All Member Posts


WasmEdge and OpenYurt bring cloud computing to the edge
Member Post WasmEdge and OpenYurt bring cloud computing to the edge
Guest post by Vivian Hu and Michael Yuan from Second State with the help from Chen Jin from the OpenYurt project. Edge computing is a distributed application architecture that places computational resources (eg, CPU and storage) close to...
February 7, 2022 | By Vivian Hu, Michael Yuan, and Chen Jin

Envoy Fundamentals, a training course to enable faster adoption of Envoy Proxy
Member Post Envoy Fundamentals, a training course to enable faster adoption of Envoy Proxy
Guest post by Tetrate Envoy Proxy, an open-source edge and service proxy, is a vital part of today’s modern, cloud-native application and is used in production by large companies like Booking.com, Pinterest, and Airbnb(Source). Tetrate, a top contributor...
February 4, 2022

Securing cloud native comms: from ingress to service mesh and beyond
Member Post Securing cloud native comms: from ingress to service mesh and beyond
Guest post originally published on Ambassador Labs’ blog by Jason Morgan As developers and operators, we all know the importance of securing data both in transit and at rest. However, hardly a day goes by that we don’t...
February 3, 2022 | By Jason Morgan

The Cost of a Kubernetes Repair in Development vs. Production
Member Post The Cost of a Kubernetes Repair in Development vs. Production
Guest post by Sarah Geisenger, Sales Engineer at Fairwinds One of the main benefits known about Kubernetes is the platform’s ability to increase the speed of development. By using microservices and containers, development happens faster. This is all...
February 2, 2022 | By Sarah Geisenger

The intersection of Terraform and Kubernetes
Member Post The intersection of Terraform and Kubernetes
Guest post originally published on Morpheus’ blog by Martez Reed Regardless of the industry or market, enterprises around the globe are at some stage on their cloud journey – with digital transformation as the destination. The use of...
February 1, 2022 | By Martez Reed

Chaos Mesh + SkyWalking: better observability for chaos engineering
Member Post Chaos Mesh + SkyWalking: better observability for chaos engineering
Guest post originally published on the PingCAP blog by Ningxuan Wang Chaos Mesh is an open-source cloud-native chaos engineering platform. You can use Chaos Mesh to conveniently inject failures and simulate abnormalities that might occur in reality, so you can identify...
January 31, 2022 | By Ningxuan Wang

Serverless architecture: pros and cons
Member Post Serverless architecture: pros and cons
Guest post originally published on SparkFabrik’s blog by SparkFabrik Team Serverless computing is an execution model in which the Cloud service provider is responsible for executing part of the code through the dynamic allocation of resources. In this model, the...
January 28, 2022 | By SparkFabrik Team

Secure your GitOps flows with Security-as-Code
Member Post Secure your GitOps flows with Security-as-Code
Guest post originally published on Magalix’s blog by Andrew Zola GitOps teams are shifting security left. This is fantastic news for anyone looking for a solid and efficient plan to secure applications, infrastructure, and other processes within the...
January 26, 2022 | By Andrew Zola

How does threat intelligence work?
Member Post How does threat intelligence work?
Guest post originally published on Snapt’s blog by Iwan Price-Evans The software and web industries speak a lot about security and the ability to handle security threats intelligently. In a landscape where security is becoming increasingly complex in...
January 24, 2022 | By Iwan Price-Evans

How to monitor endpoints in Kubernetes using Blackbox Exporter
Member Post How to monitor endpoints in Kubernetes using Blackbox Exporter
Guest post originally published on InfraCloud’s blog by Suramya Shah Monitoring endpoints is an important aspect of system observability for diagnosing performance and availability issues. In this article, we will cover in detail how to achieve endpoint monitoring...
January 20, 2022 | By Suramya Shah