Blacksmith is now SOC 2 Type 2 compliant, underscoring our commitment to top-tier security practices. Learn about our latest steps to safeguard your data, including pentests, disaster recovery plans, and JIT tokens with Firecracker VMs.
Everyone is stacking their diffs these days. Read about why there is a sudden up-tick in adoption of this workflow, and how this can actually start costing your organization a lot more...unless you implement some checks and balances.
We're excited to announce dedicated static IP addresses for Blacksmith runners!
In part 2 of our deep-dive into Docker, we focus on securing your Docker environments, and setting up basic observability for when things go wrong. Use this guide to help you setup TLS for secure communication between the Docker client and server. Learn how to surface important metrics about your Docker usage via Prometheus and Grafana!
If you're building cross-platform Docker builds, it is important you use the right hardware to do this. Read more to ensure you have an optimal build environment for your Docker builds.
Part 1 of our Docker deep dive explores the core architecture, including key components like the Docker Client, Daemon, and Registry. Uncover the processes behind image management, networking, and persistent storage. This guide lays the foundation for understanding and optimizing your Docker deployments.