ZDNet: “Containers and Kubernetes underpin more edgy, artificial intelligence efforts”
ZDNet: “Containers and Kubernetes underpin more edgy, artificial intelligence efforts”
Containers have become a key building block for some of today’s most sophisticated applications under development — from artificial intelligence to the edge. These encapsulated application units require orchestration, and Kubernetes is the vehicle being employed...
January 31, 2022

CNCF Archives the OpenTracing Project
Staff Post CNCF Archives the OpenTracing Project
CNCF announced today that the Technical Oversight Committee (TOC) has approved the archiving of the OpenTracing project. Archived projects are fairly rare but a sign of a healthy open source community. OpenTracing is only the second...
January 31, 2022

Chaos Mesh + SkyWalking: better observability for chaos engineering
Member Post Chaos Mesh + SkyWalking: better observability for chaos engineering
Guest post originally published on the PingCAP blog by Ningxuan Wang Chaos Mesh is an open-source cloud-native chaos engineering platform. You can use Chaos Mesh to conveniently inject failures and simulate abnormalities that might occur in reality, so you...
January 31, 2022 | Ningxuan Wang

Announcing the Kubernetes Policy Management Paper
Community Post Announcing the Kubernetes Policy Management Paper
Community post by Jim Bugwadia The CNCF Kubernetes Security Special Interest Group (SIG) and Policy Working group (WG) have just released a new paper on Kubernetes Policy Management to help educate the community about best practices...
January 28, 2022 | Jim Bugwadia

Serverless architecture: pros and cons
Member Post Serverless architecture: pros and cons
Guest post originally published on SparkFabrik’s blog by SparkFabrik Team Serverless computing is an execution model in which the Cloud service provider is responsible for executing part of the code through the dynamic allocation of resources. In this...
January 28, 2022 | SparkFabrik Team

Unveil the secret ingredients of continuous delivery at enterprise scale with Argo CD
Unveil the secret ingredients of continuous delivery at enterprise scale with Argo CD
Guest post originally published on Akuity’s blog by Yuan Tang (Akuity), Hong Wang (Akuity), and Alexander Matyushentsev (Intuit) Deep Dive into Argo CD and Best Practices for Operating at Enterprise-Scale This is a recap from our KubeCon China 2021 talk. If you...
January 27, 2022 | Yuan Tang, Hong Wang, Alexander Matyushentsev

Secure your GitOps flows with Security-as-Code
Member Post Secure your GitOps flows with Security-as-Code
Guest post originally published on Magalix’s blog by Andrew Zola GitOps teams are shifting security left. This is fantastic news for anyone looking for a solid and efficient plan to secure applications, infrastructure, and other processes...
January 26, 2022 | Andrew Zola

Secrets management: essential when using Kubernetes
End User Post Secrets management: essential when using Kubernetes
Guest post originally published on True‘s blog by Sebastiaan Kok In Kubernetes secrets contain all kinds of sensitive information. For instance, database credentials or API keys. The term secrets management describes the centralised and secured management...
January 25, 2022 | Sebastiaan Kok

Getting started with your CNCF membership
Staff Post Getting started with your CNCF membership
CNCF is adding members at an astounding rate, with 98 joining at the last KubeCon + CloudNativeCon. When members join, they are often overwhelmed by the number and variety of marketing benefits their membership offers and...
January 25, 2022

How does threat intelligence work?
Member Post How does threat intelligence work?
Guest post originally published on Snapt’s blog by Iwan Price-Evans The software and web industries speak a lot about security and the ability to handle security threats intelligently. In a landscape where security is becoming increasingly...
January 24, 2022 | Iwan Price-Evans