Member Post
How to secure Kubernetes Ingress?
Guest post originally published on the ARMO blog by Ben Hirschberg, VP R&D & Co-founder, ARMO Ingress aims to simplify the way you create access to your Kubernetes services by leveraging traffic routing rules that are defined during the creation of...
July 12, 2022
Member Post
The 16-point checklist for GitOps success
Guest post originally published on the Weaveworks blog For efficient GitOps management in your organization you need a GitOps checklist. Here’s a handy 16 point checklist you and your team can use when getting started. Build better code...
July 8, 2022
Member Post
Do I need Kubernetes?
Guest post originally published on the Snapt blog by Dave Blakey Kubernetes is a popular tool for container orchestration. But why are so many companies choosing to use Kubernetes, and what benefit does it offer software development and...
July 7, 2022 | By Dave Blakey
Member Post
Easy Observability with Open Standards: Introducing the Pixie Plugin System
Guest post by Michelle Nguyen, Principal Software Engineer at New Relic As a way to reemphasize our commitment to open source and open standards, we are sharing an exciting development in open source observability. Pixie, a real-time debugging...
July 6, 2022 | By Michelle Nguyen
Member Post
DevOps vs. SRE vs. Platform Engineering? The gaps might be smaller than you think
Guest post originally published on the Humanitec blog by Luca Galante Platform engineering is the new cool kid on the block that everyone wants to be friends with. However, many are still confused where this new discipline comes...
July 1, 2022 | By Luca Galante
Member Post
How to secure Kubernetes Pods post-PSPs deprecation
Guest post originally published on the ARMO blog by Amir Kaushansky Kubernetes pods are the basic building blocks of Kubernetes. It’s managing one or more tightly coupled application containers allowing them to share resources and networks. Pods are hosted on...
June 30, 2022 | By Amir Kaushansky
Member Post
Comment period for interim Code of Conduct draft documentation
By the Interim CNCF Code of Conduct Committee The Interim Code of Conduct Committee has developed drafts of the following interim policies and procedures and has posted them to the CNCF website for review and comment by CNCF...
June 29, 2022
Member Post
Colocated VMs get in each other’s way
Guest post originally published on the Clockwork blog TL;DR: Cloud providers can place multiple VMs of the same cloud customer on a shared physical host – a situation that is difficult to detect with conventional means, but readily...
June 29, 2022
Member Post
Real-time dynamic authorization – an introduction to OPAL
An introduction to OPAL – an open-source administration layer for Open Policy Agent (OPA) that allows you to easily keep your authorization layer up-to-date in real-time Guest post originally published on the Permit.io blog by Daniel Bass TL;DR OPAL is an open-source administration...
June 27, 2022 | By Daniel Bass
Member Post
Efficient GRC with cybersecurity tooling
Guest post originally published on the Snapt blog by Iwan Price-Evans “Governance, risk, and compliance” (GRC) might be dirty words for many people working in application development and delivery. Strict rules and processes can be obstacles to innovation...
June 27, 2022 | By Iwan Price-Evans