All Member Posts


How to test application security
Member Post How to test application security
Guest post originally published on the Snapt blog by Craig Risi We constantly read about leaks and security attacks that hit well-known applications. Businesses cannot take security for granted. With so much critical data in play, they must...
June 6, 2022 | By Craig Risi

5 key takeaways from Humanitec’s 2022 Kubernetes Benchmarking Study
Member Post 5 key takeaways from Humanitec’s 2022 Kubernetes Benchmarking Study
Guest post originally published on Humanitec’s blog by Aeris Stewart, Community Manager at Humanitec Here are 5 things you need to know about implementing Kubernetes, based on Humanitec’s 2022 Kubernetes Benchmarking Study. Knowing your way around a tool...
June 3, 2022 | By Aeris Stewart

Local Env as Code: Is it possible yet
Member Post Local Env as Code: Is it possible yet
Guest post by Jan Van Bruggen, Developer Relations Lead at itopia In the past decade, we’ve seen the rise, standardization and meme-ification of “as code”: Infrastructure as Code, Monitoring as Code, Policy as Code and soon perhaps Data...
June 2, 2022 | By Jan Van Bruggen

Multi-cloud architecture: pros and cons
Member Post Multi-cloud architecture: pros and cons
Guest post originally published on the SparkFabrik blog The affirmation of the public cloud in business organizations – and in particular those of a more innovative nature – has had an almost immediate effect, with a new need materializing: that...
June 1, 2022

Best practices for deploying applications to production in Kubernetes
Member Post Best practices for deploying applications to production in Kubernetes
Guest post originally published on the Elastisys blog Going live with your application and deploying it to production on Kubernetes means you are exposing it to your end users. You want this to be a successful rollout, and...
May 30, 2022

SSH bastions break your zero trust model
Member Post SSH bastions break your zero trust model
Guest post originally published on the Appaegis blog by Michael Shieh It’s a common practice to set up a bastion server to provide access to the host and then use that as the gateway for SSH connectivity. The...
May 27, 2022 | By Michael Shieh

Designing secure applications
Member Post Designing secure applications
Guest post originally published on the Snapt blog by Iwan Price-Evans Hackers, malware, cybercriminals, and more threaten modern applications constantly. Malicious actors will try to uncover and exploit any vulnerabilities to steal private data, disrupt your service, and...
May 26, 2022 | By Iwan Price-Evans

The components of OpenTelemetry
Member Post The components of OpenTelemetry
Guest post originally published on the Scout APM blog by Dave Anderson, CTO, Scout APM Before we dive into the Collector, let’s cover the components that make up the OpenTelemetry project. Scout’s blog post “What is OpenTelemetry” gives...
May 25, 2022 | By Dave Anderson

What is high cardinality?
Member Post What is high cardinality?
Guest post originally published on Chronosphere’s blog by Rob Skillington  With the transition from monolith to cloud-native environments, we are seeing an ongoing explosion of metrics data in terms of both volume and cardinality. This is because microservices...
May 23, 2022 | By Rob Skillington 

Comparing Frameworks for Node.js Serverless Apps
Member Post Comparing Frameworks for Node.js Serverless Apps
Guest post originally published on the Rookout blog by Gedalyah Reback Cloud deployments have gotten more complicated over the years. That’s on them, but it’s not necessarily to a fault – there’s just so much more you can...
May 23, 2022 | By Gedalyah Reback