Blog


Co-located event deep dive: ArgoCon Europe 2024
Community Post Co-located event deep dive: ArgoCon Europe 2024
Happening on 19 March 2024 in Paris Co-chairs: Dan Garfield, Christian Hernandez, Carlos Santana ArgoCon is the best place to meet Argo maintainers and fellow end users to swap stories, strategies, and implementation details. Improve your software delivery,...
February 15, 2024

Cloud native disaster recovery for stateful workloads
Cloud native disaster recovery for stateful workloads
TAG post originally published on Github by TAG Storage NOTE: this document is available via this link: https://bit.ly/cncf-cloud-native-DR  Introduction The purpose of this document is to introduce a new way of thinking about disaster recovery in a cloud...
February 15, 2024

Building a cloud native Austria: reflecting on our 2023 KCD 🌟
KCD Post Building a cloud native Austria: reflecting on our 2023 KCD 🌟
KCD post by Daniel Drack In the dynamic realm of cloud technology, the Kubernetes Community Days (KCD) Austria 2023 stood as a beacon, showcasing the vibrant potential of cloud-native solutions. Held on September 26th and 27th at the...
February 15, 2024 | By Daniel Drack

Policy-as-Code in the software supply chain
TAG Post Policy-as-Code in the software supply chain
TAG post by members of TAG security including Marina Moore, Michael Lieberman, John Kjell, James Carnegie, and Luca Bandini Reviewers: Emily Fox, Andrés Vega, Andrew McNamara, Andrew Block, Jon Zeolla, Andrew Martin Introduction Software supply chain policy describes...
February 14, 2024 | By Marina Moore, Michael Lieberman, John Kjell, James Carnegie, and Luca Bandini

Reflecting on transformative years as a CNCF KubeCon + CloudNativeCon programming committee member
Ambassador Post Reflecting on transformative years as a CNCF KubeCon + CloudNativeCon programming committee member
Ambassador Post originally published on a personal blog by BMK Lakshminarayanan In the ever-evolving landscape of cloud-native technologies, the journey through innovation, community building, and knowledge sharing is a continuous loop of learning and growth. Over the last...
February 14, 2024

Anatomy of a CVE
Member Post Anatomy of a CVE
Member post originally published on SighUp’s blog by Simone Ragonesi and Sara Trappetti Introduction In this article, we will conduct an in-depth exploration of an impactful vulnerability affecting various container runtimes. A few days ago, the email inbox of Snyk’s partners...
February 13, 2024 | By Simone Ragonesi and Sara Trappetti

KubeCon + CloudNativeCon Europe Paris co-located event deep dive: AppDeveloperCon Europe
Community Post KubeCon + CloudNativeCon Europe Paris co-located event deep dive: AppDeveloperCon Europe
Happening 19 March 2024 in Paris Co-chairs: Mark Fussell (Diagrid) , Roland Huss (Redhat), Paul Schweigert (IBM) AppDeveloperCon is for developers and architects at all levels. Traditionally KubeCon is focused on infrastructure technologies and operations so if you’re...
February 13, 2024

Data Protection Working Group deep dive session at KubeCon + CloudNativeCon Europe in Paris 
Data Protection Working Group deep dive session at KubeCon + CloudNativeCon Europe in Paris 
Community post by Dave Smith-Uchida, Technical Leader at Kasten, by Veeam Data on Kubernetes is a growing area with databases, object stores and other stateful applications   migrating to the platform.  The Data Protection Working Group focuses on data...
February 13, 2024

Paris Co-Located event deep dive: Istio Day Europe
Staff Post Paris Co-Located event deep dive: Istio Day Europe
Co-chairs: Zack Butcher, Iris Ding Istio Day is the biannual community event for the industry’s most widely adopted and feature rich service mesh, where attendees will find lessons learned from running Istio in production, the latest updates on...
February 12, 2024

When do you need attributes in fine-grained authorization?
Member Post When do you need attributes in fine-grained authorization?
Member post originally published on Aserto’s blog by Omri Gazitt, CEO, Aserto Fine-grained authorization is the process of verifying that a subject (typically a user) has permission to perform an action on a specific resource (for example, a...
February 12, 2024 | By Omri Gazitt