All Member Posts


Application consistency in Kubernetes
Member Post Application consistency in Kubernetes
Guest post by Zerto Gone are the days that a backup of a virtual machine is enough for backing up an entire application. Applications, especially modern, cloud-native applications, span across virtual machines, containers and cloud services. Backing up...
August 9, 2021

What is OpenTelemetry and why is it the future of instrumentation?
Member Post What is OpenTelemetry and why is it the future of instrumentation?
Guest post originally published on New Relic’s blog by Lavanya Chockalingam of New Relic This blog is the first part in the Understand OpenTelemetry series. Part 1 begins with an overview of what OpenTelemetry is and why this open standard is the future of...
August 6, 2021 | By Lavanya Chockalingam

Why Kubernetes was inevitable
Member Post Why Kubernetes was inevitable
Guest post originally published on Elastisys’ blog by Lars Larsson Do you feel that Kubernetes is too complicated? That it’s going to be a waste of time to learn it? I know from experience that you are not...
August 2, 2021 | By Lars Larsson

How data meets software development and debugging
Member Post How data meets software development and debugging
Guest post originally published on the Rookout Blog by Elad Uzan, Rookout There’s no doubt about it: data is the new gold. The last decade has created a revolution in everything related to data, whether it’s the creation...
July 30, 2021

Implementing traffic policies in Kubernetes
Member Post Implementing traffic policies in Kubernetes
Guest post originally published on the Kong blog by Cody De Arkland, Kong When setting up Kubernetes for the first time, one of the networking challenges you might face is how to safely grant outside clients access to...
July 29, 2021

Enforcing image trust on Docker containers using Notary
Member Post Enforcing image trust on Docker containers using Notary
Guest post originally posted on the Infracloud blog by Frederick Fernando Why worry about software supply chain security? In the past few years, we have seen attacks such as NotPetya and Sunburst, which has shifted the industry’s focus to secure their...
July 28, 2021

Advanced Kubernetes pod to node scheduling
Member Post Advanced Kubernetes pod to node scheduling
Guest post by Ben Hirschberg, VP R&D & Co-founder, ARMO In Kubernetes, the task of scheduling pods to specific nodes in the cluster is handled by the kube-scheduler. The default behavior of this component is to filter nodes...
July 27, 2021 | By Ben Hirschberg

Comparing log management SaaS and PaaS solutions
Member Post Comparing log management SaaS and PaaS solutions
Guest post by Ajit Chelat, LOGIQ With the ever-increasing complexity in today’s software stacks, there’s a greater need to ramp up an organization’s observability capabilities to take on challenges brought about by cloud technology. Having a robust observability...
July 21, 2021 | By Ajit Chelat

Think gRPC, when you are architecting modern microservices!
Member Post Think gRPC, when you are architecting modern microservices!
Guest post by Nikhil Mohan, Senior Technology Architect at Infosys More than ever before, present day businesses want their IT systems to constantly evolve and be capable of responding positively to the changing goals and priorities. As they...
July 19, 2021 | By Nikhil Mohan

When ‘good enough’ isn’t good or enough
Member Post When ‘good enough’ isn’t good or enough
Guest post originally published on Rookout’s blog by Dan Sela, Development Team Lead at Rookout You know the phrase “good enough”? As in, “it’s good enough right now, we can worry about fixing it in the future”? Well,...
July 16, 2021 | By Dan Sela