Kevin NisbetWhy using cryptographic hashes doesn't make data anonymous.
- Oct 18, 2016By Taylor WakefieldIt might be mundane and boring but keeping track of your FOSS license usage can save you from a big headache at the least opportune time.