Member Post
“But what if we just use encryption?” – Practical GDPR for CTOs
Guest post originally published on Elastisys’s blog by Lars Larsson, Senior Cloud Architect, and DevOps Expert Engineer at Elastisys CTOs with applications targeting EU citizens know that GDPR in this post-“Schrems II” world makes use of US cloud providers...
July 12, 2021 | By Lars Larsson
Member Post
Flux project update – July 2021
Guest post originally published on Flux’s blog by Daniel Holbach As the Flux family of projects and its communities are growing, we strive to inform you each month about what has already landed, new possibilities which are available...
July 9, 2021 | By Daniel Holbach
Member Post
Automate service mesh observability with Kuma
Guest post originally published on Kong’s blog by Marco Palladino, CTO at Kong The more services you have running across different clouds and Kubernetes clusters, the harder it is to ensure that you have a central place to collect service...
July 8, 2021 | By Marco Palladino
Mentorship Post
From a newbie in software engineering to a graduated LFX-mentee
Guest post originally published on Chaos Mesh’s blog by Debabrata Panigrahi, LFX Mentee at Chaos Mesh About Me# I’m a junior undergraduate majoring in Biomedical Engineering in the Department of Biotechnology and Medical Engineering at the National Institute of Technology...
July 7, 2021 | By Debabrata Panigrahi
Member Post
IBM implements remote attestation on Linux with a hardware root-of-trust using Keylime
Guest post by Michael Peters (Red Hat) & Gheorghe Almasi (IBM) If your organization is managing hundreds or thousands (or hundreds of thousands) of servers, how do you make sure they haven’t been breached? You could use a...
July 6, 2021 | By Michael Peters & Gheorghe Almasi
Project Post
KubeEdge: cloud native edge computing
Project guest post by KubeEdge Maintainers KubeEdge enables cloud-edge synergy, computing at edge, and easy access of a massive number of devices based on Kubernetes container orchestration and scheduling capabilities. This article will introduce KubeEdge architecture, code directory,...
July 5, 2021 | By Huawei
Member Post
Decoding Disaster Recovery (DR) scenarios in AWS
Guest post by Akash Bakshi at MSys Technologies AWS is known to be a high-performance, scalable computing infrastructure, which more and more organizations are adapting to modernize their IT. However, one must be aware that no system is...
July 2, 2021 | By Akash Bakshi
Member Post
What is Polaris? Kubernetes open source configuration validation
Guest post originally published on Fairwinds’s blog by Robert Brennan, Director of Open Source Software at Fairwinds Kubernetes is an incredibly powerful platform for deploying software. The level of flexibility it provides can accommodate nearly any use case,...
July 1, 2021 | By Robert Brennan
Member Post
Securing Access to your Kubernetes Applications with Dex and RBAC
Guest post from Onkar Bhat, Engineering Manager and Deepika Dixit, Software Engineer, Kasten by Veeam Security is a critical requirement for application development, as is configuring authentication and authorization workflows in a way that makes the user experience...
June 30, 2021 | By Onkar Bhat and Deepika Dixit
Staff Post
FinOps for Kubernetes: Insufficient – or nonexistent – Kubernetes cost monitoring is causing overspend
With the help of the FinOps Foundation, CNCF recently conducted a microsurvey of the extended community to see how organizations are managing Kubernetes and cloud costs with FInOps or Cloud Financial Management The survey found that cloud and...
June 29, 2021