All Member Posts


Our trip to KubeCon + CloudNativeCon Valencia 2022, day by day
Member Post Our trip to KubeCon + CloudNativeCon Valencia 2022, day by day
Guest post originally published on the Mia-Platform blog by Giulio Roggero, CTO, Mia-Platform We live in an ever‑changing world where technology plays a key role in evolution. The ultimate expression of this concept is KubeCon Valencia, the flagship event...
June 14, 2022 | By Giulio Roggero

Know your cloud security acronyms: CWPP, CSPM, CIEM and CNAPP
Member Post Know your cloud security acronyms: CWPP, CSPM, CIEM and CNAPP
Guest post originally published on the Orca Security blog by Ty Murphy and Sarah Smith Acronyms help communicate lengthy phrases, but they can sometimes be confusing. This is especially true in the security industry, which has an alphabet...
June 13, 2022

Docker monitoring tutorial – How to monitor Docker with Telegraf and InfluxDB
Member Post Docker monitoring tutorial – How to monitor Docker with Telegraf and InfluxDB
Guest post published by Cameron Pavey, InfluxDB. How to Monitor Docker with Telegraf and InfluxDB Docker is an increasingly popular choice for businesses dealing with containerized applications. However, as with any new technology, Docker introduces complexities that need...
June 10, 2022 | By Cameron Pavey

A deep dive into OpenTelemetry metrics
Member Post A deep dive into OpenTelemetry metrics
Guest post originally published on Timescale’s blog by James Blackwood-Sewell Table of contents 01 OpenTelemetry Metrics 02 Measurements to Metrics 03 Instruments and Emitting Measurements 04 Views and Aggregations This is the second post of a three-part series...
June 8, 2022

How to security harden Kubernetes in 2022
Member Post How to security harden Kubernetes in 2022
Guest post originally published on the Elastisys blog by the Elastisys team The NSA/CISA guidelines summarized, with Elastisys hands-on advice and real-world recommendations. Kubernetes is now the most popular container orchestration platform. Practically gone are the Mesoses and Docker...
June 7, 2022 | By Elastisys team

How to test application security
Member Post How to test application security
Guest post originally published on the Snapt blog by Craig Risi We constantly read about leaks and security attacks that hit well-known applications. Businesses cannot take security for granted. With so much critical data in play, they must...
June 6, 2022 | By Craig Risi

5 key takeaways from Humanitec’s 2022 Kubernetes Benchmarking Study
Member Post 5 key takeaways from Humanitec’s 2022 Kubernetes Benchmarking Study
Guest post originally published on Humanitec’s blog by Aeris Stewart, Community Manager at Humanitec Here are 5 things you need to know about implementing Kubernetes, based on Humanitec’s 2022 Kubernetes Benchmarking Study. Knowing your way around a tool...
June 3, 2022 | By Aeris Stewart

Local Env as Code: Is it possible yet
Member Post Local Env as Code: Is it possible yet
Guest post by Jan Van Bruggen, Developer Relations Lead at itopia In the past decade, we’ve seen the rise, standardization and meme-ification of “as code”: Infrastructure as Code, Monitoring as Code, Policy as Code and soon perhaps Data...
June 2, 2022 | By Jan Van Bruggen

Multi-cloud architecture: pros and cons
Member Post Multi-cloud architecture: pros and cons
Guest post originally published on the SparkFabrik blog The affirmation of the public cloud in business organizations – and in particular those of a more innovative nature – has had an almost immediate effect, with a new need materializing: that...
June 1, 2022

Best practices for deploying applications to production in Kubernetes
Member Post Best practices for deploying applications to production in Kubernetes
Guest post originally published on the Elastisys blog Going live with your application and deploying it to production on Kubernetes means you are exposing it to your end users. You want this to be a successful rollout, and...
May 30, 2022