All Member Posts


How to deploy Hashicorp Vault in Kubernetes
Member Post How to deploy Hashicorp Vault in Kubernetes
Member post originally published on Devtron’s blog by Shubham Kumar TL;DR: In this article we’ll learn about how to deploy Hashicorp vault in Kubernetes and how to fetch secrets from vault and integrate it with your applications on...
March 1, 2024 | By Shubham Kumar

The Kubernetes cost features you need in 2024
Member Post The Kubernetes cost features you need in 2024
Member post originally published on Fairwinds’ blog by Andy Suderman In the rapidly evolving Kubernetes ecosystem, managing costs effectively is as critical as ensuring operational efficiency. To make the most of your shift to cloud native technologies in...
February 29, 2024 | By Andy Suderman

Cloud-spend optimization in SaaS: 7 overlooked and underused strategies
Member Post Cloud-spend optimization in SaaS: 7 overlooked and underused strategies
Member post originally published on Facets.cloud’s blog by Pravanjan Choudhury $100,000 – for FREE. That’s what you get when you sign up for the AWS startup program. Microsoft will see and raise at $150,000 and GCP will go...
February 29, 2024 | By Pravanjan Choudhury

Cloud strategies and edge computing
Member Post Cloud strategies and edge computing
Member post originally published on Coredge’s blog by Coredge Marketing Adopting cloud computing is not always a one-way path as one might think. The cloud does not have all the answers, despite the fact that it is receiving a...
February 28, 2024 | By Coredge Marketing

Flagger vs Argo rollouts vs service meshes: a guide to progressive delivery in Kubernetes
Member Post Flagger vs Argo rollouts vs service meshes: a guide to progressive delivery in Kubernetes
Member post originally published on Bouyant’s blog by Scott Rigby Progressive delivery is a vital tool for ensuring that new code is deployed safely to production with automated protections if things go wrong. But how do we accomplish...
February 27, 2024 | By Scott Rigby

Why your logging data and bills get out of hand
Member Post Why your logging data and bills get out of hand
Member post originally published on Logz.io’s blog by Dotan Horovits In the labyrinth of IT systems, logging is a fundamental beacon guiding operational stability, troubleshooting, and security. In this quest, however, organizations often find themselves inundated with a deluge of...
February 23, 2024

Monitor Cloudflare workers using Prometheus Exporter
Member Post Monitor Cloudflare workers using Prometheus Exporter
Member post originally published on Last9’s blog by Aniket Rao Here’s a detailed blog post on monitoring Cloudflare Workers using Prometheus Exporter. We discuss the data flow of how Prometheus Cloudflare Exporter fetches metrics from your Cloudflare account; then, by scraping the...
February 21, 2024 | By Aniket Rao

Securing OpenTofu with Nirmata powered by Kyverno
Member Post Securing OpenTofu with Nirmata powered by Kyverno
Member post originally published on Nirmata’s blog by Anusha Hegde As Infrastructure as Code (IaC) continues to gain popularity among DevOps practitioners for its efficiency and scalability, the recent Terraform license ambiguity has prompted the emergence of alternative...
February 21, 2024 | By Anusha Hegde

Analysis of Xline Jepsen tests
Member Post Analysis of Xline Jepsen tests
Member post by DatenLord Table of Contents Abstract In this article, we will mainly introduce the application of Jepsen in the testing of a distributed KV storage Xline. This includes an introduction to the chaos engineering framework Jepsen,...
February 19, 2024 | By DatenLord

Anatomy of a CVE
Member Post Anatomy of a CVE
Member post originally published on SighUp’s blog by Simone Ragonesi and Sara Trappetti Introduction In this article, we will conduct an in-depth exploration of an impactful vulnerability affecting various container runtimes. A few days ago, the email inbox of Snyk’s partners...
February 13, 2024 | By Simone Ragonesi and Sara Trappetti