All Member Posts


Networking with a service mesh: use cases, best practices, and comparison of top mesh options
Member Post Networking with a service mesh: use cases, best practices, and comparison of top mesh options
Guest post by Amir Kaushansky, VP Product, ARMO Service mesh technology emerged with the popularization of microservice architectures. Because service mesh facilitates the separation of networking from the business logic, it enables you to focus on your application’s...
July 15, 2021

How to prepare for CKAD and CKA certification
Member Post How to prepare for CKAD and CKA certification
Guest post originally published on InfraCloud’s blog by Ninad Desai, Gaurav Gahlot, Yatish Sharma, Jaiganesh Karthikeyan, and Dhruv Mewada While preparing for the CNCF’s CKAD or CKA certification, there could be numerous doubts, which exam to appear first, what resources to refer...
July 13, 2021 | By InfraCloud Team

“But what if we just use encryption?” – Practical GDPR for CTOs
Member Post “But what if we just use encryption?” – Practical GDPR for CTOs
Guest post originally published on Elastisys’s blog by Lars Larsson, Senior Cloud Architect, and DevOps Expert Engineer at Elastisys CTOs with applications targeting EU citizens know that GDPR in this post-“Schrems II” world makes use of US cloud providers...
July 12, 2021 | By Lars Larsson

Flux project update – July 2021
Member Post Flux project update – July 2021
Guest post originally published on Flux’s blog by Daniel Holbach As the Flux family of projects and its communities are growing, we strive to inform you each month about what has already landed, new possibilities which are available...
July 9, 2021 | By Daniel Holbach

Automate service mesh observability with Kuma
Member Post Automate service mesh observability with Kuma
Guest post originally published on Kong’s blog by Marco Palladino, CTO at Kong The more services you have running across different clouds and Kubernetes clusters, the harder it is to ensure that you have a central place to collect service...
July 8, 2021 | By Marco Palladino

IBM implements remote attestation on Linux with a hardware root-of-trust using Keylime
Member Post IBM implements remote attestation on Linux with a hardware root-of-trust using Keylime
Guest post by Michael Peters (Red Hat) & Gheorghe Almasi (IBM) If your organization is managing hundreds or thousands (or hundreds of thousands) of servers, how do you make sure they haven’t been breached? You could use a...
July 6, 2021 | By Michael Peters & Gheorghe Almasi

Decoding Disaster Recovery (DR) scenarios in AWS
Member Post Decoding Disaster Recovery (DR) scenarios in AWS
Guest post by Akash Bakshi at MSys Technologies AWS is known to be a high-performance, scalable computing infrastructure, which more and more organizations are adapting to modernize their IT. However, one must be aware that no system is...
July 2, 2021 | By Akash Bakshi

What is Polaris? Kubernetes open source configuration validation
Member Post What is Polaris? Kubernetes open source configuration validation
Guest post originally published on Fairwinds’s blog by Robert Brennan, Director of Open Source Software at Fairwinds Kubernetes is an incredibly powerful platform for deploying software. The level of flexibility it provides can accommodate nearly any use case,...
July 1, 2021 | By Robert Brennan

Securing Access to your Kubernetes Applications with Dex and RBAC
Member Post Securing Access to your Kubernetes Applications with Dex and RBAC
Guest post from Onkar Bhat, Engineering Manager and Deepika Dixit, Software Engineer, Kasten by Veeam Security is a critical requirement for application development, as is configuring authentication and authorization workflows in a way that makes the user experience...
June 30, 2021 | By Onkar Bhat and Deepika Dixit

TiFS, a TiKV-based partition tolerant, strictly consistent file system
Member Post TiFS, a TiKV-based partition tolerant, strictly consistent file system
Guest post originally published on PingCap’s blog by Hexi Lee, Software Engineer Intern at PingCAP TiKV is a distributed key-value storage engine, featuring strong consistency and partition tolerance. It can act either as the storage engine for TiDB...
June 28, 2021 | By Hexi Lee