Blog


Announcing Vitess 14
Project Post Announcing Vitess 14
Project cross-post by the Vitess Engineering Team We are pleased to announce the general availability of Vitess 14. Major Themes # In this new release, major improvements have been made in several areas of Vitess, including usability and reliability. Usability #...
June 28, 2022

Improving Security by Fuzzing the CNCF landscape
Community Post Improving Security by Fuzzing the CNCF landscape
By Chris Aniszczyk (CNCF), Adam Korczynski (Ada Logics), David Korczynski (Ada Logics) In this blog post we present an overview of the state of fuzzing across CNCF projects. This is based on efforts and work that CNCF has...
June 28, 2022 | By Chris Aniszczyk + Adam Korczynski + David Korczynski

Announcing the completion of Linkerd’s 2022 Security Audit
Project Post Announcing the completion of Linkerd’s 2022 Security Audit
Linkerd project cross-post by William Morgan Today we’re happy to announce the completion of Linkerd’s annual security audit, conducted by Trail of Bits and funded by the Cloud Native Computing Foundation. As part of Linkerd’s commitment to openness, transparency, and security...
June 28, 2022 | By William Morgan

Real-time dynamic authorization – an introduction to OPAL
Member Post Real-time dynamic authorization – an introduction to OPAL
An introduction to OPAL – an open-source administration layer for Open Policy Agent (OPA) that allows you to easily keep your authorization layer up-to-date in real-time Guest post originally published on the Permit.io blog by Daniel Bass TL;DR OPAL is an open-source administration...
June 27, 2022 | By Daniel Bass

Efficient GRC with cybersecurity tooling
Member Post Efficient GRC with cybersecurity tooling
Guest post originally published on the Snapt blog by Iwan Price-Evans “Governance, risk, and compliance” (GRC) might be dirty words for many people working in application development and delivery. Strict rules and processes can be obstacles to innovation...
June 27, 2022 | By Iwan Price-Evans

Scaling container technologies at Coinbase with Kubernetes
End User Post Scaling container technologies at Coinbase with Kubernetes
End user post originally published on the Coinbase blog by Clare Curtis, Coinbase Staff Software Engineer Tl;dr: Our recent evaluation of Kubernetes underscored its suitability for scaling Coinbase into the future. In the past, a migration to Kubernetes...
June 24, 2022 | By Clare Curtis

Three steps to streamlining Kubernetes multi-cluster management
Member Post Three steps to streamlining Kubernetes multi-cluster management
Guest post originally published on the Fairwinds blog by Kendall Miller Kubernetes as a technology gives organizations the ability to run containerized applications at scale across different cloud infrastructures and distributions. What it can’t do (yet) is centrally...
June 24, 2022

How to run untrusted containers in Kubernetes
Member Post How to run untrusted containers in Kubernetes
Guest post originally published on the SIGHUP blog by Alessandro Lo Manto The IT world is adopting container-based infrastructures more and more every day. However, the advantages, disadvantages and even the limitations are not clear to everyone. Considering...
June 23, 2022

Profile layering for Helm encourages self service for Kubernetes
Member Post Profile layering for Helm encourages self service for Kubernetes
Guest post originally published on the Weaveworks blog by Darryl Weaver, Solution Architect, and David Stauffer, Product Manager In this blog, we explain how to build a self-service Kubernetes platform with Helm, GitOps, and Cluster API. Profile layer...
June 23, 2022 | By Darryl Weaver + David Stauffer

CNCF’s Interim CNCF Code of Conduct Committee has launched
Staff Post CNCF’s Interim CNCF Code of Conduct Committee has launched
By the Interim CNCF Code of Conduct Committee CNCF has launched a new Interim Code of Conduct Committee (CoC Committee) consisting of community members and staff.  This interim committee will respond to CNCF Code of Conduct incidents on...
June 23, 2022