Using GoReleaser with GitLab: Multi-Arch Builds, Cosign, and SBOM Generation

gitlab containers
2025-01-26
By Thomas Kooi
In modern software development, multi-architecture support is becoming a standard requirement. Whether you’re targeting ARM64 environments, like Apple’s M1/M2 chips, or traditional AMD64 infrastructure, automating multi-architecture builds ensures consistent deployment across different platforms. At ContainerInfra, we use GoReleaser and GitLab CI to automate the creation of Docker images and binaries for both AMD64 and ARM64. This setup supports macOS and Linux systems, allowing our developers to work across multiple environments without the need for manual configuration or additional tools.

Latest Posts

Using GoReleaser with GitLab: Multi-Arch Builds, Cosign, and SBOM Generation

In modern software development, multi-architecture support is becoming a standard requirement. Whether you’re targeting ARM64 environments, like Apple’s M1/M2 chips, or traditional AMD64 infrastructure, automating multi-architecture builds ensures consistent deployment across different platforms. At ContainerInfra, we use GoReleaser and GitLab CI to automate the creation of Docker images and binaries for both AMD64 and ARM64. This setup supports macOS and Linux systems, allowing our developers to work across multiple environments without the need for manual configuration or additional tools.

The thousand piece puzzle: Supply Chain Security for Kubernetes Clusters

In de huidige digitale wereld is supply chain-beveiliging belangrijker dan ooit. Incidenten zoals de SolarWinds-aanval hebben laten zien hoe één kwetsbaarheid de hele softwareontwikkelingsketen kan beïnvloeden—van codecommits tot de productieomgeving. Dit soort aanvallen kunnen grote gevolgen hebben, niet alleen voor de getroffen organisaties, maar ook voor hun klanten en partners. Dit benadrukt hoe belangrijk het is om elke schakel in de keten proactief en grondig te beveiligen om risico’s te beperken en vertrouwen te behouden.

Using ModSecurity to protect your endpoints in Kubernetes

What is ModSecurity? ModSecurity is an open-source, cross-platform web application firewall (WAF) engine that provides a robust security layer for your web applications. Initially developed for Apache, ModSecurity now supports IIS and Nginx, offering flexible and powerful protection against various web-based attacks. It acts as an intrusion detection and prevention engine, analyzing HTTP traffic and blocking malicious requests before they reach your application. Originally developed and sponsored by Trustwave, it has been transfered to the OWASP foundation earlier this year.

The Impact of Misconfigured Kubernetes Clusters on Business Continuity

Kubernetes has quickly become the industry standard for managing applications in the cloud. What was once seen as a complex technology is now part of the basics for companies looking to grow and scale their digital operations. These days, setting up a Kubernetes cluster is fairly straightforward, and many teams can get up and running in no time. However, just because it’s easy to set up doesn’t mean it’s always done right.

Automating DNS Management in Kubernetes with External-DNS and Cloudflare

Automating DNS Management with External-DNS, FluxCD, and Cloudflare Managing DNS records can invole a lot of manual work. If you’ve ever had to manually copy and paste IP addresses to create DNS records, or tried to rely on wildcard entries that point to a single load balancer IP or CNAME, you know the pain. It often goes something like this: you run kubectl to grab the load balancer IP, then hop over to your Terraform DNS repo, make the necessary changes, create a Merge Request, wait for the review, and only after all that, you finally get the DNS record updated.

Whitepaper: Implementing the 2+1 Backup Strategy for Kubernetes Environments

Vandaag kunnen wij je onze nieuwste Whitepaper: Implementeren van de 2+1 Back-up Strategie voor Kubernetes Omgevingen presenteren! In deze whitepaper bespreken we hoe je open-source tools kunt gebruiken om een 2+1 back-up strategie te implementeren, waardoor je meerdere lagen van redundantie creëert, het risico op volledig dataverlies aanzienlijk vermindert en bedrijfscontinuïteit waarborgt.

The Hidden Risks of Docker images: Unmaintained Software Components

As an early adopter of Docker, I’ve witnessed its amazing growth from the early days. I started with using Docker Swarm, and in 2018, I even wrote several blog posts on using Docker Swarm and how to use logspout to collect logs from Docker Swarm containers. In those posts, I explained how to deploy a global container on every node in a Swarm mode cluster to forward logs to a remote Logstash endpoint.