Blog


Announcing the Kubernetes Policy Management Paper
Community Post Announcing the Kubernetes Policy Management Paper
Community post by Jim Bugwadia The CNCF Kubernetes Security Special Interest Group (SIG) and Policy Working group (WG) have just released a new paper on Kubernetes Policy Management to help educate the community about best practices for managing...
January 28, 2022 | By Jim Bugwadia

Unveil the secret ingredients of continuous delivery at enterprise scale with Argo CD
Unveil the secret ingredients of continuous delivery at enterprise scale with Argo CD
Guest post originally published on Akuity’s blog by Yuan Tang (Akuity), Hong Wang (Akuity), and Alexander Matyushentsev (Intuit) Deep Dive into Argo CD and Best Practices for Operating at Enterprise-Scale This is a recap from our KubeCon China 2021 talk. If you are interested...
January 27, 2022 | By Yuan Tang, Hong Wang, Alexander Matyushentsev

Secure your GitOps flows with Security-as-Code
Member Post Secure your GitOps flows with Security-as-Code
Guest post originally published on Magalix’s blog by Andrew Zola GitOps teams are shifting security left. This is fantastic news for anyone looking for a solid and efficient plan to secure applications, infrastructure, and other processes within the...
January 26, 2022 | By Andrew Zola

Getting started with your CNCF membership
Staff Post Getting started with your CNCF membership
CNCF is adding members at an astounding rate, with 98 joining at the last KubeCon + CloudNativeCon. When members join, they are often overwhelmed by the number and variety of marketing benefits their membership offers and dont know...
January 25, 2022

Secrets management: essential when using Kubernetes
End User Post Secrets management: essential when using Kubernetes
Guest post originally published on True‘s blog by Sebastiaan Kok In Kubernetes secrets contain all kinds of sensitive information. For instance, database credentials or API keys. The term secrets management describes the centralised and secured management of these...
January 25, 2022 | By Sebastiaan Kok

How does threat intelligence work?
Member Post How does threat intelligence work?
Guest post originally published on Snapt’s blog by Iwan Price-Evans The software and web industries speak a lot about security and the ability to handle security threats intelligently. In a landscape where security is becoming increasingly complex in...
January 24, 2022 | By Iwan Price-Evans

KEDA at Zapier
End User Post KEDA at Zapier
End User guest post by Ratnadeep Debnath, Site Reliability Engineer at Zapier At Zapier, RabbitMQ is at the heart of Zap processing. We enqueue messages to RabbitMQ for each step in a Zap. These messages get consumed by...
January 21, 2022

How to monitor endpoints in Kubernetes using Blackbox Exporter
Member Post How to monitor endpoints in Kubernetes using Blackbox Exporter
Guest post originally published on InfraCloud’s blog by Suramya Shah Monitoring endpoints is an important aspect of system observability for diagnosing performance and availability issues. In this article, we will cover in detail how to achieve endpoint monitoring...
January 20, 2022 | By Suramya Shah

How to run Kubernetes without Docker
Member Post How to run Kubernetes without Docker
Guest post originally published on Sighup’s blog by Alessandro Lo Manto In late 2020, the Kubernetes team deprecated Docker and announced that support will be completely removed at the end of 2021.‌ ‌This deprecation has brought multiple changes,...
January 19, 2022 | By Alessandro Lo Manto

La Redoute launched retail market comeback with Kubernetes-based software delivery
Staff Post La Redoute launched retail market comeback with Kubernetes-based software delivery
La Redoute is a household name in France and, increasingly, around the world. But in 2014, the nearly 200-year-old fashion and home retailer was facing bankruptcy. To make a comeback, it needed to transform its business processes to...
January 18, 2022