All Member Posts


How to think about securing Kubernetes with WAF and DoS protection
Member Post How to think about securing Kubernetes with WAF and DoS protection
Guest post originally published by Jenn Gile of NGINX To best protect cloud-native apps, you need to deploy flexible, Kubernetes‑friendly WAF and DoS protections at the right places in your infrastructure.  For any team deploying applications, web application...
September 22, 2022

10 ways to make your software pipeline more observable
Member Post 10 ways to make your software pipeline more observable
Guest post originally published on the Cloudsmith blog by Ciara Carey Ciara lists 10 ways to make your software pipelines more transparent and observable to gain insights, identify unusual behavior and possibly prevent a software supply chain attack....
September 21, 2022

New research says cert-manager is vital for production environments that are scaling
Member Post New research says cert-manager is vital for production environments that are scaling
Guest post from Richard Collins, Jetstack In recent months the cert-manager user community has been surveyed to understand how this CNCF Sandbox project is being used in production environments. As a highly popular developer-centric tool used primarily to...
September 20, 2022 | By Richard Collins

An open source policy engine that automates remediation: Polaris 
Member Post An open source policy engine that automates remediation: Polaris 
Guest post by Robert Brennan, VP of product development, Fairwinds Polaris is an open source policy engine that runs dozens of checks to ensure that your Kubernetes pods and controllers are configured using best practices in cluster security,...
September 16, 2022 | By Robert Brennan

10 critical Kubernetes tools and how to debug them
Member Post 10 critical Kubernetes tools and how to debug them
Guest post originally published on the Rookout blog by Gedalyah Reback, Senior Product Marketing Manager at Rookout Kubernetes is both revolutionary and “diffusionary.” It is a complete restructuring demanding a whole new slew of companion and support tools...
September 15, 2022

Protect the pipe! Secure CI/CD pipelines with a policy-based approach using Tekton and Kyverno
Member Post Protect the pipe! Secure CI/CD pipelines with a policy-based approach using Tekton and Kyverno
Guest post originally published on the Nirmata blog by Jim Bugwadia of Nirmata and Shripad Nadgowda a Cloud Architect at Intel Rise of software supply chain attacks In the last few years there has been a sharp rise...
September 14, 2022 | By Jim Bugwadia + Shripad Nadgowda

Application performance monitoring vs. application performance observability
Member Post Application performance monitoring vs. application performance observability
Guest post originally published on the Scout APM blog by Dave Anderson, CTO, Scout APM  You’ve likely heard the term Observability lately. There’s a fundamental change taking place in the Monitoring space, and Observability is behind it. Observability itself is...
September 13, 2022 | By Dave Anderson

An introduction to OpenTelemetry and observability
Member Post An introduction to OpenTelemetry and observability
Guest post originally published on the InfluxData blog by Charles Mahler Cloud native and microservice architectures bring many advantages in terms of performance, scalability, and reliability, but one thing they can also bring is complexity. Having requests move between...
September 12, 2022 | By Charles Mahler

Securing Kubernetes cluster using Kubescape and kube-bench
Member Post Securing Kubernetes cluster using Kubescape and kube-bench
Guest post originally published on InfraCloud’s blog by Amar Chand With businesses adopting cloud native technology, Kubernetes has emerged as a primary tool of choice for container orchestration. Deploying and managing applications has never been easier. However, securing...
September 9, 2022 | By Amar Chand

4 challenges retailers face when adopting Kubernetes at the edge
Member Post 4 challenges retailers face when adopting Kubernetes at the edge
Guest post originally published on the Weaveworks blog by Jeff Krupinski, Weaveworks Senior Director of Sales Have you ever thought about how retailers or restaurant chains have adopted cloud-native technology with edge presence at their brick and mortar stores? You...
September 8, 2022 | By Jeff Krupinski