Community Post
Announcing the Kubernetes Policy Management Paper
Community post by Jim Bugwadia The CNCF Kubernetes Security Special Interest Group (SIG) and Policy Working group (WG) have just released a new paper on Kubernetes Policy Management to help educate the community about best practices for managing...
January 28, 2022 | By Jim Bugwadia
Unveil the secret ingredients of continuous delivery at enterprise scale with Argo CD
Guest post originally published on Akuity’s blog by Yuan Tang (Akuity), Hong Wang (Akuity), and Alexander Matyushentsev (Intuit) Deep Dive into Argo CD and Best Practices for Operating at Enterprise-Scale This is a recap from our KubeCon China 2021 talk. If you are interested...
January 27, 2022 | By Yuan Tang, Hong Wang, Alexander Matyushentsev
Member Post
Secure your GitOps flows with Security-as-Code
Guest post originally published on Magalix’s blog by Andrew Zola GitOps teams are shifting security left. This is fantastic news for anyone looking for a solid and efficient plan to secure applications, infrastructure, and other processes within the...
January 26, 2022 | By Andrew Zola
Staff Post
Getting started with your CNCF membership
CNCF is adding members at an astounding rate, with 98 joining at the last KubeCon + CloudNativeCon. When members join, they are often overwhelmed by the number and variety of marketing benefits their membership offers and dont know...
January 25, 2022
End User Post
Secrets management: essential when using Kubernetes
Guest post originally published on True‘s blog by Sebastiaan Kok In Kubernetes secrets contain all kinds of sensitive information. For instance, database credentials or API keys. The term secrets management describes the centralised and secured management of these...
January 25, 2022 | By Sebastiaan Kok
Member Post
How does threat intelligence work?
Guest post originally published on Snapt’s blog by Iwan Price-Evans The software and web industries speak a lot about security and the ability to handle security threats intelligently. In a landscape where security is becoming increasingly complex in...
January 24, 2022 | By Iwan Price-Evans
End User Post
KEDA at Zapier
End User guest post by Ratnadeep Debnath, Site Reliability Engineer at Zapier At Zapier, RabbitMQ is at the heart of Zap processing. We enqueue messages to RabbitMQ for each step in a Zap. These messages get consumed by...
January 21, 2022
Member Post
How to monitor endpoints in Kubernetes using Blackbox Exporter
Guest post originally published on InfraCloud’s blog by Suramya Shah Monitoring endpoints is an important aspect of system observability for diagnosing performance and availability issues. In this article, we will cover in detail how to achieve endpoint monitoring...
January 20, 2022 | By Suramya Shah
Member Post
How to run Kubernetes without Docker
Guest post originally published on Sighup’s blog by Alessandro Lo Manto In late 2020, the Kubernetes team deprecated Docker and announced that support will be completely removed at the end of 2021. This deprecation has brought multiple changes,...
January 19, 2022 | By Alessandro Lo Manto
Staff Post
La Redoute launched retail market comeback with Kubernetes-based software delivery
La Redoute is a household name in France and, increasingly, around the world. But in 2014, the nearly 200-year-old fashion and home retailer was facing bankruptcy. To make a comeback, it needed to transform its business processes to...
January 18, 2022