Automated security in GitOps pipelines with Weave Policy Engine
Member post originally published on the Weaveworks blog by Twain Taylor Discover the power of Weave Policy Engine for automated security in GitOps pipelines. Strengthen your Kubernetes applications’ security and compliance with policy-as-code enforcement. Learn more. Enterprises stepping…
An essential guide to achieving compliance with Kubernetes
Guest post originally published on ARMO’s blog by Oshrat Nir, Head of Product Marketing at Armo Learn about Kubernetes compliance challenges, consequences of non-compliance, and get guidance on maintaining a secure and compliant cloud environment in a dynamic…
How to security harden Kubernetes in 2022
Guest post originally published on the Elastisys blog by the Elastisys team The NSA/CISA guidelines summarized, with Elastisys hands-on advice and real-world recommendations. Kubernetes is now the most popular container orchestration platform. Practically gone are the Mesoses and Docker…
KubeVirt becomes a CNCF incubating project
The CNCF Technical Oversight Committee (TOC) has voted to accept KubeVirt as a CNCF incubating project. KubeVirt enables users to run virtual machine workloads on top of Kubernetes in a Kubernetes-native way. It allows the migration of legacy…
The future of Kubernetes – and why developers should look beyond Kubernetes in 2022
Guest post originally published on Eficode’s blog by Michael Vittrup Larsen Kubernetes is ubiquitous in container orchestration, and its popularity has yet to weaken. This does, however, not mean that evolution in the container orchestration space is at…
How to write YAML file for Kubernetes?
Guest post originally published on the ARMO blog by Ben Hirschberg, VP R&D & Co-founder Though Kubernetes has grown in popularity, it still has a steep learning curve that can make it hard to adopt the technology. Those who can’t…
Logstash, Fluentd, Fluent Bit, or Vector? How to choose the right open-source log collector
Guest post originally published on ERA Software’s blog by Stela Udovicic In this blog, we’ll discuss the most popular log collectors, including Logstash, Fluentd, Fluent Bit, and Vector. Whether you already use an open-source log collector or are…
Hardware-based Security for Service Mesh Keys
KubeCon + CloudNativeCon + Open Source Summit China Virtual sponsor guest post from Eric Adams, Cloud Software Engineer at Intel, and Sakari Poussa, Cloud Solutions Architect at Intel You clicked on this article puzzling, “Isn’t the service mesh…
Kubernetes main attack vectors tree: an explainer guide
Guest post originally published on Magalix’s blog by Andrew Zola Kubernetes is a leader in container orchestration. According to Statista, as much as 46% of respondents in a recent survey stated that they used Kubernetes for automating computer application…
Kubernetes main attack vectors tree: an explainer guide
Guest post originally published on Magalix’s blog by Andrew Zola Kubernetes is a leader in container orchestration. According to Statista, as much as 46% of respondents in a recent survey stated that they used Kubernetes for automating computer application…