Member post originally published on Tetrate’s blog by Cristofer TenEyck and Jimmy Song Introduction In the evolving landscape of cloud-native applications, securing service meshes across multiple clusters is crucial for ensuring both security and compliance. Istio,…
“A well-secured project”: Cilium security audits 2022 published
Project post by Liz Rice, Isovalent, for the Cilium project One of the benefits for CNCF projects is the funding of third-party security audits and testing. These help projects identify potential vulnerabilities in their code and…
A cloud-like on-prem load balancer for Kubernetes?
Guest post originally published on Netris’s blog by Alex Saroyan Everyone knows that using a Kubernetes Load Balancer is a challenge. Back in the day when I was responsible for network operations, the load balancer management…
Why and how of Kubernetes Ingress (and networking)
Guest post originally published on Saaras’s blog by the Saaras team Services running in Kubernetes are not accessible on public or private cloud. This is how Kubernetes is designed considering service security in mind. Securely allowing…
Quick application deployments on MicroK8s using Helm Charts
Guest post by Ranjan Parthasarathy, Co-Founder, LOGIQ Helm is a Kubernetes package manager that helps you find, share, and use software built for Kubernetes. With Helm Charts, you can bundle Kubernetes deployments into a single package…
Leaving the Swarm: The Road to Kubernetes
Guest post by Kevin Crawley, Developer Advocate for Containous In order to tell this story, we have to go back a little over three years ago, when I was asked to join Single as an investor,…