Member Post
Easy Observability with Open Standards: Introducing the Pixie Plugin System
Guest post by Michelle Nguyen, Principal Software Engineer at New Relic As a way to reemphasize our commitment to open source and open standards, we are sharing an exciting development in open source observability. Pixie, a real-time debugging...
July 6, 2022 | By Michelle Nguyen
Member Post
DevOps vs. SRE vs. Platform Engineering? The gaps might be smaller than you think
Guest post originally published on the Humanitec blog by Luca Galante Platform engineering is the new cool kid on the block that everyone wants to be friends with. However, many are still confused where this new discipline comes...
July 1, 2022 | By Luca Galante
Member Post
How to secure Kubernetes Pods post-PSPs deprecation
Guest post originally published on the ARMO blog by Amir Kaushansky Kubernetes pods are the basic building blocks of Kubernetes. It’s managing one or more tightly coupled application containers allowing them to share resources and networks. Pods are hosted on...
June 30, 2022 | By Amir Kaushansky
Member Post
Comment period for interim Code of Conduct draft documentation
By the Interim CNCF Code of Conduct Committee The Interim Code of Conduct Committee has developed drafts of the following interim policies and procedures and has posted them to the CNCF website for review and comment by CNCF...
June 29, 2022
Member Post
Colocated VMs get in each other’s way
Guest post originally published on the Clockwork blog TL;DR: Cloud providers can place multiple VMs of the same cloud customer on a shared physical host – a situation that is difficult to detect with conventional means, but readily...
June 29, 2022
Member Post
Real-time dynamic authorization – an introduction to OPAL
An introduction to OPAL – an open-source administration layer for Open Policy Agent (OPA) that allows you to easily keep your authorization layer up-to-date in real-time Guest post originally published on the Permit.io blog by Daniel Bass TL;DR OPAL is an open-source administration...
June 27, 2022 | By Daniel Bass
Member Post
Efficient GRC with cybersecurity tooling
Guest post originally published on the Snapt blog by Iwan Price-Evans “Governance, risk, and compliance” (GRC) might be dirty words for many people working in application development and delivery. Strict rules and processes can be obstacles to innovation...
June 27, 2022 | By Iwan Price-Evans
Member Post
Three steps to streamlining Kubernetes multi-cluster management
Guest post originally published on the Fairwinds blog by Kendall Miller Kubernetes as a technology gives organizations the ability to run containerized applications at scale across different cloud infrastructures and distributions. What it can’t do (yet) is centrally...
June 24, 2022
End User Post
Scaling container technologies at Coinbase with Kubernetes
End user post originally published on the Coinbase blog by Clare Curtis, Coinbase Staff Software Engineer Tl;dr: Our recent evaluation of Kubernetes underscored its suitability for scaling Coinbase into the future. In the past, a migration to Kubernetes...
June 24, 2022 | By Clare Curtis
Member Post
How to run untrusted containers in Kubernetes
Guest post originally published on the SIGHUP blog by Alessandro Lo Manto The IT world is adopting container-based infrastructures more and more every day. However, the advantages, disadvantages and even the limitations are not clear to everyone. Considering...
June 23, 2022